Take your Linux sysadmin skills to the next level and keep moving along your LFCS/RHCSA and LFCE/RHCE path. This course introduces you to a deeper level of network and system administration.
Topics include security concepts and architectures, securing networks and services with Linux, and remote access tools and techniques such as OpenSSH.
Looking to boost your knowledge of Linux abilities as a system administrator? This course, LFCE: Advanced Network and System Administration, introduces you to a deeper level of network and system administration. First, you will look at managing system services with systemd. Next, you will dive deep into system and network performance, where you will learn techniques and tools to monitor system performance. Finally, you will jump into how to manage software on your system and in your data center with advanced packages management and wrap up with sharing data among your systems with NFS and Samba. By the end of this course, you'll know how to drive the most value out of your Linux systems by providing advanced network services and keeping your systems online and performing well.
Meet Anthony Nocentino, Enterprise Architect, Founder and President of
Centino Systems, Pluralsight Author, Microsoft Data Platform MVP, Corporate
Problem Solver, and a voracious student of the latest computer science
Course Overview Hello everyone, my name is Anthony Nocentino, Enterprise Architect and founder of Centino Systems. Welcome to my course LFCE: Network and Host Security. Have you ever thought about how to secure your Linux systems and the services running on it? In this course, we're going to get you started on your path to doing just that. First up, we're going to cover Linux security concepts and architectures to help you get your head around what threats you need to be concerned about and what techniques you can use to mitigate them. Then, we'll talk about how to secure your hosts and services with tools like iptables and TCP Wrappers, and also building more complex firewall systems with firewalld. And finally, security systems isn't all about denying access to things. We need to be able to provide secure remote access to our systems, and we'll do that with a deep dive into OpenSSH and how to use it for secure access to our systems and also how to securely exchange data between our systems. By the end of this course, you'll know how to configure Linux firewalls and securely access and exchange data between your Linux-based systems. Before beginning this course, you should be familiar with Linux operating system concepts such as usernames and passwords, but also networking concepts like IP addressing, routing, and TCP-based services. I hope you will join me on this journey to learn Linux security with LFCE: Network and Host Security at Pluralsight.
Linux Security Concepts and Architectures Hello, this is Anthony Nocentino, with Centino Systems. Welcome to my course, LFCE Network and Host Security. This module is Linux Security Concepts and Architectures. In this module, we're going to introduce you to some high-level concepts, and architectures, for you to use, to secure your Linux systems and networks. So, let's get started taking your Linux SysAdmin skills to the next level, and check out where we're heading in this course. We just got through the introduction. Now, it's time to set a good foundation for the rest of the course, and get into some Linux security concepts and architectures. In this module, first, we're going to start off introducing some high-level security concepts, things like what security needs in a Linux-based network. Then, I'll move into some security architectures, specifically, host based security, network based security, firewall architectures, and wrap it up with a discussion on logging.
Securing Hosts and Services - iptables and TCP Wrappers Hello, this is Anthony Nocentino, with Centino Systems. Welcome to my course, LFCE Network and Host Security. This module is Securing Hosts and Services: iptables and TCP Wrappers. In this module, we're going to dive deep into how to secure your hosts with iptables firewalls and TCP Wrappers access controls. Okay, so we just took a high-level look at Linux Security Concepts and Architectures. Now it's time to dive into a few of those concepts, specifically firewalling with iptables and securing services with TCP Wrappers. So let's check out where we're going to head in this module. We're going to start off by discussing firewalling at the host layer, and current ways to handle that. Next, we'll introduce the netfilter architecture, and dive into its implementation, iptables. We'll look at some commands, some syntax, and configuration examples. Then we'll move up inside the host a little bit further, and look at securing our services with TCP Wrappers. And then we'll wrap up the module with some basic troubleshooting techniques. So this module syncs up with some specific learning objectives from the LSE certification: implement packet filtering, and configure firewalls with iptables.
Securing Hosts and Services - firewalld Hello, this is Anthony Nocentino with Centino Systems. Welcome to my course, LFCE Network and Hosts Security. This module is securing hosts and services, firewalld. In this module, we're going to introduce you to some high level concepts and architectures for you to secure your Linux systems and networks. Okay, so we just took a high level look at securing hosts and services with iptables and TCP wrappers. Now it's time to learn how to use our system to do more advanced firewall designs, and very simply, with firewalld. So let's check out where we're going to head in this module. We're going to start off my introducing firewalld, and then we'll dive deep into firewalld's concepts, like zones, services and ports. Then we'll learn how to configure firewalld, and look more closely at network address translation on our network router. So this module syncs up with a specific learning objective from the LFCE certification, implement packet filtering.
Remote Access - OpenSSH Hello, this is Anthony Nocentino with Centino Systems. Welcome to my course LFCE Network and Host Security. And this module is Remote Access, OpenSSH. In this module we're going to introduce OpenSSH and look very closely as to how it works. Let's begin. So, we just finished up our sequence on securing hosts and services. Now with our host secured a bit more, let's move into how we can access those hosts remotely and securely with OpenSSH. In this module we're going to start off with some remote access concepts. Then we'll introduce the primary way we access our Linux systems remotely with OpenSSH. Next, we'll discuss some cryptography and key exchange basics, in other words, how SSH keeps our information secure. Then we'll discuss how OpenSSH can authenticate the users trying to log into our system, and then we'll look at what's included in the OpenSSH packages, and wrap up with server and client configurations. So, this module syncs up with a learning objective from the LFCE certification, and that learning objective is configuring an SSH-based remote access using public and private keys.
Remote Access - Tools and Techniques Hello, this is Anthony Nocentino with Centino Systems, welcome to my course LFCE Network and Host Security. This module is Remote Access-Tools and Techniques. Network security isn't always about protecting ug from threats, we need to ensure that we allow secure remote access to our environment. In this module, we'll discuss remote access techniques. So here we are in the last module of this course. We just introduced OpenSSH and discussed it in detail. Now let's take that information and extend it in this module with remote access tools and techniques. In this module, I plan on covering the SSH commands and programs and what we can do with those commands and programs, things like copying files securely between hosts, executing commands against remote systems, building SSH tunnels, and also we're going to cover remote desktops, things like VNC and X11. So one of the topics in this module lines up with an LFCE learning objective, and that learning objective is transfer file securely via the network.