Table of contents
Course Introduction
0mins
Lock icon
About this Course | 0m
Lock icon
About the Training Architect | 0m
Lock icon
Course Features and Tools | 0m
325.1 X.509 Certificates and Public Key Infrastructures
60mins
Lock icon
Cryptography Concepts Part 1 | 0m
Lock icon
Cryptography Concepts Part 2 | 0m
Lock icon
PKI and Trust Chains | 0m
Lock icon
Request, Sign, and Manage Certificates | 0m
Lock icon
Operating a Certificate Authority | 0m
Lock icon
X.509 Certificates and Public Key InfrastructuresX.509 Certificates and Public Key Infrastructures | 1h 0m
325.2 X.509 Certificates for Encryption, Signing and Authentication
135mins
Lock icon
SSL, TLS, and Apache HTTPD Server | 0m
Lock icon
The ssl.conf File: Important Directives and Security Focused Configurations | 0m
Lock icon
Understanding SNI and HSTS | 0m
Lock icon
Using the openssl Command to Work with Certificates and Web Servers | 0m
Lock icon
Working with OpenSSL and HttpdWorking with OpenSSL and Httpd | 1h 30m
Lock icon
325.2 X.509 Certificates for Encryption, Signing and Authentication325.2 X.509 Certificates for Encryption, Signing and Authentication | 45m
325.3 Encrypted File Systems
60mins
Lock icon
Creating Encrypted Volumes | 0m
Lock icon
Demo: Working with LUKS | 0m
Lock icon
Disk Encryption with eCryptfsDisk Encryption with eCryptfs | 1h 0m
325.4 DNS and Cryptography
0mins
Lock icon
Working with DNS | 0m
Lock icon
Securing DNS with DNSSEC | 0m
Lock icon
Understanding DANE | 0m
326.1 Host Hardening
60mins
Lock icon
Kernel Security Part 1 | 0m
Lock icon
Kernel Security Part 2 | 0m
Lock icon
Securing Grub | 0m
Lock icon
Linux Kernel SecurityLinux Kernel Security | 1h 0m
326.2 Host Intrusion Detection
90mins
Lock icon
Threat Detection | 0m
Lock icon
Working with Maldet | 0m
Lock icon
Understanding Rootkits | 0m
Lock icon
System Auditing in LInux | 0m
Lock icon
Working with the Audit LogWorking with the Audit Log | 1h 30m
326.3 User Management and Authentication
150mins
Lock icon
Linux Login Essentials | 0m
Lock icon
PAM Concepts | 0m
Lock icon
Kerberos Concepts | 0m
Lock icon
Understanding SSSD | 0m
Lock icon
Configuring PAMConfiguring PAM | 1h 0m
Lock icon
Configuring SSSDConfiguring SSSD | 1h 30m
326.4 FreeIPA Installation and Samba Integration
90mins
Lock icon
Overview of FreeIPA | 0m
Lock icon
Installing and Configuring FreeIPA | 0m
Lock icon
Working with FreeIPA | 0m
Lock icon
Working with FreeIPAWorking with FreeIPA | 1h 30m
327.1 Discretionary Access Control
90mins
Lock icon
Basic System Permissions | 0m
Lock icon
Extended Attributes | 0m
Lock icon
Using ACLs | 0m
Lock icon
Managing File Attributes and PermissionsManaging File Attributes and Permissions | 1h 30m
327.2 Mandatory Access Control
60mins
Lock icon
Understanding MAC | 0m
Lock icon
SELinux | 0m
Lock icon
AppArmor and Smack: MAC alternatives | 0m
Lock icon
Troubleshooting SELinuxTroubleshooting SELinux | 1h 0m
327.3 Network File Systems
90mins
Lock icon
NFSv4 Improvements | 0m
Lock icon
NFS in Practice | 0m
Lock icon
NFS4 ACLs | 0m
Lock icon
CIFS Configuration | 0m
Lock icon
Exporting an NFSv4 Volume with ACLsExporting an NFSv4 Volume with ACLs | 1h 30m
328.1 Network Hardening
90mins
Lock icon
Configuring FreeRADIUS | 0m
Lock icon
Analyzing Network Traffic | 0m
Lock icon
Network Utilities and Threats | 0m
Lock icon
Packet Capture and AnalysisPacket Capture and Analysis | 1h 30m
328.2 Network Intrusion Detection
0mins
Lock icon
Network Monitoring | 0m
Lock icon
Configure and Use Snort | 0m
Lock icon
OpenVAS Overview | 0m
328.3 Packet Filtering
60mins
Lock icon
Firewall Concepts | 0m
Lock icon
Advanced Firewall Concepts | 0m
Lock icon
Ebtables and Nftables | 0m
Lock icon
Working with IP Sets and iptablesWorking with IP Sets and iptables | 1h 0m
328.4 Virtual Private Networks
120mins
Lock icon
OpenVPN | 0m
Lock icon
IPSec Concepts | 0m
Lock icon
Working with OpenVPN (and iptables)Working with OpenVPN (and iptables) | 2h 0m
Review and Next Steps
120mins
Lock icon
Exam Review | 0m
Lock icon
Scheduling and Taking the Exam | 0m
Lock icon
After Certification | 0m
Lock icon
Linux SecurityLinux Security | 2h 0m
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon