Linux is widely used to host critical services in Internet-facing settings. This course will show you how to take control of your servers, assess their vulnerability, and significantly reduce their attack surface by hardening the system.
It is a fact of life that any server that connects directly to the Internet can be attacked. In this course, Securing Linux Servers, you'll learn best practices to reduce the attack surface of those systems. First, you'll learn to take control of booting your machines and see how to assess their vulnerability using a range of open-source tools. Next, you'll put into place some simple best practices to harden them and learn the benefits of SELinux in mitigating the potential damage of 0-day vulnerabilities. Finally, you'll learn how to check the integrity of your file system and detect suspicious activity. No training can claim to make your servers 100% secure, but after completing this course, you'll certainly be able to remove the low-hanging fruit from the reach of would-be attackers. The course uses CentOS7 or RHEL7, plus a number of readily-available open-source tools.
Course Overview Hi everyone. My name is Chris Brown. Welcome to my course, Securing Linux Servers. I've been using, writing about, and teaching Linux for close on 25 years. Now if you run mission critical services, particularly on machines with an internet facing connection, you absolutely must take security seriously because you will get attacked. No ifs, no buts, you will. So in this course, we're going to see how to assess the vulnerability of your Linux servers and use some simple best practices to improve their security. Some of the major topics that we will cover are vulnerability assessments, system hardening, taming that all-powerful root account, Security-Enhanced Linux, and file system integrity checking. By the end of this course, you won't be able to guarantee that your servers are 100% secure, no one can do that, but you will be able to substantially reduce the risk, and you really can't afford not to do that. Before beginning the course, you should ideally be familiar with administering a Linux system, and you certainly need to be comfortable working with the Linux command prompt. So I hope you'll join me on this journey to learn how to make life harder for the would-be intruder with the Securing Linux Servers course at Pluralsight.