Table of contents
Introduction
0mins
Lock icon
Meet Your Course Author | 0m
Lock icon
Course Prerequisites | 0m
Lock icon
Why Server Hardening? | 0m
Identify Common Red Hat Vulnerabilities and Exposures
75mins
Lock icon
The CIA Model | 0m
Lock icon
Updating Systems | 0m
Lock icon
Updating Software on LinuxUpdating Software on Linux | 1h 0m
Lock icon
RHCS Certified Specialist in Server Hardening - Identify Common Vulnerabilities and ExposuresRHCS Certified Specialist in Server Hardening - Identify Common Vulnerabilities and Exposures | 15m
Verify Package Security and Validity
15mins
Lock icon
Verifying Packages - Yum | 0m
Lock icon
Installing and Verifying Packages with RPM | 0m
Lock icon
RHCS Certified Specialist in Server Hardening - Verify package security and validityRHCS Certified Specialist in Server Hardening - Verify package security and validity | 15m
Identify and Employ Standards-based Practices
15mins
Lock icon
Common Standards | 0m
Lock icon
Common Standards - Examples | 0m
Lock icon
Create and Use Encrypted File Systems | 0m
Lock icon
File System Features | 0m
Lock icon
File System Features - Hands On | 0m
Lock icon
RHCS - Server Hardening - Identify and Employ Standard Base PracticesRHCS - Server Hardening - Identify and Employ Standard Base Practices | 15m
Configure Defaults for File Systems
15mins
Lock icon
File System Properties for ext4 | 0m
Lock icon
File System Properties for XFS | 0m
Lock icon
Files - SUID | 0m
Lock icon
Files - GID | 0m
Lock icon
Files - Sticky Bit | 0m
Lock icon
Files - FACL | 0m
Lock icon
RHCS - Server Hardening - Configure Defaults for FilesystemsRHCS - Server Hardening - Configure Defaults for Filesystems | 15m
Install and Use Intrusion Detection
30mins
Lock icon
Security Tools - AIDE | 0m
Lock icon
Security Tools - OSSEC | 0m
Lock icon
RHCS - Server Hardening - Install and use intrusion detectionRHCS - Server Hardening - Install and use intrusion detection | 30m
Manage User Account and Password Security
30mins
Lock icon
User Accounts | 0m
Lock icon
Setting User Account Defaults | 0m
Lock icon
Group Accounts and Group Administrators | 0m
Lock icon
RHCS - Server Hardening - Manage User Account and Password SecurityRHCS - Server Hardening - Manage User Account and Password Security | 30m
PAM - Pluggable Authentication Modules
30mins
Lock icon
What is PAM | 0m
Lock icon
A Further Look at PAM | 0m
Lock icon
RHCS - Server Hardening - Pluggable authentication modulesRHCS - Server Hardening - Pluggable authentication modules | 30m
Configure Console Security
30mins
Lock icon
Console Security | 0m
Lock icon
Console Security - Hands On | 0m
Lock icon
RHCS - Server Hardening - Configure Console SecurityRHCS - Server Hardening - Configure Console Security | 30m
Configure System-wide Acceptable Use Notifications
30mins
Lock icon
Changing the SSH Banner | 0m
Lock icon
Changing the Message of the Day | 0m
Lock icon
Use a Shell Script to Customize a Message Viewed Upon Login | 0m
Lock icon
RHCS - Server Hardening - System-wide Acceptable Use NotificationsRHCS - Server Hardening - System-wide Acceptable Use Notifications | 30m
Install and Configure Identity Management Service
30mins
Lock icon
What is IdM? - Identity Management | 0m
Lock icon
Install IdM - Identity Management Server | 0m
Lock icon
Install IdM on a Client Server | 0m
Lock icon
RHCS - Server Hardening - Install and Configure Identity Management ServicesRHCS - Server Hardening - Install and Configure Identity Management Services | 30m
Configure Remote System Logging Services
30mins
Lock icon
System Logging via rsyslog | 0m
Lock icon
Managing System Log Files | 0m
Lock icon
Configure Remote Logging Services | 0m
Lock icon
RHCS - Server Hardening - Configure remote system logging servicesRHCS - Server Hardening - Configure remote system logging services | 30m
Configure System Auditing Services
30mins
Lock icon
Configure and Install System Auditing Services | 0m
Lock icon
Review Audit Data | 0m
Lock icon
Getting Reports Out of Audit Data | 0m
Lock icon
RHCS - Server Hardening - Configure System Auditing ServicesRHCS - Server Hardening - Configure System Auditing Services | 30m
Network Scanning Tools and IPTables
30mins
Lock icon
Install and Use nmap | 0m
Lock icon
Install and Use nessus | 0m
Lock icon
IPTables Overview | 0m
Lock icon
IPTables - Part 2 | 0m
Lock icon
RHCS - Server Hardening - Network Scanning Tools and iptablesRHCS - Server Hardening - Network Scanning Tools and iptables | 30m
Conclusion
120mins
Lock icon
Conclusion | 0m
Lock icon
Next Steps | 0m
Lock icon
RHCS - Server Hardening - Practice ExamRHCS - Server Hardening - Practice Exam | 2h 0m
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon