Book Image

Mastering Linux Security [Video]

By : Marc Heuse
Book Image

Mastering Linux Security [Video]

By: Marc Heuse

Overview of this book

<p>Do you worry about hackers hacking into your system running locally or remotely? Then this course is for you; you will learn (via practical examples) how to secure your system from such attacks.</p> <p>In this course, you will learn to secure workstations and servers against unauthorized persons.</p> <p>We start with the three critical fundamentals that must be dealt with first: updates, passwords, and firewalls. We then give you an overview of what it actually means to secure a system, what an attack surface is, how hackers perform attacks and how to successfully protect against them. You will learn to secure a Linux machine, by securely configuring and running services, performing logging, secure backups, and more. The course will show you how to secure your system locally or remotely. Finally, you will be shown how to verify your set up.</p> <p>By the end of the course, you will have mastered security on Linux systems.</p> <h2>Style and Approach</h2> <p>An exhaustive course packed with step-by-step instructions, working examples, and helpful advice on protecting your Linux system. This course is divided into clear chunks, so you can learn at your own pace and focus on your own areas of interest.</p>
Table of Contents (6 chapters)
Chapter 1
How Hackers Work
Content Locked
Section 2
Port Scanning
Most people have no idea how hackers actually gain access to a server. This section teaches how. So “Know thy enemy”. Understanding your enemy means learning how to protect against them. Additionally we will use what we learn here for the last section. Port Scanning in the first step when attacking. - The attack’s problem: what can he actually attack - Port Scanning shows which services are available to attack - Even software versions can be identified, and it is very easy