17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Linux Security For Beginners
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
This course is designed for those who want to learn and make their career in Linux security. You’ll learn how you can secure your Linux infrastructure and detect and prevent intrusion. You’ll also get in-depth knowledge of multiple tools and technologies used for Linux security in this course. With the number of cyberattacks increasing everyday infrastructure security is a very promising field. The number of jobs in Linux infrastructure and security is rising at a rapid pace and With our expert-curated comprehensive modules, you’ll get a chance to explore & learn the latest security and Linux.
Major Topics Covered
Introduction to Linux Security X.509 Certificates and Public Key Infrastructures X.509 Certificates for Encryption, Signing, and Authentication Encrypted File Systems DNS and Cryptography Host Hardening Host Intrusion Detection Resource Control Discretionary Access Control Mandatory Access Control Network Security Network Intrusion Detection Packet Filtering Virtual Private Networks
Why should you take this course?
This course will give you in-depth information on Linux security and tools that can be effectively used to create safe and reliable web apps. Linux is an open-source that can be used with multiple security tools and techs. If you’re going to start your journey to be a Security Specialist this is the course you should go for.
Expert-curated course material In-depth sessions of Linux essentials Security experts as instructors
Who this course is for:
Any one who wants to learn Linux security will find this course very useful
Requirements
Basic knowledge of Linux is required for completing the course
Last Updated 3/2022
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
.pad/0
35 B
.pad/1
90 B
.pad/2
63 B
.pad/3
154 B
.pad/4
115 B
.pad/5
48 B
TutsNode.com.txt
63 B
[TutsNode.com] - Linux Security for Beginners/10. Mandatory Access Control/1.1 Mandatory Access Control.zip
212 KB
[TutsNode.com] - Linux Security for Beginners/10. Mandatory Access Control/2. Understand the concepts of type enforcement, MAC and RBAC.srt
10.7 KB
[TutsNode.com] - Linux Security for Beginners/10. Mandatory Access Control/3. SELinux Basics.srt
7.8 KB
[TutsNode.com] - Linux Security for Beginners/10. Mandatory Access Control/4. SELinux Policies.srt
6.8 KB
[TutsNode.com] - Linux Security for Beginners/10. Mandatory Access Control/5. SELinux Booleans.srt
7 KB
[TutsNode.com] - Linux Security for Beginners/10. Mandatory Access Control/6. SELinux Managing Users and Ports.srt
14.8 KB
[TutsNode.com] - Linux Security for Beginners/10. Mandatory Access Control/7. Setting up AppArmor.srt
7.5 KB
[TutsNode.com] - Linux Security for Beginners/10. Mandatory Access Control/8. Configuring AppArmor Rules.srt
12.4 KB
[TutsNode.com] - Linux Security for Beginners/11. Network Security/1.1 Network Security.zip
305.8 KB
[TutsNode.com] - Linux Security for Beginners/11. Network Security/2. Fundamentals of Network Security.srt
10.5 KB
[TutsNode.com] - Linux Security for Beginners/11. Network Security/3. Configuration of FreeRADIUS for network node authentication.mp4
109 MB
[TutsNode.com] - Linux Security for Beginners/11. Network Security/3. Configuration of FreeRADIUS for network node authentication.srt
14.4 KB
[TutsNode.com] - Linux Security for Beginners/11. Network Security/4. Using Wireshark and tcpdump to analyze network traffic.mp4
127 MB
[TutsNode.com] - Linux Security for Beginners/11. Network Security/4. Using Wireshark and tcpdump to analyze network traffic.srt
16.3 KB
[TutsNode.com] - Linux Security for Beginners/11. Network Security/5. Using Wireshark and tcpdump to analyze network traffic (PART 2).srt
11.4 KB
[TutsNode.com] - Linux Security for Beginners/11. Network Security/6. Analysis and identification of rouge router advertisements and DHCP messages.srt
8.8 KB
[TutsNode.com] - Linux Security for Beginners/12. Network Intrusion Detection/1.1 Network Intrusion Detection.zip
390.6 KB
[TutsNode.com] - Linux Security for Beginners/12. Network Intrusion Detection/2. Implementation of bandwidth usage monitoring.srt
6.6 KB
[TutsNode.com] - Linux Security for Beginners/12. Network Intrusion Detection/3. How to configure Snort.mp4
115.4 MB
[TutsNode.com] - Linux Security for Beginners/12. Network Intrusion Detection/3. How to configure Snort.srt
14.6 KB
[TutsNode.com] - Linux Security for Beginners/12. Network Intrusion Detection/5. Understanding Vulnerability Scanners.srt
7.5 KB
[TutsNode.com] - Linux Security for Beginners/13. Packet Filtering/1.1 Packet Filtering.zip
581.3 KB
[TutsNode.com] - Linux Security for Beginners/13. Packet Filtering/2. Common Firewall Architectures.srt
10.1 KB
[TutsNode.com] - Linux Security for Beginners/13. Packet Filtering/3. Using iptables.srt
14.3 KB
[TutsNode.com] - Linux Security for Beginners/13. Packet Filtering/4. Fundamentals of Connection tracking.srt
8.7 KB
[TutsNode.com] - Linux Security for Beginners/14. Virtual Private Networks/2. Understanding the principles of VPNs.srt
12.4 KB
[TutsNode.com] - Linux Security for Beginners/14. Virtual Private Networks/4. Understanding OpenVPN.srt
11 KB
[TutsNode.com] - Linux Security for Beginners/14. Virtual Private Networks/5. Section Summary.srt
548 B
[TutsNode.com] - Linux Security for Beginners/2. X.509 Certificates and Public Key Infrastructures/1.1 X.509 Certificates and Public Key Infrastructures.zip
292.4 KB
[TutsNode.com] - Linux Security for Beginners/2. X.509 Certificates and Public Key Infrastructures/10. Quiz 1.html
179 B
[TutsNode.com] - Linux Security for Beginners/2. X.509 Certificates and Public Key Infrastructures/2. X.509 certificates, lifecycle, fields, and extensions.srt
11.5 KB
[TutsNode.com] - Linux Security for Beginners/2. X.509 Certificates and Public Key Infrastructures/3. Trust chains, public keys, and certificate transparency.srt
8.6 KB
[TutsNode.com] - Linux Security for Beginners/2. X.509 Certificates and Public Key Infrastructures/4. How to generate and manage publicprivate keys.srt
9.9 KB
[TutsNode.com] - Linux Security for Beginners/2. X.509 Certificates and Public Key Infrastructures/5. Creating a certificate authority.srt
12.4 KB
[TutsNode.com] - Linux Security for Beginners/2. X.509 Certificates and Public Key Infrastructures/6. Requesting, signing, managing, and revoking certificates.mp4
108.8 MB
[TutsNode.com] - Linux Security for Beginners/2. X.509 Certificates and Public Key Infrastructures/6. Requesting, signing, managing, and revoking certificates.srt
14.7 KB
[TutsNode.com] - Linux Security for Beginners/2. X.509 Certificates and Public Key Infrastructures/7. Tooling for certificate generations (Let’s Encrypt, ACME, certbot).srt
8.3 KB
[TutsNode.com] - Linux Security for Beginners/2. X.509 Certificates and Public Key Infrastructures/8. Introduction to cfssl.srt
9.6 KB
[TutsNode.com] - Linux Security for Beginners/2. X.509 Certificates and Public Key Infrastructures/9. Section Summary.srt
2.1 KB
[TutsNode.com] - Linux Security for Beginners/3. X.509 Certificates for Encryption, Signing and Authentication/1. Section Introduction.srt
789 B
[TutsNode.com] - Linux Security for Beginners/3. X.509 Certificates for Encryption, Signing and Authentication/1.1 X.509 Certificates for Encryption, Signing and Authentication.zip
153.3 KB
[TutsNode.com] - Linux Security for Beginners/3. X.509 Certificates for Encryption, Signing and Authentication/10. Quiz 2.html
179 B
[TutsNode.com] - Linux Security for Beginners/3. X.509 Certificates for Encryption, Signing and Authentication/2. Understanding the SSL and TLS protocols.srt
10.2 KB
[TutsNode.com] - Linux Security for Beginners/3. X.509 Certificates for Encryption, Signing and Authentication/3. Configuring Apache HTTPD for HTTPS service (SNI and HSTS).srt
12.4 KB
[TutsNode.com] - Linux Security for Beginners/3. X.509 Certificates for Encryption, Signing and Authentication/4. Configuring Apache HTTPD to serve certificate chains - Part 1.mp4
104.2 MB
[TutsNode.com] - Linux Security for Beginners/3. X.509 Certificates for Encryption, Signing and Authentication/4. Configuring Apache HTTPD to serve certificate chains - Part 1.srt
14.6 KB
[TutsNode.com] - Linux Security for Beginners/3. X.509 Certificates for Encryption, Signing and Authentication/5. Configuring Apache HTTPD to serve certificate chains - Part 2.srt
7.3 KB
[TutsNode.com] - Linux Security for Beginners/3. X.509 Certificates for Encryption, Signing and Authentication/6. Configuring Apache HTTPD to authenticate with certificates.srt
9.1 KB
[TutsNode.com] - Linux Security for Beginners/3. X.509 Certificates for Encryption, Signing and Authentication/7. Configuring Apache HTTPD to provide OCSP stapling.srt
7.3 KB
[TutsNode.com] - Linux Security for Beginners/3. X.509 Certificates for Encryption, Signing and Authentication/8. Using OpenSSL for SSLTLS clients and server tests.srt
9.8 KB
[TutsNode.com] - Linux Security for Beginners/3. X.509 Certificates for Encryption, Signing and Authentication/9. Section Summary.srt
795 B
[TutsNode.com] - Linux Security for Beginners/4. Encrypted File Systems/1. Section Introduction.srt
687 B
[TutsNode.com] - Linux Security for Beginners/4. Encrypted File Systems/10. Quiz 3.html
179 B
[TutsNode.com] - Linux Security for Beginners/4. Encrypted File Systems/3. Block Level Encryption 1.srt
14.3 KB
[TutsNode.com] - Linux Security for Beginners/4. Encrypted File Systems/5. Using dm-crypt with LUKS1.mp4
109.8 MB
[TutsNode.com] - Linux Security for Beginners/4. Encrypted File Systems/5. Using dm-crypt with LUKS1.srt
14.7 KB
[TutsNode.com] - Linux Security for Beginners/4. Encrypted File Systems/6. Understanding dm-crypt and LUKS2 functionality.srt
11.1 KB
[TutsNode.com] - Linux Security for Beginners/4. Encrypted File Systems/7. File Level Encryption.srt
13.9 KB
[TutsNode.com] - Linux Security for Beginners/4. Encrypted File Systems/8. Clevis and Tang.srt
6.8 KB
[TutsNode.com] - Linux Security for Beginners/4. Encrypted File Systems/9. Section Summary.srt
638 B
[TutsNode.com] - Linux Security for Beginners/5. DNS and Cryptography/1. Section Introduction.srt
1016 B
[TutsNode.com] - Linux Security for Beginners/5. DNS and Cryptography/10. Multicast DNS.srt
3.2 KB
[TutsNode.com] - Linux Security for Beginners/5. DNS and Cryptography/11. Section Summary.srt
792 B
[TutsNode.com] - Linux Security for Beginners/5. DNS and Cryptography/12. Quiz 4.html
179 B
[TutsNode.com] - Linux Security for Beginners/5. DNS and Cryptography/2. Understanding DNS, zones, and resource records.srt
13.7 KB
[TutsNode.com] - Linux Security for Beginners/5. DNS and Cryptography/3. Key concepts of DNSSEC.srt
10.9 KB
[TutsNode.com] - Linux Security for Beginners/5. DNS and Cryptography/4. DNS with bind 1.srt
13.8 KB
[TutsNode.com] - Linux Security for Beginners/5. DNS and Cryptography/6. DNSSEC with bind.srt
7.2 KB
[TutsNode.com] - Linux Security for Beginners/6. Host Hardening/1. Section Introduction.srt
863 B
[TutsNode.com] - Linux Security for Beginners/6. Host Hardening/1.1 Host Hardening.zip
227.5 KB
[TutsNode.com] - Linux Security for Beginners/6. Host Hardening/2. Disabling unused software and services.srt
10.8 KB
[TutsNode.com] - Linux Security for Beginners/6. Host Hardening/3. Understanding and dropping capabilities for systemd and entire system.srt
9.4 KB
[TutsNode.com] - Linux Security for Beginners/6. Host Hardening/4. Using ASLR, DEP, and Exec-shield.srt
7.4 KB
[TutsNode.com] - Linux Security for Beginners/6. Host Hardening/6. Creating SSH certificates for SSH.srt
10.4 KB
[TutsNode.com] - Linux Security for Beginners/6. Host Hardening/7. Working with chroot environments.srt
7.2 KB
[TutsNode.com] - Linux Security for Beginners/6. Host Hardening/8. earning the implications of Meltdown and Spectre mitigations.srt
7.6 KB
[TutsNode.com] - Linux Security for Beginners/7. Host Intrusion Detection/1.1 Host Intrusion Detection.zip
128.3 KB
[TutsNode.com] - Linux Security for Beginners/7. Host Intrusion Detection/2. Using and configuring the Linux Audit system.srt
14.1 KB
[TutsNode.com] - Linux Security for Beginners/7. Host Intrusion Detection/3. How to use chkrootkit.srt
7.5 KB
[TutsNode.com] - Linux Security for Beginners/7. Host Intrusion Detection/4. How to use rkhunter.srt
7.5 KB
[TutsNode.com] - Linux Security for Beginners/7. Host Intrusion Detection/5. How to use Linux Malware Detect.srt
8.6 KB
[TutsNode.com] - Linux Security for Beginners/7. Host Intrusion Detection/8. Configuring AIDE with rule management.srt
7.6 KB
[TutsNode.com] - Linux Security for Beginners/8. Resource Control/1.1 Resource Control.zip
173.3 KB
[TutsNode.com] - Linux Security for Beginners/8. Resource Control/2. Understanding and configuring ulimits.srt
7.8 KB
[TutsNode.com] - Linux Security for Beginners/8. Resource Control/3. How to manage cgroups and process cgroups.srt
11.5 KB
[TutsNode.com] - Linux Security for Beginners/8. Resource Control/4. Using systemd units to limit system resources.mp4
107.7 MB
[TutsNode.com] - Linux Security for Beginners/8. Resource Control/4. Using systemd units to limit system resources.srt
14.6 KB
[TutsNode.com] - Linux Security for Beginners/8. Resource Control/5. Managing systemd resources for individual processes.srt
9.5 KB
[TutsNode.com] - Linux Security for Beginners/9. Discretionary Access Control/1.1 Discretionary Access Control.zip
95.9 KB
[TutsNode.com] - Linux Security for Beginners/9. Discretionary Access Control/2. Understanding the concepts of DAC.srt
7.3 KB
[TutsNode.com] - Linux Security for Beginners/9. Discretionary Access Control/3. Understanding the management of file ownership.srt
9.6 KB
[TutsNode.com] - Linux Security for Beginners/9. Discretionary Access Control/5. Understanding and managing access control lists.srt