Linux admin with Security
Linux Server Administration
Installation
Lab setup in Virtualbox
Network setup in VirtualBox
Basic Linux commands
File and Folder Management
hard link and symbolic link
Editors in Ubuntu Linux
cut/copy/paste in Linux
user management in Linux
Understanding /etc/passwd and /etc/shadow
group management in Linux
Permissions in Linux
ACL
Disk Management
Understanding /etc/fstab
swap memory
lvm management
raid
loop devices
Package Management
Memory Management
Process Management
Networking in Ubuntu Linux
setting hostnames
managing network interfaces
static ip address assignement
SSH Server Configuration and Management
Telnet Server Configuration and Management
CHAT Server Configuration
Proxy Server Configuration
Chainproxy Configuration and Management
File Tranfer through SCP
NFS: File Sharing using NFS
http Apache web server configuration
HTTP Proxy Server Configuration Lab
Apache Virtual Hosting
MariaDB
Sendmail server Configuration Lab
Postfix mail server configuration Lab
Exim Email server configuration Lab
Social engineering
Port Scanning
Host To IP DNS Enumeration
WordPress hacking
different CMS scanning and Hacking
Rootkit Scanning and removal
Malware Analysis and detection
Antivirus configuration in Linux
Linux System Audit
Firewall installation
Firewall Configuration
Firewall rules and tricks
Firewall Backup and Restore
Cryptography
Openssl
Puplic key and private Key lab
Create Self signed CA Certificate
Physical Security
Physical Security Concepts
Single User Mode Security
Single User Mode and Blank Passwords
Securing the Boot Loader
Disk Encryption
File Attributes
File Attributes Demo
Kernel based Security
Selinux Policy
Firewall
Iptables
Firewalld
UFW
CSF
tcpwrapper
Terminal Locking or Terminal Security
Grub Security simple Text Security
Grub Security using encrypted password
BIOS Security
USB security
PAM Based Security
Connection Based Security
Network Based Security
IP Based Security
Time based Security
Load Based Security
Connection Based Security
chmod/chgrp/chown
Virtual File system
Attributes in Linux and Windows
Hard Drive Security
Locking/Unlocking Users
Auto-login Setup inside Linux Servers
Password Algorithm and Implementation
Umask
Compression/Decompression with password Protection
Methods of Encryption Decryption over compressed File.
VIM Security
Soft Linking and Hard Linking
File Breaking and joining
OS PAssword Cracking
Password Bypass
Unauthorized access of File System
Hacking Linux Machine Password
Browser Configuration
Browser security
Hard Disk Wiping
Disk Zeroing
host security
port security
user security
console security
Desktop security
command Line security
USB firewall
USB security
Hard Disk Cloning
Email security