17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Complete Linux Security & Hardening With Practical Examples
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
If you have basic understanding of Linux and want to enhance your skill in Linux security and system hardening then this course is perfect fit for you. Many security policies and standards require system administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. This course provides strategies for addressing specific policy and configuration concerns.
This course is intended to develop the skills needed to ensure data integrity on computer systems for organizations with high security standards.
I have 35,000+ students on Udemy platform and many of them are able to secure their dream job in IT field just by taking my courses. I always start with basic and then dive into advance level
This course is best for someone who:
wants to learn almost everything about Linux security wants to step-up in his/her career is looking for a job in Linux needs technical guidance on how to enhance the security of Linux systems is responsible for implementing security policy requirements on Linux systems consistently and in a reproducible way must be able to demonstrate that Linux systems meet security policy requirements maintains continued adherence to security requirements, including management of security-critical operating system/software updates ========================================
Overview of the course:
There are total of 10 sections in this course
Section 1 – Introduction and Course Overview
Course Overview Download Syllabus
Section 2 – Security Concepts
What is Security and OS Hardening? Comparing House Security with Computer Security Securing All Operating Systems Importance of Linux Security Security Implementation Tools Type of Security Breach Quiz, Handouts and Homework
Section 3 – Lab Setup (optional)
What is VirtualBox? Installing Oracle VirtualBox Creating First Virtual Machine Linux Installation
Section 4 – Securing User Environment
Understanding /etc/passwd, /etc/group and /etc/shadow The /etc/login.def File Create User Account and Change Password Change Password Parameters Set Password Policy Lock or Disable User Accounts Automatically Lock or Disable User Accounts Manually Lock User Account After 3 Failed Attempts Restrict root Login Disable SSH Access for a Specific User Implement UID/GID Policy Centralized Authentication Service sudo Access Monitor User Activity
Section 5 – PAM (Pluggable Authentication Module)
What is PAM? The Importance of PAM The PAM Configuration Files Format PAM Config File – Module Interfaces Account Access Through PAM PAM Config File – Control Flags PAM Config File – Modules (SO) PAM Aware Services and Stacks
Section 6 – Securing Linux Filesystem
Linux File Types Linux File Attributes Linux File Ownership and Permissions Changing File Permission Changing File Ownership Access Control List (ACL)
Section 7 – Securing Linux System
Message of the Day and customizing message of the day Physical Server Security Remove Unnecessary or Orphan Packages Keep Kernel and System Up to Date Stop and Disable Unwanted Services Separate Disk Partitions Disable Ctrl+Alt+Delete Running One Service per System Change Default Console Passwords Disable USB Stick Detection Enable Network Time Protocol (NTP or Chronyd) Lockdown Cronjobs Change SSH Ports SELinux (longest lecture and lab) Backups
Section 8 – Securing Linux System Network
Introduction to Firewall iptables (tables, chains and targets) iptables (practical examples) Firewall (firewalld) firewalld (Practical Examples) firewalld (GUI) Encrypt Incoming and Outgoing Traffic SSH vs. Telnet Turn Off IPV6 (If not in use)
Many more lectures on Linux… ========================================
Here is the testimonial from my students:
To all of you that are looking for a REALLY GOOD LINUX course, THIS IS IT, SERIOUSLY I promise you won’t find a course on LINUX here that is THIS GOOD. — T.J. Marstiller (Udemy Student)
Imran is a very knowledgeable and engaging instructor. As others have said, you can tell that he is not just trying to sell a course, but that he is invested in giving his students a strong career foundation with a positive and approachable attitude. He is also entertaining with his use of pop culture and practical work examples. It really feels like you’re in a classroom with him. I’m taking this course mainly as a hobbyist, but got a lot from it already. The homework assignments, quizzes, and handouts help reinforce the material. — Raymond B. (Udemy Student)
Main thing about course is its simplicity and the hierarchy. Design is very good and easy which helps to understand things better. — Akash Garg (Udemy Student)
I just love the teaching ad the learning experience I am getting — Jacob Samba (Udemy Student)
Imran Afzal might be my favorite teacher I’ve EVER had. He is funny, and engaging. The course was easy to follow, and with no experience starting I am now extremely comfortable with Linux, and actually really like it. He does make you do your googles, but this is not a bad thing especially considering the nature of IT and documentation to solve your own problems. I highly recommend. — Vanessa Diaz-Goumond (Udemy Student)
The course is run very well and I really like the handouts and the homework that is assigned. The homework helps me learn and continue with the learning process even when adult life is still progressing forward. — Thomas Rogers (Udemy Student)
Such an amazing instructor. Imran must have put in a lot of effort in structuring the course and taking the student step by step, he takes his time in explaining everything, from what Linux is, how to down load it, coding, etc. I have taken other courses from Imran. I am a student for life. Keep it up and please keep preparing more courses for please like us who can benefit from your way of teaching, knowledge and experience. Thank you. — Ali Shiekh (Udemy Student)
In the first place I say a big thank you to the instructor for making such a great course. I was afraid to learn Linux. I now feel very comfortable with Linux. I have understood both the concept behind and the practical as well. I would recommend every one who is NEW to Linux and wants to grab it once and for all without wasting time to go ahead and ENROLL. You will not regret it. I would like the instructor to do same for WINDOWS SERVER ADMIN., I don’t seem to find any better and beginner oriented course out there that could be matched with this course. To me, it is the BEST Linux Course on Online. I just started some real world projects with Linux after this great course, I was new to Linux and in just a month I am on the command line always playing. — Opoku Bright (Udemy Student)
I genuinely look forward to additional courses in the future. This has been so informative. You hear the name oracle all the time, but this was well put in layman’s terms — Atoofa Hasan (Classroom Student)
Imran Afzal eats, breathes and sleeps Linux! He really knows his stuff. I feel like he has brought me from a novice level education to masters level in a short time period. Anyone who is looking to get a job in Linux should definitely take this course. — TJ Walker (Udemy Student)
Who this course is for:
Anyone who wants to have complete understanding Linux security and OS hardening Anyone who wants to advance his/her career Anyone who wants to pass the RHCE EX300 exam
Requirements
Basic understanding of Linux. My suggestion is to take my “Complete Linux Training Course to Get Your Dream IT Job” You will need a Linux machine but if you have a Windows computer then you can install VirtualBox and install Linux (The instruction are covered in this course)
Last Updated 8/2020
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
TutsNode.com.txt
63 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/10. Additional Resources/1. Welcome to Additional Resources.srt
0 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/10. Additional Resources/26. Securing Linux Machine - Quick Recap.mp4
241.8 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/11. Bonus Section/1. Welcome to Bonus Section.srt
0 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/1. Welcome to Security Concepts.srt
0 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/10. Homework.html
49 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/2. What is Security and OS Hardening.mp4
19.6 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/2. What is Security and OS Hardening.srt
5.6 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/3. Comparing House Security with Computer Security.mp4
21.4 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/3. Comparing House Security with Computer Security.srt
4.7 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/4. Securing All Operating Systems.mp4
8.8 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/4. Securing All Operating Systems.srt
4 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/5. Importance of Linux Security.mp4
19.5 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/5. Importance of Linux Security.srt
7.1 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/6. Security Implementation Tools.mp4
20.4 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/6. Security Implementation Tools.srt
6.7 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/7. Type of Security Breach.mp4
11 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/7. Type of Security Breach.srt
4.9 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/8. Quiz.html
168 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/9. Handouts.html
35 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/9.1 3-Security Implementation Measures or Tools.pdf
261.5 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/9.2 2-Importance of Linux Security.pdf
242.7 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/9.3 1-Introduction to Computer Security.pdf
224.5 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/9.4 4-15 Other Linux Security Tools.pdf
39.1 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/2. Security Concepts/9.5 5-Types of Cyber Security Breach.pdf
213.7 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/1. Welcome to Lab Setup.mp4
10.4 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/1. Welcome to Lab Setup.srt
3.6 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/2. What is Oracle VirtualBox.mp4
9.1 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/2. What is Oracle VirtualBox.srt
2.3 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/3. Downloading and Installing Oracle VirtualBox.mp4
31.7 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/3. Downloading and Installing Oracle VirtualBox.srt
7.3 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/4. Creating First Virtual Machine.mp4
22.5 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/4. Creating First Virtual Machine.srt
6.8 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/5. Linux CentOS7 Installation (Recommended).mp4
111 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/5. Linux CentOS7 Installation (Recommended).srt
31.7 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/6. Linux CentOS8 Installation (Optional).mp4
104.2 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/6. Linux CentOS8 Installation (Optional).srt
28.6 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/7. Quiz.html
168 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/8. Handouts.html
34 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/8.1 4-Red_Hat_Enterprise_Linux-7-Installation_Guide-en-US.pdf
11 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/8.2 2-Oracle Virtual Box User Manual.pdf
4.2 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/8.3 3-CentOS Installation Guide.pdf
3.6 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/8.4 1-Changing-from-32-to-64bit.pdf
159.4 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/9. Homework.html
1 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/3. Lab Setup/9.1 Section 3 - Homework.pdf
219.2 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/1. Welcome to Securing User Environment.mp4
462.2 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/1. Welcome to Securing User Environment.srt
0 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/10. Lock or Disable User Accounts Manually.mp4
49.3 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/10. Lock or Disable User Accounts Manually.srt
8.4 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/11. Lock User Account After 3 Failed Attempts.mp4
67.3 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/11. Lock User Account After 3 Failed Attempts.srt
10.1 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/12. Restrict root Login.mp4
35.7 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/12. Restrict root Login.srt
8.7 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/13. Disable SSH Access for a Specific User.mp4
26.2 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/13. Disable SSH Access for a Specific User.srt
5.8 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/14. Limiting User Account Resources (ulimit).mp4
91 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/14. Limiting User Account Resources (ulimit).srt
17.4 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/14.1 Parameters in limits.conf.pdf
80.5 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/15. Implement UIDGID Policy.mp4
46 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/15. Implement UIDGID Policy.srt
7.8 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/16. Centralized Authentication Service.mp4
21.7 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/16. Centralized Authentication Service.srt
5.5 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/17. sudo Access.mp4
105 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/17. sudo Access.srt
21.2 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/18. Monitor User Activity.mp4
173.1 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/18. Monitor User Activity.srt
26.6 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/19. Quiz.html
168 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/2. Understanding etcpasswd.mp4
59.9 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/2. Understanding etcpasswd.srt
11.2 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/20. Homework.html
1.5 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/21. Handouts.html
44 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/21.1 Disable Root Account in Linux.pdf
267.8 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/21.2 Switch-users-and-Sudo-Access.pdf
202.7 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/21.3 Set Password Policy.pdf
362.6 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/21.4 Red_Hat_Enterprise_Linux-7-System_Administrators_Guide-en-US.pdf
5.8 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/21.5 User Account Management.pdf
135.4 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/21.6 1-Understanding etc.passwd File.pdf
219.6 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/21.7 Passwords Standards.pdf
121.1 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/3. Understanding etcgroup.mp4
22.2 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/3. Understanding etcgroup.srt
6.4 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/4. Understanding etcshadow.mp4
53.1 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/4. Understanding etcshadow.srt
8.1 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/5. The etclogin.defs File.mp4
32.2 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/5. The etclogin.defs File.srt
6.6 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/6. Create User Account and Change Password.mp4
58.1 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/6. Create User Account and Change Password.srt
10.3 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/7. Change Password Parameters.mp4
66.7 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/7. Change Password Parameters.srt
9.3 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/8. Set Password Policy.mp4
116.2 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/8. Set Password Policy.srt
12.9 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/9. Lock or Disable User Accounts.mp4
43.1 MB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/4. Securing User Environment/9. Lock or Disable User Accounts.srt
8.8 KB
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/5. PAM (Pluggable Authentication Module)/1. Welcome to PAM.srt
0 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/6. Securing Linux Filesystem/1. Welcome to Securing Linux Filesystem.srt
0 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/7. Securing Linux System/1. Welcome to Securing Linux System.srt
0 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/8. Securing Linux System Network/1. Welcome to Securing Linux Network.srt
0 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/9. Securing Environment Around Linux/1. Welcome to Securing Environment Around Linux.srt
0 B
[TutsNode.com] - Complete Linux Security & Hardening with Practical Examples/9. Securing Environment Around Linux/10. Congratulations.srt