Book Image

Linux Security Techniques [Video]

By : ACI Learning, Don Pezet, Zachary Memos
Book Image

Linux Security Techniques [Video]

By: ACI Learning, Don Pezet, Zachary Memos

Overview of this book

This course offers an in-depth exploration of Linux Security Techniques, guiding you through essential security measures to protect Linux environments. Starting with an overview of modern Linux distribution security features, it moves to practical applications such as managing logs with syslog and journald, auditing user passwords, and configuring firewalls for robust protection. Through hands-on examples, you'll learn to audit filesystems, secure services with SELinux, and isolate applications using chroot jails and LXC containers. The course emphasizes the importance of data security, introducing LUKS disk encryption and GPG for data-at-rest security. It concludes with practical network security strategies and essential security testing, including firewall configuration verification and network data encryption analysis with tools like Wireshark and TCPDUMP. This journey equips you with the skills to implement and verify comprehensive security measures, ensuring your Linux systems are safeguarded against evolving threats.
Table of Contents (5 chapters)
Chapter 1
Monitoring and Auditing Security
Section 1
Overview
Introducing the Linux Security Techniques series, which covers various security features in modern Linux distributions including data encryption, auditing access, SELinux, firewall configuration, and a primer on penetration testing.