We may earn an affiliate commission when you visit our partners.
Course image
Jason Cannon

Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers.

Read more

Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers.

This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step.

Hello. My name is Jason Cannon and I'm the author of Linux Administration, the founder of the Linux Training Academy, and an instructor to thousands of satisfied students. I started my IT career in the late 1990's as a Unix and Linux System Engineer. I've worked for many technology companies who take information security seriously. I've even worked for security firms such as Mandiant and FireEye. I'll be sharing my real-world Linux security experience with you throughout this course.

By the end of this course you will be able to tighten up the security on any Linux system. You'll learn the security weaknesses of the Linux operating system and be given step-by-step instructions on how to protect those weaknesses. You'll even learn some security concepts that apply to information security as a whole while focusing on the Linux specific issues that require special consideration.

What People Are Saying About Jason and his Courses:

"Excellent course on Linux. It is the best way to get started using Linux that I have come across." Chris Bischoff, Udemy student

"This class was a great review of the 2 Linux classes I took in school. I learned plenty of new stuff and got a great refresher on things I haven't used in some time. I did well on my interview and got the job I was looking for. Thanks. " Alan Derrick, Udemy student

"This was a great course. Learned a lot from it. " Ricardo José Crosara Junior, Udemy student

"Excellent starter course. Very good and complete guide to get you started on working on Linux." Brian Mulder, Udemy student

"Great course. Easy to understand for beginners and a great refresher for experienced users. " Spencer Ball, Udemy student

"Very well laid out course. Thanks Jason. " Eric Etheredge, Udemy student

"Love it... it's absolutely one of the best courses I've taken here on Udemy." Idriss N, Udemy student

"Awesome Course. Another great one. Thanks Jason. " John Wilmont, Udemy student

"Excellent Course. Having come from a moderate understanding of Linux, this course has given me a deeper and more streamlined understanding of Linux. Definitely worth the money." Armando Cabrera, Udemy student

"Fantastic course and very beautifully explained." S John, Udemy student

"Great course, great instructor. I enjoyed every minute of it. I recommend this course 100%." Alfredo, Udemy student

"I am lovin' it. Nice way to begin one's journey into Linux." Rohit Gupta, Udemy student

Here is just some of what you will learn by taking this Linux Security and Hardening course:

  • How to protect your Linux systems against hackers.
  • Ways to prevent attackers from breaking into your systems, even when they have physical access to your machine.
  • How to enforce strong password policies and control password as well as account aging policies on your Linux servers.
  • SSH Hardening practices.
  • Network security tactics.
  • Port scanning and network service detection.
  • How the Linux firewall works and exactly how to configure it.
  • How to protect the superuser (root) account.
  • Ways to share accounts securely with an audit trail.
  • File system security and encryption.
  • Using and configuring sudo, and why you need to.
  • Advanced Linux permissions include special modes, file attributes, and access control lists (ACLs).
  • Much, much more.
  • Unconditional Udemy 30 day money-back guarantee - that's my personal promise of your success.

What you learn in course applies to any Linux environment or distribution including Ubuntu, Debian, Linux Mint, RedHat, CentOS, Fedora, OpenSUSE, Slackware, Kali Linux and more.

Free Bonus - PDFs of All the Material Covered

As an added bonus for enrolling in this Linux Server Security video training course, you'll receive access to all the slides used in the lessons. You can download them and refer to them when you want to jog your memory or double-check your work.

Enroll now and start learning the skills you need to hack-proof your Linux systems today.

Enroll now

What's inside

Learning objective

By the end of this course you will be able to harden a linux system, reduce its surface of vulnerability, and reduce the risk of your linux system being hacked or compromised.

Syllabus

Course Overview and Downloads

A brief overview of what you'll learn in this Linux security course.

The course download includes the lecture slides as well as additional information security resources.

Read more
General Security
Section Overview
Securing the Boot Loader
Is Linux Secure?
What Makes Linux Secure?
Security Guidelines and Principles
Section Summary
Physical Security
Intro to PAM
Physical Security Concepts
Single User Mode Security
Single User Mode and Blank Passwords
Disk Encryption
Encrypting a New Device, Part I
Encrypting a New Device, Part II
Encrypting an Existing Device
Disabling Control Alt Delete
Account Security
PAM Configuration Example
Password Security
Account Security Demo #1 (UID 0)
Controlling Account Access
Security by Account Type
Account Security Demo #2
Account Security Demo #3 (Sudo)
Network Security
Network Security, Part I
Network Security, Part II
Securing SSHD, Part I
Securing SSHD, Part II
Linux Firewall Fundamentals
Configuring the Firewall from the Command Line
Firewall Rule Specifications
Example Firewall Rules
Linux Firewall Demonstration
Linux Firewalls
TCP Wrappers, Part I
TCP Wrappers, Part II
File System Security
File and Directory Permissions, Intro
File and Directory Permissions, Part I

This is part two of the Linux file permissions lesson.  In this lesson you will learn about:

  • Symbolic permissions

  • Numeric and octal permissions

  • File versus directory permissions

  • Changing permissions

  • Working with groups

  • File creation mask

This lesson covers the special modes of setuid, setgid, and the sticky bit.

File Attributes
File Attributes Demo
ACLs
ACLs Demo
Rootkits
Rootkit Hunter Demonstration
Rootkit Detection Software
Additional Security Resources
Linux Hardening Guides
Linux Security Email Lists
Security Meetups List
Security Conference Videos
Bonus Section

The contents of this lecture are so secret I'm not even allowed to describe it! Open, if you dare.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops strong foundational skills and deep expertise in Linux systems
Teaches industry-standard tools for Linux systems security
Taught by Jason Cannon, a recognized Linux security expert
Covers a wide range of topics, including SSH hardening, network security, and file system security
Provides hands-on practice with step-by-step instructions
Requires some prior experience with Linux systems

Save this course

Save Linux Security and Hardening, The Practical Security Guide. to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Linux Security and Hardening, The Practical Security Guide. with these activities:
Read 'Red Hat Enterprise Linux Security' by Michael Jang
Review this book to become familiar with Linux security concepts and best practices.
Show steps
  • Purchase the book from Amazon or another retailer.
  • Read the book cover-to-cover, taking notes as you go.
  • Complete the practice exercises at the end of each chapter.
  • Take a practice test to assess your understanding of the material.
Follow a tutorial on how to secure a Linux server
This activity will help you to learn how to secure a Linux server.
Browse courses on Linux Security
Show steps
  • Find a tutorial on how to secure a Linux server.
  • Follow the steps in the tutorial.
  • Test the security of the server.
Attend a Linux security meetup or conference
This activity will help you to network with other Linux security professionals.
Show steps
  • Find a Linux security meetup or conference in your area.
  • Register for the event.
  • Attend the event and participate in the activities.
Six other activities
Expand to see all activities and additional details
Show all nine activities
Attend a Linux security workshop
This activity will help you to learn about Linux security in a hands-on environment.
Show steps
  • Find a Linux security workshop in your area.
  • Register for the workshop.
  • Attend the workshop and participate in the activities.
Join a Linux security study group
This activity will help you to learn about Linux security from other students.
Show steps
  • Find a Linux security study group in your area.
  • Attend the meetings and participate in the discussions.
Set up a home Linux server
This project will give you hands-on experience with Linux security.
Browse courses on Linux Server
Show steps
  • Purchase a Raspberry Pi or other small computer.
  • Install a Linux distribution on the device.
  • Configure the server's security settings.
  • Set up a web server and other services.
  • Monitor the server's security and make adjustments as needed.
Create a security policy for a Linux system
This activity will help you to develop your skills in security policy writing.
Browse courses on Linux Security
Show steps
  • Identify the assets that need to be protected.
  • Identify the threats to those assets.
  • Develop a set of security controls to mitigate the threats.
  • Write a security policy that documents the security controls.
  • Implement the security policy on the Linux system.
Practice hardening a Linux system
This activity will help you to develop your skills in Linux security hardening.
Browse courses on Linux Security
Show steps
  • Install a Linux distribution on a virtual machine.
  • Configure the system's security settings.
  • Install and configure security software.
  • Test the system's security by running security scans.
  • Make adjustments to the system's security settings as needed.
Create a blog post or article about a Linux security topic
This activity will help you to solidify your understanding of Linux security and improve your writing skills.
Browse courses on Linux Security
Show steps
  • Choose a Linux security topic that you are interested in.
  • Research the topic and gather information from reliable sources.
  • Write a blog post or article that is clear, concise, and informative.
  • Publish your blog post or article on a website or blog.

Career center

Learners who complete Linux Security and Hardening, The Practical Security Guide. will develop knowledge and skills that may be useful to these careers:

Reading list

We haven't picked any books for this reading list yet.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Linux Security and Hardening, The Practical Security Guide..
Linux for Beginners
Most relevant
Learn Linux Administration and Supercharge Your Career
Most relevant
Bash Scripting and Shell Programming (Linux Command Line)
Most relevant
Shell Scripting: Discover How to Automate Command Line...
Most relevant
Complete Linux Training Course to Get Your Dream IT Job...
Most relevant
Information Security Management Fundamentals for Non...
Most relevant
Introduction to web programming for GIS applications
Most relevant
CompTIA Linux+: Security
Most relevant
CompTIA Linux+: Security
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser