Linux Security Hardening Training
Linux Security hardening Training
General Security
Is Linux Secure?
What Makes Linux Secure?
Security Guidelines and Principles
Physical Security
Physical Security Concepts
Single User Mode Security
Single User Mode and Blank Passwords
Securing the Boot Loader
Disk Encryption
banner Grabbing
Terminal security
Auto login concept
Encrypting an Existing Device
Disabling Control Alt Delete
Account Security
USB Security
Intro to PAM
PAM Configuration Example
Password Security
Account Security Demo #1 (UID 0)
Controlling Account Access
Security by Account Type
Account Security Demo (Sudo)
Network Security
Securing SSHD, Part I
Securing SSHD, Part II
Securing Telnet server
Securing Apache Server (Password Protection)
Web Server proxy
Security Through Web Proxy
Time based Security on a Web server
Proxy server for Telnet
Custom Telnet Server
TFTP server Security
FTP Server Security
Mail Server Architecture and Loopholes
Linux Firewall Fundamentals
Configuring the Firewall from the Command Line
Firewall Rule Specifications
Example Firewall Rules
Linux Firewall Demonstration(Iptables and UFW)
Linux Firewalls
TCP Wrappers, Basic rules
TCP Wrappers, Advance Rules
Network Based Security
IP Based security
Connection Based security
Load Based security
Time Based security
Connection Per Second Based Security
File System Security
File System Upgrade
File Security using VIM Editor
File and Directory Permissions, Intro
File and Directory Permissions, Character Method
File and Directory Permissions, Numeric Method
File Attributes
File Attributes Demo
ACLs
ACLs Demo
Rootkits
Rootkit Scanning ,detection and removal
Malware detection and Removal
Antivirus Configuration and scanning Linux server
Linux System Audits