Mastering linux security hardening | packt publishing


Mastering linux security hardening | packt publishing

Mastering Linux Security Hardening | Packt Publishing | 0.98 GB
Category: CBTs

This course has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this course will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this course, you will be confident in delivering a system that will be much harder to compromise..
Style and Approach
An advanced-level guide filled with real-world examples that will help you secure your Linux system.
Table of Contents
RUNNING LINUX IN A VIRTUAL ENVIRONMENT
The Course Overview
The Threat Landscape and Keeping Up with Security News
Introduction to VirtualBox and Cygwin
SECURING USER ACCOUNTS
Setting Up sudo Privileges for Full Administrative Users
Setting Up sudo for Users with Only Certain Delegated Privileges
Advanced Tips and Tricks for Using sudo
Locking Down Users’ Home Directories the Red Hat/CentOS and Debian/Ubuntu Way
Enforcing Strong Password Criteria
Setting and Enforcing Password and Account Expiration
Preventing Brute-Force Password Attacks
Locking User Accounts
SECURING YOUR SERVER WITH A FIREWALL
An Overview of iptables
Uncomplicated Firewall for Ubuntu Systems
firewalld for Red Hat Systems
nftables – A More Universal Type of Firewall System
ENCRYPTING AND SSH HARDENING
GNU Privacy Guard
Encrypting Partitions with Linux Unified Key Setup – LUKS
Encrypting Directories with eCryptfs
Using VeraCrypt for Cross-Platform Sharing of Encrypted Containers
Ensuring that SSH Protocol 1 Is Disabled
Creating a User’s SSH Key Set
Disabling Username/Password Logins
MASTERING DISCRETIONARY ACCESS CONTROL
Changing Ownership of Files and Directories
Setting Permissions Values
Using SUID and SGID
Protecting Sensitive Files
ACCESS CONTROL LISTS AND SHARED DIRECTORY MANAGEMENT
Creating an Access Control List
Creating an Inherited Access Control List
Removing a Specific Permission
Preventing Loss of ACLs
Creating a User Group and Adding Members to It
Setting the SGID Bit and the Sticky Bit
Accessing Files in the Shared Directory
IMPLEMENTING MANDATORY ACCESS CONTROL WITH SELINUX AND APPARMOR
How SELinux Can Benefit a Systems Administrator?
Setting Security Contexts for Files and Directories
Troubleshooting with setroubleshoot
Working with SELinux Policies
Looking at AppArmor Profiles
Working with AppArmor Command-Line Utilities
SCANNING, AUDITING, AND HARDENING
Installing and Updating ClamAV and maldet
Scanning with ClamAV and maldet
SELinux Considerations
Scanning for Rootkits with Rootkit Hunter
Controlling the auditd Daemon and Creating Audit Rule
Using ausearch and aureport
Scanning and Hardening with Lynis
What You Will Learn
Use various techniques to prevent intruders from accessing sensitive data
Prevent intruders from planting malware, and detect whether malware has been planted
Prevent insiders from accessing data that they aren’t authorized to access
Do quick checks to see whether a computer is running network services that it doesn’t need to run
Learn security techniques that are common to all Linux distros, and some that are distro-specific
Authors
Donald A. Tevault
Donald A. Tevault-but you can call him Donnie-got involved with Linux way back in 2006, and has been working with it ever since. He holds the Linux Professional Institute Level 3-Security certification, and the GIAC Incident Handler certification. Donnie is a professional Linux trainer, and thanks to the magic of the internet, teaches Linux classes literally the world over from the comfort of his living room.

Скачать

cFosSpeed 7.00 Build 1901 Final крек
CCProxy 8.0 Build 20180523 ключ
Altap Salamander 3.0.8 кряк
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.
Категории Главная
  • Главная
  • Игры
  • Фильмы
  • Музыка
  • Софт
  • Книги
  • Все для мобильного
  • Фильмы онлайн
  • Other
  • TOP NEWS
    Рекомендуем Реклама
    NEW
    Рекомендуем
     

    Опрос

    Зачем вы пришли на сайт


     
     
    Вход Регистрация Если вам нужены dle бесплатные шаблоны последней версии для сайта