Book Image

Mastering Linux Security and Hardening [Video]

By : Donald A. Tevault
Book Image

Mastering Linux Security and Hardening [Video]

By: Donald A. Tevault

Overview of this book

<p><span id="description" class="sugar_field">This course has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this course will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this course, you will be confident in delivering a system that will be much harder to compromise..</span></p> <h1>Style and Approach</h1> <p><span id="trade_selling_points_c" class="sugar_field">An advanced-level guide filled with real-world examples that will help you secure your Linux system.</span></p>
Table of Contents (8 chapters)
Chapter 8
Scanning, Auditing, and Hardening
Content Locked
Section 4
Scanning for Rootkits with Rootkit Hunter
Rootkits are exceedingly nasty pieces of malware that can definitely ruin your day. So In this video, we will scan it using Rootkit Hunter. - Learn about rootkits - Install rootkit hunter - Scan for rootkits