We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Secure Container Host Operating System

A Cloud Guru

This is the first course of a four-course learning path related to securing containers. This course will teach you how to prepare and harden the operating system so it is secured as much as possible before we actually deploy containers. We will go over various configurations and see how we can use the operating system’s security mechanisms to best protect and harden our system. In the first part of the course, we provide knowledge regarding firewalld and SELinux. firewalld is a Linux tool used for managing iptables. We need a firewall so we can control what kind of traffic is let through and what kind of traffic is denied. We will go over the firewalld installation and overall setup. Here we teach several basic firewalld commands and how to utilize them regarding zones, ports, services, and other related system aspects. We will also talk about traffic control where we learn how we can allow traffic from one IP to a port, how to allow traffic from a list of IPs (whitelisting), and how to create a list of IPs we do not want to have access (blacklisting), etc. After firewalld, we will move on to SELinux. SELinux is a tool that allows fine control over access to files, controls, processes, or other things on the system. It is used by practically all Red Hat-based distributions. In this section, we will start off by talking about SElinux states, the SELinux context, and context adjustments. We will then go over some useful commands that enable us to list restricted ports and protocols, talk about booleans, port labels, SELinux modules, and logs. Later on in the course, we will also have a section dedicated to firewalld and SElinux automated scripts. When we have learned the basics of firewalld and SELinux, we will move on to learn about server access and authentication configuration. At this point, we are going to play around with access to the system. In addition to doing some base configuration by just changing the default port we use to connect via an SSH service port, we will also perform changes such as adding extra layers of authentication and creating a jump point server which is similar to a VPN with SSH. We will show how to set up different authentication methods to work simultaneously: standard key-based authentication, password-based authentication, plus a third layer of authentication where we integrate Google Authenticator. We will need our phone in order to log in to the server. This significantly improves our security since it is highly unlikely someone has access to our key, our phone, and our password. We will also get acquainted with jump points. We show what jump points are and what they are used for. A jump point is a place where we connect. It allows us to connect to the rest of our infrastructure. They can greatly improve the security of our front-facing and infrastructure servers. Furthermore, we also talk about seccomp (Secure Computing Mode). This is an important tool that we will use along with containers and properly impose some additional limitations. We use it to restrict system calls. Basically, it participates in jailing a process and limiting what can be done from the process itself. It gives us the ability to dictate what the process cannot do. After dealing with seccomp, we will move on to a section regarding logs, where we will learn some useful commands to help navigate through large log files. We will also learn about notification systems. In the last section of the course, we will talk about vulnerability scans and reports.

Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Provides knowledge regarding firewalld, which is a widely used Linux tool for managing iptables
Covers SELinux, a powerful tool that allows fine control over access to files, controls, processes, or other things on the system
Discusses advanced topics such as seccomp (Secure Computing Mode), which is important for imposing additional limitations and restricting system calls
Explores various server access and authentication configuration techniques, enhancing the security of systems
Teaches the use of logs and notification systems, which are essential for monitoring and maintaining secure systems
Covers vulnerability scans and reports, emphasizing the importance of identifying and addressing potential security risks

Save this course

Save Secure Container Host Operating System to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Secure Container Host Operating System. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Secure Container Host Operating System will develop knowledge and skills that may be useful to these careers:
IT Auditor
IT Auditors are responsible for assessing the security of computer systems. This course may be useful for IT Auditors because it provides a strong foundation in the security mechanisms of operating systems, including firewalls and SELinux.
Information Security Analyst
Information Security Analysts are responsible for identifying and mitigating security risks to an organization's information systems. This course may be useful for Information Security Analysts because it provides a strong foundation in the security mechanisms of operating systems, including firewalls and SELinux.
DevOps Engineer
DevOps Engineers are responsible for bridging the gap between development and operations teams. This course may be useful for DevOps Engineers because it provides a strong foundation in the security mechanisms of operating systems, including firewalls and SELinux.
Security Analyst
Security Analysts are responsible for monitoring and analyzing security data to identify and mitigate security threats. This course may be useful for Security Analysts because it provides a strong foundation in the security mechanisms of operating systems, including firewalls and SELinux.
Network Security Engineer
Network Security Engineers are responsible for implementing, monitoring, and maintaining the security of computer networks. This course may be useful for Network Security Engineers because it provides a strong foundation in the security mechanisms of operating systems, including firewalls and SELinux.
Security Consultant
Security Consultants are responsible for providing security advice and guidance to organizations. This course may be useful for Security Consultants because it provides a strong foundation in the security mechanisms of operating systems, including firewalls and SELinux.
Incident Responder
Incident Responders are responsible for responding to security incidents. This course may be useful for Incident Responders because it provides a strong foundation in the security mechanisms of operating systems, including firewalls and SELinux.
Cybersecurity Engineer
Cybersecurity Engineers are responsible for designing and implementing security measures to protect an organization's information systems. This course may be useful for Cybersecurity Engineers because it provides a strong foundation in the security mechanisms of operating systems, including firewalls and SELinux.
System Administrator
System Administrators are responsible for managing and maintaining computer systems. This course may be useful for System Administrators because it provides a strong foundation in the security mechanisms of operating systems, including firewalls and SELinux.
Cloud Security Engineer
Cloud Security Engineers are responsible for securing cloud computing environments. This course may be useful for Cloud Security Engineers because it provides a strong foundation in the security mechanisms of operating systems, including firewalls and SELinux.
Penetration Tester
Penetration Testers are responsible for identifying security vulnerabilities in computer systems. This course may be useful for Penetration Testers because it provides a strong foundation in the security mechanisms of operating systems, including firewalls and SELinux.
Security Architect
Security Architects are responsible for designing and implementing security measures to protect an organization's information systems. This course may be useful for Security Architects because it provides a strong foundation in the security mechanisms of operating systems, including firewalls and SELinux.
Security Researcher
Security Researchers are responsible for developing new security technologies and techniques. This course may be useful for Security Researchers because it provides a strong foundation in the security mechanisms of operating systems, including firewalls and SELinux.
Threat Intelligence Analyst
Threat Intelligence Analysts are responsible for collecting and analyzing threat intelligence to identify and mitigate security threats. This course may be useful for Threat Intelligence Analysts because it provides a strong foundation in the security mechanisms of operating systems, including firewalls and SELinux.
Security Manager
Security Managers are responsible for overseeing the security of an organization's information systems. This course may be useful for Security Managers because it provides a strong foundation in the security mechanisms of operating systems, including firewalls and SELinux.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Secure Container Host Operating System.
Offers a structured overview of SELinux and firewalld, which are essential tools for securing Linux systems. By covering the basic concepts, configuration, and troubleshooting of these tools, this book will help you gain a strong foundation in securing Red Hat Enterprise Linux systems.
Provides a deep dive into securing and hardening Linux systems. With a focus on real-world scenarios and practical examples, this book covers the same topics as the course and can be used as a supplementary resource for additional depth and context.
For those who want to delve deeper into firewall management on Linux systems, this book offers a comprehensive overview of firewalld, the default firewall for many Linux distributions.
This comprehensive handbook covers all aspects of Linux administration, including security. It provides a reference for both basic and advanced system administration tasks and can be a valuable resource for those looking to manage Linux systems in a secure manner.
Is not specifically related to Linux security, but it provides valuable insights into secure coding practices that are applicable to any programming language, including those used in Linux environments.
While not directly related to securing Linux systems, this book provides an understanding of the techniques and tools used by attackers. By understanding how attackers operate, you can better defend against potential threats.
This classic textbook provides a comprehensive overview of computer security, covering both theoretical concepts and practical applications. It valuable reference for anyone looking to gain a deeper understanding of the field.
While this book focuses specifically on cloud security, it provides valuable insights into security practices that are applicable to any cloud environment, including those used for hosting Linux containers.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser