Book Image

Mastering Linux Security [Video]

By : Marc Heuse
Book Image

Mastering Linux Security [Video]

By: Marc Heuse

Overview of this book

<p>Do you worry about hackers hacking into your system running locally or remotely? Then this course is for you; you will learn (via practical examples) how to secure your system from such attacks.</p> <p>In this course, you will learn to secure workstations and servers against unauthorized persons.</p> <p>We start with the three critical fundamentals that must be dealt with first: updates, passwords, and firewalls. We then give you an overview of what it actually means to secure a system, what an attack surface is, how hackers perform attacks and how to successfully protect against them. You will learn to secure a Linux machine, by securely configuring and running services, performing logging, secure backups, and more. The course will show you how to secure your system locally or remotely. Finally, you will be shown how to verify your set up.</p> <p>By the end of the course, you will have mastered security on Linux systems.</p> <h2>Style and Approach</h2> <p>An exhaustive course packed with step-by-step instructions, working examples, and helpful advice on protecting your Linux system. This course is divided into clear chunks, so you can learn at your own pace and focus on your own areas of interest.</p>
Table of Contents (6 chapters)
Chapter 1
How Hackers Work
Content Locked
Section 5
Attacks on Administrator Workstations
Alternatively instead of attacking a server directly, if an attacker can compromise an administrator he can steal SSH keys and keylog his passwords to gain access to the servers. - If a server or network is too secure, it might be easier for a hacker to try to comprise the administrator - Compromising the administrator can be done by sending malware by email or to bait an admin to click on a malware link - Hacker send dedicated handcrafted phishing email