01 - Course Overview
02 - Introduction to Linux Security
03 - Verify the Exam Objectives
04 - Summary and Whats Next
05 - Creating Your Own Labs
06 - Lab Networking
07 - Summary and Whats Next
08 - Introduction to Routing
09 - Routing Tables
10 - Enabling IP Forwarding
11 - Persisting Routing Tables
12 - Summary and Whats Next
13 - Firewalls in Linux
14 - Configuring NAT in Linux
15 - Port Forwarding in Linux
16 - Listing Firewall Rules
17 - Building Firewall Rules
18 - Persisting Firewall Rules
19 - Summary and Whats Next
20 - What Is Fail2ban
21 - Listing Failed SSH Logins
22 - Installing Fail2ban and Creating Jails
23 - Working with the Fail2ban Client
24 - Summary and Whats Next
25 - OpenSSH Servers and Clients
26 - SSH Server Configuration Files
27 - Authenticating Servers
28 - Restricting Root and User Access
29 - Authenticating Clients
30 - Summary and Whats Next
31 - Linux FTP Servers
32 - Firewalling FTP Servers
33 - Installing and Configuring Pure-FTPD Server
34 - Installing and Configuring VSFTPD
35 - Summary and Whats Next
36 - Why Monitor Your System
37 - Using the Port Scanner Nmap
38 - Vulnerability Scanning with OpenVAS
39 - Snort Intruder Detection System
40 - Summary and Whats Next
41 - Creating Virtual Private Networks
42 - Installing OpenVPN
43 - Creating VPN Connections
44 - Summary and Whats Next