back

Linux Security Techniques

Security features found in modern Linux distributions10 H 47 M

This course covers various Linux security techniques like data encryption, firewall configuration, auditing access, pen testing tools, and more.

Episodes
Episodes
  • Monitoring and Auditing Security
    • Overview
    • Managing Logs with syslog
    • Managing Logs with journald
    • Auditing User Passwords
    • Auditing User Passwords Part 2
    • Auditing the Filesystem
    • Auditing SUID and SGID
    • Auditing Logins with fail2ban
  • Data Security
    • LUKS Disk Encryption
    • Data Encryption with GPG
    • MD5 and SHA Checksums
    • Data Encryption with SSH
  • Securing Services
    • Securing Services with SELinux
    • Securing Services with SELinux Part 2
    • Chroot Jails
    • LXC Containers
  • Securing Networks
    • TCP Wrappers
    • Network Security with iptables
    • Network Security with firewalld
  • Security Testing
    • Verifying Firewall Configurations
    • Verifying Network Data Encryption
    • Verifying Network Data Encryption Part 2

Overview

4 M

itprotv course thumbnailitprotv course thumbnailitprotv course thumbnail
  • Episode Description

The Linux Security Techniques series introduces the viewers to the various security features found in modern Linux distributions. Topics covered include data encryption, auditing access, SELinux and firewall configuration among others. The series also lightly covers penetration testing to ensure that each security technique is implemented properly.

Just you? Training a whole team? There's an ITProTV plan that fits.

With more than 4,000 hours of engaging video training for IT professionals, you'll find the courses you and your team need to stay current and get the latest certifications.