01 - Course Overview
02 - Understanding the Security Onion
03 - Understanding the Linux Procfs
04 - Working with the Procfs
05 - Tuning the Linux Kernel within the Procfs
06 - Address Space Layout Randomization
07 - Securing ICMP within the Procfs
08 - Summary and Whats Next
09 - Why Analyse Ports and Services
10 - Listing Services
11 - Implementing an NTP Client without Server
12 - Filtering Ports Using the Command ss
13 - Chrooting Users and Services
14 - Creating Chroot Jails
15 - Chrooting SSH Logins
16 - Summary and Whats Next
17 - Why Limit User Access
18 - Working with Limits
19 - Summary and Whats Next
20 - Inherent Virtual Machine Security
21 - Creating Fully Virtualized Machines
22 - Lost User Password Recovery
23 - Securing the GRUB Boot Process
24 - Summary and Whats Next
25 - Auditing in Linux
26 - Installing the Linux Audit System
27 - Auditing Tools
28 - Default Configuration of Auditing
29 - Working with Custom Rules
30 - Linux Does Not Have Viruses
31 - Working with AIDE
32 - Developing Your AIDE Strategy
33 - Rootkit Detection in Linux
34 - Linux Malware Detection with Maldet
35 - Summary and Whats Next
36 - Identity Management in Linux
37 - Configuring the OpenLDAP Appliance
38 - Creating OpenLDAP Users
39 - Configuring SSSD on OpenLDAP Client Systems
40 - Summary and Whats Next
41 - Deploying a KDC in Ubuntu 18.04
42 - Enabling Kerberos Authentication with SSH
43 - Summary and Whats Next
44 - Understanding the FreeIPA Server
45 - Configuring CentOS 7 for FreeIPA
46 - Installing the FreeIPA Server
47 - Using the Web Interface
48 - Installing the FreeIPA Client
49 - Summary and Whats Next