Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Guide to Security for Linux Systems
1: Introduction
1-Complete Guide to Linux Secuirty - Intro (1:30)
2-Linux Security - Course overview (4:27)
Course syllabus
2: Lab Setup
1-Download and Install VirtualBox (6:05)
2-Creating First Virtual Machine (5:33)
3-Linux Installation (25:05)
4-Linux CentOS8 Installation (24:33)
3: Linux Security
1-What is Security and OS Hardening (4:07)
2-Securing All OS (3:11)
3-Importance of Linux Security (6:20)
4-Type of Security Breach (4:19)
5-Change Password Parameters (8:25)
6-Creating User Account and Changing Password (8:47)
7-Set Password Policy (12:21)
8-Disable SSH Access for a Specific User (5:31)
9-Lock or Disable User Accounts Manually (7:06)
10-Lock or Disable User Accounts (7:28)
11-Lock User Account After 3 Failed Attempts (9:08)
12-Restrict Direct “root” Login (7:49)
13-Linux File Ownership and Permissions (4:01)
14-Change File Permissions - LAB (11:55)
15-Change File Ownership - LAB (12:26)
16-Change SSH Port (8:54)
17-Message of the Day (motd) (7:30)
18-One Service Per Server (4:41)
8-Disable SSH Access for a Specific User
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock