Securing Linux Servers

Linux is widely used to host critical services in Internet-facing settings. This course will show you how to take control of your servers, assess their vulnerability, and significantly reduce their attack surface by hardening the system.
Course info
Level
Intermediate
Updated
Oct 18, 2016
Duration
4h 24m
Table of contents
Course Overview
Taking Control of Your Servers
Assessing the Vulnerability of Linux Servers
Hardening the Server
Taming the root Account
Controlling Access to Services
Looking for Suspicious Activity
Description
Course info
Level
Intermediate
Updated
Oct 18, 2016
Duration
4h 24m
Description

It is a fact of life that any server that connects directly to the Internet can be attacked. In this course, Securing Linux Servers, you'll learn best practices to reduce the attack surface of those systems. First, you'll learn to take control of booting your machines and see how to assess their vulnerability using a range of open-source tools. Next, you'll put into place some simple best practices to harden them and learn the benefits of SELinux in mitigating the potential damage of 0-day vulnerabilities. Finally, you'll learn how to check the integrity of your file system and detect suspicious activity. No training can claim to make your servers 100% secure, but after completing this course, you'll certainly be able to remove the low-hanging fruit from the reach of would-be attackers. The course uses CentOS7 or RHEL7, plus a number of readily-available open-source tools.

About the author
About the author

Dr. Chris Brown has been using UNIX as a software developer and system administrator since its pioneering days over 30 years ago, and has used Linux professionally and at home for about 10 years.

More from the author
Linux Network Programming
Intermediate
3h 24m
Mar 14, 2016
More courses by Chris Brown
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Chris Brown. Welcome to my course, Securing Linux Servers. I've been using, writing about, and teaching Linux for close on 25 years. Now if you run mission critical services, particularly on machines with an internet facing connection, you absolutely must take security seriously because you will get attacked. No ifs, no buts, you will. So in this course, we're going to see how to assess the vulnerability of your Linux servers and use some simple best practices to improve their security. Some of the major topics that we will cover are vulnerability assessments, system hardening, taming that all-powerful root account, Security-Enhanced Linux, and file system integrity checking. By the end of this course, you won't be able to guarantee that your servers are 100% secure, no one can do that, but you will be able to substantially reduce the risk, and you really can't afford not to do that. Before beginning the course, you should ideally be familiar with administering a Linux system, and you certainly need to be comfortable working with the Linux command prompt. So I hope you'll join me on this journey to learn how to make life harder for the would-be intruder with the Securing Linux Servers course at Pluralsight.