Table of contents
Introduction
9mins
Lock icon
Meet Your Course Author | 0m
Lock icon
Course Prerequisites | 2m
Lock icon
Why Server Hardening? | 5m
Identify Common Red Hat Vulnerabilities and Exposures
77mins
Lock icon
The CIA Model | 9m
Lock icon
Updating Systems | 7m
Lock icon
Updating Software on Linux | 1h 0m
Lock icon
| 0m
Verify Package Security and Validity
16mins
Lock icon
Verifying Packages - Yum | 8m
Lock icon
Installing and Verifying Packages with RPM | 7m
Lock icon
| 0m
Identify and Employ Standards-based Practices
69mins
Lock icon
Common Standards | 16m
Lock icon
Common Standards - Examples | 16m
Lock icon
Create and Use Encrypted File Systems | 15m
Lock icon
File System Features | 9m
Lock icon
File System Features - Hands On | 11m
Lock icon
| 0m
Configure Defaults for File Systems
46mins
Lock icon
File System Properties for ext4 | 5m
Lock icon
File System Properties for XFS | 5m
Lock icon
Files - SUID | 11m
Lock icon
Files - GID | 3m
Lock icon
Files - Sticky Bit | 5m
Lock icon
Files - FACL | 15m
Lock icon
| 0m
Install and Use Intrusion Detection
21mins
Lock icon
Security Tools - AIDE | 10m
Lock icon
Security Tools - OSSEC | 10m
Lock icon
| 0m
Manage User Account and Password Security
22mins
Lock icon
User Accounts | 9m
Lock icon
Setting User Account Defaults | 6m
Lock icon
Group Accounts and Group Administrators | 6m
Lock icon
| 0m
PAM - Pluggable Authentication Modules
14mins
Lock icon
What is PAM | 6m
Lock icon
A Further Look at PAM | 8m
Lock icon
| 0m
Configure Console Security
18mins
Lock icon
Console Security | 9m
Lock icon
Console Security - Hands On | 8m
Lock icon
| 0m
Configure System-wide Acceptable Use Notifications
14mins
Lock icon
Changing the SSH Banner | 4m
Lock icon
Changing the Message of the Day | 4m
Lock icon
Use a Shell Script to Customize a Message Viewed Upon Login | 6m
Lock icon
| 0m
Install and Configure Identity Management Service
23mins
Lock icon
What is IdM? - Identity Management | 4m
Lock icon
Install IdM - Identity Management Server | 8m
Lock icon
Install IdM on a Client Server | 10m
Lock icon
| 0m
Configure Remote System Logging Services
23mins
Lock icon
System Logging via rsyslog | 5m
Lock icon
Managing System Log Files | 9m
Lock icon
Configure Remote Logging Services | 9m
Lock icon
| 0m
Configure System Auditing Services
23mins
Lock icon
Configure and Install System Auditing Services | 6m
Lock icon
Review Audit Data | 11m
Lock icon
Getting Reports Out of Audit Data | 5m
Lock icon
| 0m
Network Scanning Tools and IPTables
43mins
Lock icon
Install and Use nmap | 10m
Lock icon
Install and Use nessus | 9m
Lock icon
IPTables Overview | 6m
Lock icon
IPTables - Part 2 | 15m
Lock icon
| 0m
Conclusion
3mins
Lock icon
Conclusion | 2m
Lock icon
Next Steps | 1m
Lock icon
| 0m
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon