1.1 Introduction to Linux Users
1.2 Principle of Least Priilege
1.3 Accessing the Repository and Network Map
1.4 The id Command
2.1 Secure Passwords
2.2 Setting the Password
2.3 Generating Passwords with openssl and KeePass
2.4 The passwd and shadow Files
2.5 Password Settings
2.6 Password Policy Configuration
3.1 Logging in as a Typical User by Password
3.2 Logging in as an Enterprise User
3.3 Locking the System
3.4 SSH Basics
3.5 SSH and Linux in the Cloud
4.1 The su command
4.2 Using the sudo command
4.3 sudoers
4.4 Assigning a Regular User sudo Permissions
5.1 Introduction to Linux OS Security
5.2 Defense in Depth
5.3 The CIA Triad
6.1 Updating Debian and Ubuntu
6.2 More apt and Repositories
6.3 Updating Fedora, Red Hat, and CentOS
6.4 Installing Security Updates Only
6.5 Updating SUSE
6.6 Updating Arch
7.1 systemctl Basics
7.2 Reducing the Attack Surface
7.3 Creating a Degraded System
7.4 Repairing a Degraded System
7.5 systemd states
8.1 10 Steps to a Secure Linux Serer (Part I)
8.2 10 Steps to a Secure Linux Serer Serer (Part II)
8.3 Wired & Wireless Security in Linux
8.4 Securing GRUB
9.1 AppArmor Basics
9.2 AppArmor Profiles
9.3 AppArmor and Apache Example
9.4 SELinux Basics
10.1 What is a Firewall
10.2 Types of Linux-based Firewalls
10.3 Zero-Trust Enironment Mindset
11.1 UFW Introduction
11.2 Setting up UFW
11.3 Configuring UFW
12.1 firewalld Introduction
12.2 Installing and enabling firewalld
12.3 Configuring and Testing firewalld
12.4 Lock it Down!
12.5 Returning the System to its Original State
13.1 Introduction to nftables and the nft command
13.2 nftables Setup
13.3 Tables Chains Rules
13.4 Building the nftables Configuration (Part I)
13.5 Building the nftables Configuration (Part II)
13.6 Saing and Restoring the nftables Configurations
13.7 Translating iptables to nftables
14.1 Reiew of SSH
14.2 Using Keys to connect ia SSH
14.3 The sshd config file
14.4 Modifying the default SSH port
14.5 Disabling Password-based SSH
14.6 Disabling root login ia SSH
14.7 Exclusie SSH Groups
14.8 Authentication Settings
14.9 Terminating SSH Connections (Part I)
14.10 Terminating SSH Connections (Part II)
15.1 RAID 1
15.2 RAID 5
15.3 RAID 10 and ZFS
15.4 Backup!
16.1 chmod
16.2 chown and chgrp
16.3 Encryption in Linux
16.4 Linux Encoding and Hashing
17.1 Viewing Processes
17.2 Ending Processes with Commands
17.3 Ending Processes with top
18.1 Logging in Linux - The Journal
18.2 Logging in Linux - rsyslog Part I
18.3 Logging in Linux - rsyslog Part II
18.4 Auditing in Linux
18.5 Nmap
18.6 Wireshark
18.7 Additional Tools
Learning objecties
Learning objecties (1)
Learning objecties (2)
Learning objecties (3)
Learning objecties (4)
Learning objecties (5)
Learning objecties (6)
Learning objecties (7)
Learning objecties (8)
Learning objecties (9)
Learning objecties (10)
Learning objecties (11)
Learning objecties (12)
Learning objecties (13)
Learning objecties (14)
Learning objecties (15)
Learning objecties (16)
Learning objecties (17)
Learning objecties (18)
Linux Security - Basics and Beyond Introduction
Linux Security - Basics and Beyond Summary
Module Introduction
Module Introduction (1)
Module Introduction (2)
Module Introduction (3)