CompTIA Linux+: Security
24,900 تومان
بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
خرید دانلودی فوری
در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.
ویدئو معرفی این محصول
Security and Cyber-Security skills are more and more sort after. This course will teach you to secure various Linux distributions and to look at the security angle as a first approach.
01. Course Overview
1. Course Overview
02. Securing Linux Systems
1. Introducing LInux Security
2. Web Server Startup and Permissions
3. Documentation May Not Always Be Correct
4. Certificate Trusts
5. Summary and What's Next
03. Understanding the File Mode or Permissions
1. Welcome to the Linux File Mode
2. Listing File Permissions
3. Working with the Umask and Default Permissions
4. Understanding the Command Chmod
5. Using Chmod to Manage Permissions
6. Using Advanced Symbolic Notation
7. Changing File Ownership
8. Setting Execute Only on a Directory
9. Summary and What's Next
04. Managing Special File Permissions
1. What Are Special Permissions-
2. Finding, Listing, and Setting Special Permissions
3. Using the Sticky Bit to Prevent Deletions
4. Setting the SGID Bit on Directories
5. Showing Collaborative Permissions with the Apache Web Server
6. Special Permission on Executables
7. Using Linux Capabilities
8. Summary and What's Next
05. Extending the File Mode with ACLs
1. Understanding the File Mode Limits
2. Checking for ACL Support
3. Configuring HTTPD Securely with ACLS
4. Understanding ACLS
5. Working with ACLS
6. Summary and What's Next
06. Implementing SELinux
1. Welcome to SELinux
2. Managing SELinux Modes
3. Configuring SELinux Booleans
4. Understanding File Contexts
5. Managing File Contexts
6. Relocating User Home Directories
7. Summary and What's Next
07. Working with AppArmor
1. Understanding AppArmor
2. Installing AppArmor Components
3. Viewing Active Profiles
4. Creating Python Script
5. Generating a Profile for the Script
6. Using Logprof to Update Profile
7. Summary and What's Next
08. Managing SSH Servers and Connections
01. Managing Secure Connections in Linux
02. Understanding Available Authentication Methods
03. Managing Known SSH Servers or Hosts
04. Working with Known Hosts Storage
05. Centralizing Known Hosts
06. Authenticating SSH Clients
07. Understanding the SSH CA
08. Implementing an SSH CA
09. Signing Server Keys with the CA
10. Summary and What's Next
09. Elevating Privileges in Linux
1. Becoming the Boss
2. Using Su
3. Understanding Sudo
4. Using Sudo
5. Environment Variables and Sudo
6. Understanding PolKit
7. Recovering Broken Sudo Systems Using Polkit
8. Summary and What's Next
10. Managing Local Users
01. Managing Local Users and Groups
02. Listing Users
03. Working with User Default Settings
04. Managing New Users
05. Modifying and Deleting Users
06. Understanding Password Shadow Data
07. Working with Shadow Data
08. Understanding Password Encryption
09. Working with Passwords and Understanding Authentication
10. Managing User Passwords
11. Managing Linux Groups
12. Summary and What's Next
11. Implementing HTTPS with the Apache Web Server
1. HTTPS Self-signed Certificates
2. Installing Apache
3. Understanding the Ubuntu Apache Configuration
4. Configuring SSL on Apache
5. Redirect HTTP to HTTPS
6. Investigating Certificate Chains with OpenSSL
7. Summary and What's Next
12. Implementing an openSSL Certificate Server
1. Using Certificate Authorities
2. Creating a CA from the CLI
3. Creating a Certificate Signing Request
4. Signing the CSR
5. Configuring Apache with CA Certitficate
6. Graphical Certificate Management on openSUSE
7. Summary and What's Next
13. Implementing Identity Management with openLDAP and SSSD
1. Identity Management in Linux
2. Installing OpenLDAP on Ubuntu 20.04
3. Adding and Searching Entries in OpenLDAP
4. Understanding StartTLS
5. Configuring StartTLS in OpenLDAP
6. Configuring SSSD on Ubuntu
7. Configuring SSSD on AlmaLinux
8. Summary and What's Next
14. Hardening Your Linux Systems
1. Security Hardening in Linux
2. Checking Listening Ports and Restricting Access to SSSD
3. Removing Extra Services
4. Securing ICMP Access Using Sysctl
5. Listing User Details
6. Locking Failed Login Attempts
7. Summary and What's Next
15. Implementing Firewalls with Firewalld
1. Introducing Firewalld as a Host Based Firewall
2. Basic Firewalld Management
3. Adding and Removing Services
4. Adding Source Addresses
5. Editing Service Definitions
6. Summary and What's Next
16. Implement Firewalls with UFW
1. Welcome to the Uncomplicated Firewall
2. Adding Basic UFW Rules
3. Tuning SSH Allow Rules
4. Allowing HTTP Access
5. Reporting on Rules