وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Linux Security – Basics and Beyond

سرفصل های دوره
  • 1.1 Introduction to Linux Users
  • 1.2 Principle of Least Priilege
  • 1.3 Accessing the Repository and Network Map
  • 1.4 The id Command
  • 2.1 Secure Passwords
  • 2.2 Setting the Password
  • 2.3 Generating Passwords with openssl and KeePass
  • 2.4 The passwd and shadow Files
  • 2.5 Password Settings
  • 2.6 Password Policy Configuration
  • 3.1 Logging in as a Typical User by Password
  • 3.2 Logging in as an Enterprise User
  • 3.3 Locking the System
  • 3.4 SSH Basics
  • 3.5 SSH and Linux in the Cloud
  • 4.1 The su command
  • 4.2 Using the sudo command
  • 4.3 sudoers
  • 4.4 Assigning a Regular User sudo Permissions
  • 5.1 Introduction to Linux OS Security
  • 5.2 Defense in Depth
  • 5.3 The CIA Triad
  • 6.1 Updating Debian and Ubuntu
  • 6.2 More apt and Repositories
  • 6.3 Updating Fedora, Red Hat, and CentOS
  • 6.4 Installing Security Updates Only
  • 6.5 Updating SUSE
  • 6.6 Updating Arch
  • 7.1 systemctl Basics
  • 7.2 Reducing the Attack Surface
  • 7.3 Creating a Degraded System
  • 7.4 Repairing a Degraded System
  • 7.5 systemd states
  • 8.1 10 Steps to a Secure Linux Serer (Part I)
  • 8.2 10 Steps to a Secure Linux Serer Serer (Part II)
  • 8.3 Wired & Wireless Security in Linux
  • 8.4 Securing GRUB
  • 9.1 AppArmor Basics
  • 9.2 AppArmor Profiles
  • 9.3 AppArmor and Apache Example
  • 9.4 SELinux Basics
  • 10.1 What is a Firewall
  • 10.2 Types of Linux-based Firewalls
  • 10.3 Zero-Trust Enironment Mindset
  • 11.1 UFW Introduction
  • 11.2 Setting up UFW
  • 11.3 Configuring UFW
  • 12.1 firewalld Introduction
  • 12.2 Installing and enabling firewalld
  • 12.3 Configuring and Testing firewalld
  • 12.4 Lock it Down!
  • 12.5 Returning the System to its Original State
  • 13.1 Introduction to nftables and the nft command
  • 13.2 nftables Setup
  • 13.3 Tables Chains Rules
  • 13.4 Building the nftables Configuration (Part I)
  • 13.5 Building the nftables Configuration (Part II)
  • 13.6 Saing and Restoring the nftables Configurations
  • 13.7 Translating iptables to nftables
  • 14.1 Reiew of SSH
  • 14.2 Using Keys to connect ia SSH
  • 14.3 The sshd config file
  • 14.4 Modifying the default SSH port
  • 14.5 Disabling Password-based SSH
  • 14.6 Disabling root login ia SSH
  • 14.7 Exclusie SSH Groups
  • 14.8 Authentication Settings
  • 14.9 Terminating SSH Connections (Part I)
  • 14.10 Terminating SSH Connections (Part II)
  • 15.1 RAID 1
  • 15.2 RAID 5
  • 15.3 RAID 10 and ZFS
  • 15.4 Backup!
  • 16.1 chmod
  • 16.2 chown and chgrp
  • 16.3 Encryption in Linux
  • 16.4 Linux Encoding and Hashing
  • 17.1 Viewing Processes
  • 17.2 Ending Processes with Commands
  • 17.3 Ending Processes with top
  • 18.1 Logging in Linux - The Journal
  • 18.2 Logging in Linux - rsyslog Part I
  • 18.3 Logging in Linux - rsyslog Part II
  • 18.4 Auditing in Linux
  • 18.5 Nmap
  • 18.6 Wireshark
  • 18.7 Additional Tools
  • Learning objecties
  • Learning objecties (1)
  • Learning objecties (2)
  • Learning objecties (3)
  • Learning objecties (4)
  • Learning objecties (5)
  • Learning objecties (6)
  • Learning objecties (7)
  • Learning objecties (8)
  • Learning objecties (9)
  • Learning objecties (10)
  • Learning objecties (11)
  • Learning objecties (12)
  • Learning objecties (13)
  • Learning objecties (14)
  • Learning objecties (15)
  • Learning objecties (16)
  • Learning objecties (17)
  • Learning objecties (18)
  • Linux Security - Basics and Beyond Introduction
  • Linux Security - Basics and Beyond Summary
  • Module Introduction
  • Module Introduction (1)
  • Module Introduction (2)
  • Module Introduction (3)
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 38807
    حجم: 23820 مگابایت
    مدت زمان: 691 دقیقه
    تاریخ انتشار: 10 مرداد 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید