We may earn an affiliate commission when you visit our partners.
Andrew Mallett

Security and Cyber-Security skills are more and more sort after. This course will teach you to secure various Linux distributions and to look at the security angle as a first approach.

Read more

Security and Cyber-Security skills are more and more sort after. This course will teach you to secure various Linux distributions and to look at the security angle as a first approach.

If you are short on one or more Linux security skills this course is a great starting point. In this course, CompTIA Linux+: Security, you’ll learn to diagnose and secure Linux security issues. First, you’ll explore Linux permissions and access control Lists. Next, you’ll discover securing Linux remote access with SSH and SSH Certificate Servers. Finally, you’ll learn how to protect network access to your systems with firewalls. When you’re finished with this course, you’ll have the skills and knowledge of Linux Security needed to secure a range of Linux distributions.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Securing Linux Systems
Understanding the File Mode or Permissions
Managing Special File Permissions
Read more
Extending the File Mode with ACLs
Implementing SELinux
Working with AppArmor
Managing SSH Servers and Connections
Elevating Privileges in Linux
Managing Local Users
Implementing HTTPS with the Apache Web Server
Implementing an openSSL Certificate Server
Implementing Identity Management with openLDAP and SSSD
Hardening Your Linux Systems
Implementing Firewalls with Firewalld
Implement Firewalls with UFW

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores Linux permissions and access control lists to strengthen security measures
Covers securing Linux remote access with SSH and SSH Certificate Servers, ensuring secure connections
Involves implementing Identity Management with openLDAP and SSSD to enhance user authentication and authorization
Includes hands-on implementation of firewalls with Firewalld and UFW to protect network access
Develops skills in managing special file permissions, extending file modes with ACLs, and implementing SELinux and AppArmor for enhanced security
May require prior experience with Linux distributions and basic security concepts to fully benefit from the course

Save this course

Save CompTIA Linux+: Security to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in CompTIA Linux+: Security with these activities:
Review course materials
Improve foundational knowledge by reviewing course materials
Browse courses on Security
Show steps
  • Read through course syllabus and learning outcomes
Participate in online discussion forums about Linux security
Engage with peers and experts to expand knowledge and perspectives on Linux security
Browse courses on Linux Security
Show steps
  • Join online forums and communities focused on Linux security
  • Actively participate in discussions, ask questions, and share insights
Practice managing file permissions and access control lists
Reinforce understanding of file permissions and access control mechanisms
Browse courses on File Permissions
Show steps
  • Set up a virtual environment to practice
  • Create different types of files and directories
  • Assign different permissions to files and directories
  • Use commands like chmod, chown, and chgrp to modify permissions
Four other activities
Expand to see all activities and additional details
Show all seven activities
Contribute to an open-source project related to Linux security
Gain hands-on experience and contribute to the Linux security ecosystem
Browse courses on Linux Security
Show steps
  • Identify an open-source project that aligns with your interests
  • Familiarize yourself with the project's codebase and documentation
  • Suggest improvements or contribute code to the project
Create a cheat sheet on SSH commands
Solidify knowledge of SSH commands by creating a reference guide
Browse courses on SSH
Show steps
  • Gather all the necessary SSH commands and their descriptions
  • Organize the commands into logical categories
  • Create a visually appealing and easy-to-use cheat sheet
Mentor junior students or colleagues on Linux security concepts
Share knowledge while reinforcing understanding and strengthening communication skills
Browse courses on Linux Security
Show steps
  • Identify opportunities to mentor others, such as through online forums or study groups
  • Provide guidance on Linux security concepts and best practices
  • Answer questions and offer support to mentees
Build a secure web server using Apache and HTTPS
Apply practical skills by configuring a web server with encryption and protection
Browse courses on Apache Web Server
Show steps
  • Set up a virtual environment with Apache web server
  • Generate an SSL certificate using OpenSSL
  • Configure Apache to use HTTPS and the SSL certificate
  • Test the web server's security using tools like SSL Labs

Career center

Learners who complete CompTIA Linux+: Security will develop knowledge and skills that may be useful to these careers:
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to improve their security posture. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Cybersecurity Engineer
A Cybersecurity Engineer designs, implements, and maintains security systems to protect an organization's computer networks and data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Information Security Analyst
An Information Security Analyst designs, implements, and manages security measures to protect an organization's computer networks and data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Network Administrator
A Network Administrator manages an organization's computer networks and data. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Systems Administrator
A Systems Administrator manages an organization's computer systems. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
IT Manager
An IT Manager oversees an organization's information technology (IT) department. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Security Analyst
A Security Analyst investigates and responds to security incidents. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Incident Responder
An Incident Responder investigates and responds to security incidents. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Security Architect
A Security Architect designs and implements security solutions for an organization. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Software Engineer
A Software Engineer designs, develops, and maintains software applications. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Ethical Hacker
An Ethical Hacker legally penetrates an organization's computer systems to identify vulnerabilities and weaknesses. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Database Administrator
A Database Administrator manages an organization's databases. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
IT Auditor
An IT Auditor evaluates an organization's IT systems and processes to ensure that they are secure and compliant with regulations. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
DevOps Engineer
A DevOps Engineer collaborates with developers and operations teams to ensure that software applications are deployed and maintained efficiently and securely. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.
Cloud Engineer
A Cloud Engineer designs, implements, and manages cloud computing environments. This course may be helpful for someone interested in this role, as it provides a foundation in Linux security, including topics such as permissions, access control, remote access, and firewalls.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in CompTIA Linux+: Security.
Valuable reference tool for system administrators and security professionals. It provides practical recipes for securing Linux systems, covering topics such as user management, file permissions, network security, and intrusion detection.
Valuable reference tool for system administrators and security professionals. It provides recipes for auditing Linux systems for security vulnerabilities.
Collection of practical tips and techniques for ethical hacking. It covers topics such as reconnaissance, vulnerability assessment, and exploitation.
Comprehensive guide to Metasploit, a popular penetration testing framework. It covers topics such as framework installation, module usage, and exploit development.
Practical guide to Python programming for ethical hacking. It covers topics such as socket programming, web scraping, and exploit development.
Classic in the field of exploitation. It covers topics such as buffer overflows, format strings, and heap overflows.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser