Linux Security Hardening Training


Linux Security hardening Training

General Security

Is Linux Secure?

What Makes Linux Secure?

Security Guidelines and Principles

Physical Security

Physical Security Concepts

Single User Mode Security

Single User Mode and Blank Passwords

Securing the Boot Loader

Disk Encryption

banner Grabbing

Terminal security

Auto login concept

Encrypting an Existing Device

Disabling Control Alt Delete

Account Security

USB Security

Intro to PAM

PAM Configuration Example

Password Security

Account Security Demo #1 (UID 0)

Controlling Account Access

Security by Account Type

Account Security Demo (Sudo)

Network Security

Securing SSHD, Part I

Securing SSHD, Part II

Securing Telnet server

Securing Apache Server (Password Protection)

Web Server proxy

Security Through Web Proxy

Time based Security on a Web server

Proxy server for Telnet

Custom Telnet Server

TFTP server Security

FTP Server Security

Mail Server Architecture and Loopholes

Linux Firewall Fundamentals

Configuring the Firewall from the Command Line

Firewall Rule Specifications

Example Firewall Rules

Linux Firewall Demonstration(Iptables and UFW)

Linux Firewalls

TCP Wrappers, Basic rules

TCP Wrappers, Advance Rules

Network Based Security

IP Based security

Connection Based security

Load Based security

Time Based security

Connection Per Second Based Security

File System Security

File System Upgrade

File Security using VIM Editor

File and Directory Permissions, Intro

File and Directory Permissions, Character Method

File and Directory Permissions,  Numeric Method

 

File Attributes

File Attributes Demo

ACLs

ACLs Demo

Rootkits

Rootkit Scanning ,detection and removal

Malware detection and Removal

Antivirus Configuration and scanning Linux server

Linux System Audits

 

Advertisement