Video description
When you work in IT cyber security, you are responsible for ensuring that all operating systems are fully secured. Guide to Security for Linux Systems introduces you to the parameters and policies that will help you fulfill this responsibility. You will gain an understanding of the procedures and steps needed to secure operating systems; learn about the different types of security breaches you may encounter; and get familiar with the tools and software you can use to ensure a safe Linux system.
Distributed by Manning Publications
This course was created independently by Imran Afzal and is distributed by Manning through our exclusive liveVideo platform.
About the Technology
About the Video
What's Inside
- Working with Oracle VirtualBox
- How to recall the different system tabs in Linux CentOS 8
- Creating a virtual machine
- Understanding the role of the anaconda installation program in CentOS
- An overview of the elements that make Linux Security essential
- Different types of security breaches
- Operating system breaches
- Understanding Linux file ownership and permissions
- How to identify the examples of services in Linux
About the Reader
Basic understanding of Linux
About the Author
Imran Afzal provides onsite and online training on many IT subjects. He has some of the best-selling and highest-rated courses online, with over 400,000 students worldwide. He has helped thousands of people to land the job of their dreams in IT.
Imran has over 20 years of experience in systems administration and engineering, leadership, entrepreneurship, training, and public speaking. He started his career with Time Warner (New York City) in 2000 as a systems administrator, and now manages a large team of systems engineers, administrators and team leads globally. Imran has put his IT skills to work in many fortune 500 companies in the domains of finance, fashion, tech media, and more. Projects he has spearheaded include datacenter migration, introduction and deployment of VMWare, monitoring tools implementation, Amazon cloud migration and more.
Imran earned a bachelor’s in Computer Information Systems from Baruch College, City University of New York and his Master of Business Administration (MBA) from New York Institute of Technology (NYIT). He has also received numerous certifications, including Linux Systems Management, UNIX Operating Systems, Linux System Administration, System Internals, VMWare Certified Professional, RHCSA and Windows Server Certified.
Quotes
Table of contents
- Introduction
- Lab Setup
-
Linux Security
- What is Security and OS Hardening?
- Securing All OS
- Importance of Linux Security
- Type of Security Breach
- Change Password Parameters
- Creating User Account and Changing Password
- Set Password Policy
- Disable SSH Access for a Specific User
- Lock or Disable User Accounts Manually
- Lock or Disable User Accounts
- Lock User Account After 3 Failed Attempts
- Restrict Direct “root” Login
- Linux File Ownership and Permissions
- Change File Permissions - LAB
- Change File Ownership - LAB
- Change SSH Port
- Message of the Day (motd)
- One Service Per Server
Product information
- Title: Guide to Security for Linux Systems
- Author(s):
- Release date: April 2023
- Publisher(s): Manning Publications
- ISBN: 10000DIVC202319
You might also like
book
Linux Essentials for Cybersecurity
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA–IN ONE BOOK From …
video
Linux for Network Engineers: Practical Linux with GNS3
It is important for you as a network engineer to learn Linux! Why? There are many …
video
Linux Security and Hardening, The Practical Security Guide
Keep yourself and your company out of the news by protecting your Linux systems from hackers, …
video
Upgrading to Red Hat Enterprise Linux (RHEL) 8
2+ Hours of Video Instruction Overview In Upgrading to Red Hat Enterprise Linux (RHEL) 8 LiveLessons …