Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers.
This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step.
Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers.
This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step.
Hello. My name is Jason Cannon and I'm the author of Linux Administration, the founder of the Linux Training Academy, and an instructor to thousands of satisfied students. I started my IT career in the late 1990's as a Unix and Linux System Engineer. I've worked for many technology companies who take information security seriously. I've even worked for security firms such as Mandiant and FireEye. I'll be sharing my real-world Linux security experience with you throughout this course.
By the end of this course you will be able to tighten up the security on any Linux system. You'll learn the security weaknesses of the Linux operating system and be given step-by-step instructions on how to protect those weaknesses. You'll even learn some security concepts that apply to information security as a whole while focusing on the Linux specific issues that require special consideration.
What People Are Saying About Jason and his Courses:
"Excellent course on Linux. It is the best way to get started using Linux that I have come across." Chris Bischoff, Udemy student
"This class was a great review of the 2 Linux classes I took in school. I learned plenty of new stuff and got a great refresher on things I haven't used in some time. I did well on my interview and got the job I was looking for. Thanks. " Alan Derrick, Udemy student
"This was a great course. Learned a lot from it. " Ricardo José Crosara Junior, Udemy student
"Excellent starter course. Very good and complete guide to get you started on working on Linux." Brian Mulder, Udemy student
"Great course. Easy to understand for beginners and a great refresher for experienced users. " Spencer Ball, Udemy student
"Very well laid out course. Thanks Jason. " Eric Etheredge, Udemy student
"Love it... it's absolutely one of the best courses I've taken here on Udemy." Idriss N, Udemy student
"Awesome Course. Another great one. Thanks Jason. " John Wilmont, Udemy student
"Excellent Course. Having come from a moderate understanding of Linux, this course has given me a deeper and more streamlined understanding of Linux. Definitely worth the money." Armando Cabrera, Udemy student
"Fantastic course and very beautifully explained." S John, Udemy student
"Great course, great instructor. I enjoyed every minute of it. I recommend this course 100%." Alfredo, Udemy student
"I am lovin' it. Nice way to begin one's journey into Linux." Rohit Gupta, Udemy student
Here is just some of what you will learn by taking this Linux Security and Hardening course:
What you learn in course applies to any Linux environment or distribution including Ubuntu, Debian, Linux Mint, RedHat, CentOS, Fedora, OpenSUSE, Slackware, Kali Linux and more.
Free Bonus - PDFs of All the Material Covered
As an added bonus for enrolling in this Linux Server Security video training course, you'll receive access to all the slides used in the lessons. You can download them and refer to them when you want to jog your memory or double-check your work.
Enroll now and start learning the skills you need to hack-proof your Linux systems today.
A brief overview of what you'll learn in this Linux security course.
The course download includes the lecture slides as well as additional information security resources.
This is part two of the Linux file permissions lesson. In this lesson you will learn about:
Symbolic permissions
Numeric and octal permissions
File versus directory permissions
Changing permissions
Working with groups
File creation mask
This lesson covers the special modes of setuid, setgid, and the sticky bit.
The contents of this lecture are so secret I'm not even allowed to describe it! Open, if you dare.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.