Book Image

Mastering Linux Security [Video]

By : Marc Heuse
Book Image

Mastering Linux Security [Video]

By: Marc Heuse

Overview of this book

<p>Do you worry about hackers hacking into your system running locally or remotely? Then this course is for you; you will learn (via practical examples) how to secure your system from such attacks.</p> <p>In this course, you will learn to secure workstations and servers against unauthorized persons.</p> <p>We start with the three critical fundamentals that must be dealt with first: updates, passwords, and firewalls. We then give you an overview of what it actually means to secure a system, what an attack surface is, how hackers perform attacks and how to successfully protect against them. You will learn to secure a Linux machine, by securely configuring and running services, performing logging, secure backups, and more. The course will show you how to secure your system locally or remotely. Finally, you will be shown how to verify your set up.</p> <p>By the end of the course, you will have mastered security on Linux systems.</p> <h2>Style and Approach</h2> <p>An exhaustive course packed with step-by-step instructions, working examples, and helpful advice on protecting your Linux system. This course is divided into clear chunks, so you can learn at your own pace and focus on your own areas of interest.</p>
Table of Contents (6 chapters)
Chapter 4
Exploring the Local System Security
Content Locked
Section 3
Exploring Permissions
Permissions are the heart of local system security of every operating system. If an attacker can read a sensitive file or write to a config or program, the system might be compromised. - Understand the different permissions, read/write/execute, and special permissions SUID/SGID/sticky - Identify dangerous permissions, especially everyone writeable files and directories - Correct permissions that are at risk, best with a boot-up script