We may earn an affiliate commission when you visit our partners.
Pluralsight logo

CompTIA Linux+

Security

Andrew Mallett

Security and Cyber-Security skills are more and more sort after. This course will teach you to secure various Linux distributions and to look at the security angle as a first approach.

Read more

Security and Cyber-Security skills are more and more sort after. This course will teach you to secure various Linux distributions and to look at the security angle as a first approach.

If you are short on one or more Linux security skills this course is a great starting point. In this course, CompTIA Linux+: Security, you’ll learn to diagnose and secure Linux security issues. First, you’ll explore Linux permissions and access control Lists. Next, you’ll discover securing Linux remote access with SSH and SSH Certificate Servers. Finally, you’ll learn how to protect network access to your systems with firewalls. When you’re finished with this course, you’ll have the skills and knowledge of Linux Security needed to secure a range of Linux distributions.

Enroll now

What's inside

Syllabus

Course Overview
Securing Linux Systems
Understanding the File Mode or Permissions
Managing Special File Permissions
Read more
Extending the File Mode with ACLs
Implementing SELinux
Working with AppArmor
Managing SSH Servers and Connections
Elevating Privileges in Linux
Managing Local Users
Implementing HTTPS with the Apache Web Server
Implementing an openSSL Certificate Server
Implementing Identity Management with openLDAP and SSSD
Hardening Your Linux Systems
Implementing Firewalls with Firewalld
Implement Firewalls with UFW

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores Linux permissions and access control lists to strengthen security measures
Covers securing Linux remote access with SSH and SSH Certificate Servers, ensuring secure connections
Involves implementing Identity Management with openLDAP and SSSD to enhance user authentication and authorization
Includes hands-on implementation of firewalls with Firewalld and UFW to protect network access
Develops skills in managing special file permissions, extending file modes with ACLs, and implementing SELinux and AppArmor for enhanced security
May require prior experience with Linux distributions and basic security concepts to fully benefit from the course

Save this course

Save CompTIA Linux+: Security to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for CompTIA Linux+: Security. These are activities you can do either before, during, or after a course.

Career center

Learners who complete CompTIA Linux+: Security will develop knowledge and skills that may be useful to these careers:
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to improve their security posture. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Cybersecurity Engineer
A Cybersecurity Engineer designs, implements, and maintains security systems to protect an organization's computer networks and data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Information Security Analyst
An Information Security Analyst designs, implements, and manages security measures to protect an organization's computer networks and data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Network Administrator
A Network Administrator manages an organization's computer networks and data. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Systems Administrator
A Systems Administrator manages an organization's computer systems. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
IT Manager
An IT Manager oversees an organization's information technology (IT) department. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Security Analyst
A Security Analyst investigates and responds to security incidents. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Incident Responder
An Incident Responder investigates and responds to security incidents. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Security Architect
A Security Architect designs and implements security solutions for an organization. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Software Engineer
A Software Engineer designs, develops, and maintains software applications. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Ethical Hacker
An Ethical Hacker legally penetrates an organization's computer systems to identify vulnerabilities and weaknesses. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Database Administrator
A Database Administrator manages an organization's databases. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
IT Auditor
An IT Auditor evaluates an organization's IT systems and processes to ensure that they are secure and compliant with regulations. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
DevOps Engineer
A DevOps Engineer collaborates with developers and operations teams to ensure that software applications are deployed and maintained efficiently and securely. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Cloud Engineer
A Cloud Engineer designs, implements, and manages cloud computing environments. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in CompTIA Linux+: Security.
Valuable reference tool for system administrators and security professionals. It provides practical recipes for securing Linux systems, covering topics such as user management, file permissions, network security, and intrusion detection.
Valuable reference tool for system administrators and security professionals. It provides recipes for auditing Linux systems for security vulnerabilities.
Collection of practical tips and techniques for ethical hacking. It covers topics such as reconnaissance, vulnerability assessment, and exploitation.
Comprehensive guide to Metasploit, a popular penetration testing framework. It covers topics such as framework installation, module usage, and exploit development.
Practical guide to Python programming for ethical hacking. It covers topics such as socket programming, web scraping, and exploit development.
Classic in the field of exploitation. It covers topics such as buffer overflows, format strings, and heap overflows.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser