JOIN THE OTHER 40,000 SUCCESSFUL STUDENTS WHO HAVE ALREADY MASTERED THE LINUX OPERATING SYSTEM WITH ONE OF MY TOP RATED COURSES!
Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers!
This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step.
Hello. My name is Jason Cannon and I'm the author of Linux Administration, the founder of the Linux Training Academy, and an instructor to thousands of satisfied students. I started my IT career in the late 1990's as a Unix and Linux System Engineer. I've worked for many technology companies who take information security seriously. I've even worked for security firms such as Mandiant and FireEye. I'll be sharing my real-world Linux security experience with you throughout this course.
By the end of this course you will be able to tighten up the security on any Linux system. You'll learn the security weaknesses of the Linux operating system and be given step-by-step instructions on how to protect those weaknesses. You'll even learn some security concepts that apply to information security as a whole while focusing on the Linux specific issues that require special consideration.
What People Are Saying About Jason and his Courses:
“Excellent course on Linux! It is the best way to get started using Linux that I have come across.” –Chris Bischoff
“This class was a great review of the 2 Linux classes I took in school. I learned plenty of new stuff and got a great refresher on things I haven't used in some time. I did well on my interview and got the job I was looking for. Thanks!” –Alan Derrick
“This was a great course! Learned a lot from it!” –Ricardo José Crosara Juniorstudent
“Excellent starter course. Very good and complete guide to get you started on working on Linux.” –Brian Mulder
“Great course! Easy to understand for beginners and a great refresher for experienced users!” –Spencer Ball
“Very well laid out course. Thanks Jason!” –Eric Etheredge
“Love it… it's absolutely one of the best courses I've taken.” –Idriss N
“Awesome Course! Another great one. Thanks Jason!” –John Wilmont
“Excellent Course! Having come from a moderate understanding of Linux, this course has given me a deeper and more streamlined understanding of Linux. Definitely worth the money.” –Armando Cabrera
“Fantastic course and very beautifully explained.” –S John
“Great course, great instructor. I enjoyed every minute of it. I recommend this course 100%.” –Alfredo
“I am lovin' it. Nice way to begin one's journey into Linux.” –Rohit Gupta
____________________
Here is just some of what you will learn by taking this Linux Security and Hardening course:
- How to protect your Linux systems against hackers.
- Ways to prevent attackers from breaking into your systems, even when they have physical access to your machine.
- How to enforce strong password policies and control password as well as account aging policies on your Linux servers.
- SSH Hardening practices.
- Network security tactics.
- Port scanning and network service detection.
- How the Linux firewall works and exactly how to configure it.
- How to protect the superuser (root) account.
- Ways to share accounts securely with an audit trail.
- File system security and encryption.
- Using and configuring sudo, and why you need to.
- Advanced Linux permissions include special modes, file attributes, and access control lists (ACLs).
- Much, much more!
- Unconditional 30 day money-back guarantee – that's my personal promise of your success!
What you learn in course applies to any Linux environment or distribution including Ubuntu, Debian, Linux Mint, RedHat, CentOS, Fedora, OpenSUSE, Slackware, Kali Linux and more.
____________________
Free Bonus – PDFs of All the Material Covered
As an added bonus for enrolling in this Linux Server Security video training course, you'll receive access to all the slides used in the lessons. You can download them and refer to them when you want to jog your memory or double-check your work.
Enroll now and start learning the skills you need to hack-proof your Linux systems today!
Enroll Now
30-Day Money-Back Guarantee
Full Lifetime Access
Course Overview and Downloads
Lesson 2 of 2 within section Course Overview and Downloads.
You must enroll in this course to access course content.
General Security
Section Overview – General Security
Lesson 1 of 6 within section General Security.
You must enroll in this course to access course content.
Lesson 2 of 6 within section General Security.
You must enroll in this course to access course content.
Lesson 3 of 6 within section General Security.
You must enroll in this course to access course content.
Security Guidelines and Principles
Lesson 4 of 6 within section General Security.
You must enroll in this course to access course content.
Section Summary – General Security
Lesson 5 of 6 within section General Security.
You must enroll in this course to access course content.
Linux Security: Quiz 1 – General Security Principles
Lesson 6 of 6 within section General Security.
You must enroll in this course to access course content.
Has Quiz
Physical Security
Section Overview – Physical Security
Lesson 1 of 12 within section Physical Security.
You must enroll in this course to access course content.
Physical Security Concepts
Lesson 2 of 12 within section Physical Security.
You must enroll in this course to access course content.
Single User Mode Security
Lesson 3 of 12 within section Physical Security.
You must enroll in this course to access course content.
Single User Mode and Blank Passwords
Lesson 4 of 12 within section Physical Security.
You must enroll in this course to access course content.
Lesson 5 of 12 within section Physical Security.
You must enroll in this course to access course content.
Lesson 6 of 12 within section Physical Security.
You must enroll in this course to access course content.
Encrypting a New Device, Part I
Lesson 7 of 12 within section Physical Security.
You must enroll in this course to access course content.
Encrypting a New Device, Part II
Lesson 8 of 12 within section Physical Security.
You must enroll in this course to access course content.
Encrypting an Existing Device
Lesson 9 of 12 within section Physical Security.
You must enroll in this course to access course content.
Disabling Control Alt Delete
Lesson 10 of 12 within section Physical Security.
You must enroll in this course to access course content.
Section Summary – Physical Security
Lesson 11 of 12 within section Physical Security.
You must enroll in this course to access course content.
Linux Security: Quiz 2 – Physical Security
Lesson 12 of 12 within section Physical Security.
You must enroll in this course to access course content.
Has Quiz
Account Security
Section Overview – Account Security
Lesson 1 of 10 within section Account Security.
You must enroll in this course to access course content.
Lesson 2 of 10 within section Account Security.
You must enroll in this course to access course content.
PAM Configuration Example
Lesson 3 of 10 within section Account Security.
You must enroll in this course to access course content.
Lesson 4 of 10 within section Account Security.
You must enroll in this course to access course content.
Account Security Demo #1 (UID 0)
Lesson 5 of 10 within section Account Security.
You must enroll in this course to access course content.
Controlling Account Access
Lesson 6 of 10 within section Account Security.
You must enroll in this course to access course content.
Lesson 7 of 10 within section Account Security.
You must enroll in this course to access course content.
Lesson 8 of 10 within section Account Security.
You must enroll in this course to access course content.
Account Security Demo #3 (Sudo)
Lesson 9 of 10 within section Account Security.
You must enroll in this course to access course content.
Linux Security: Quiz 3 – Account Security
Lesson 10 of 10 within section Account Security.
You must enroll in this course to access course content.
Has Quiz
Network Security
Section Overview – Network Security
Lesson 1 of 14 within section Network Security.
You must enroll in this course to access course content.
Lesson 2 of 14 within section Network Security.
You must enroll in this course to access course content.
Network Security, Part II
Lesson 3 of 14 within section Network Security.
You must enroll in this course to access course content.
Lesson 4 of 14 within section Network Security.
You must enroll in this course to access course content.
Lesson 5 of 14 within section Network Security.
You must enroll in this course to access course content.
Linux Firewall Fundamentals
Lesson 6 of 14 within section Network Security.
You must enroll in this course to access course content.
Configuring the Firewall from the Command Line
Lesson 7 of 14 within section Network Security.
You must enroll in this course to access course content.
Firewall Rule Specifications
Lesson 8 of 14 within section Network Security.
You must enroll in this course to access course content.
Lesson 9 of 14 within section Network Security.
You must enroll in this course to access course content.
Linux Security: Quiz 4 – Linux Firewalls
Lesson 11 of 14 within section Network Security.
You must enroll in this course to access course content.
Has Quiz
Lesson 12 of 14 within section Network Security.
You must enroll in this course to access course content.
Lesson 13 of 14 within section Network Security.
You must enroll in this course to access course content.
Linux Security: Quiz 5 – Network Security
Lesson 14 of 14 within section Network Security.
You must enroll in this course to access course content.
Has Quiz
File System Security
Section Overview – File System Security
Lesson 1 of 13 within section File System Security.
You must enroll in this course to access course content.
File and Directory Permissions, Intro
Lesson 2 of 13 within section File System Security.
You must enroll in this course to access course content.
File and Directory Permissions, Part I
Lesson 3 of 13 within section File System Security.
You must enroll in this course to access course content.
File and Directory Permissions, Part II
Lesson 4 of 13 within section File System Security.
You must enroll in this course to access course content.
Lesson 5 of 13 within section File System Security.
You must enroll in this course to access course content.
Lesson 6 of 13 within section File System Security.
You must enroll in this course to access course content.
Lesson 7 of 13 within section File System Security.
You must enroll in this course to access course content.
Lesson 8 of 13 within section File System Security.
You must enroll in this course to access course content.
Lesson 9 of 13 within section File System Security.
You must enroll in this course to access course content.
Lesson 10 of 13 within section File System Security.
You must enroll in this course to access course content.
Lesson 11 of 13 within section File System Security.
You must enroll in this course to access course content.
Rootkit Hunter Demonstration
Lesson 12 of 13 within section File System Security.
You must enroll in this course to access course content.
Rootkit Detection Software
Lesson 13 of 13 within section File System Security.
You must enroll in this course to access course content.
Additional Security Resources
Additional Security Resources
Lesson 1 of 5 within section Additional Security Resources.
You must enroll in this course to access course content.
Lesson 2 of 5 within section Additional Security Resources.
You must enroll in this course to access course content.
Linux Security Email Lists
Lesson 3 of 5 within section Additional Security Resources.
You must enroll in this course to access course content.
Lesson 4 of 5 within section Additional Security Resources.
You must enroll in this course to access course content.
Security Conference Videos
Lesson 5 of 5 within section Additional Security Resources.
You must enroll in this course to access course content.