Skip to content
Sale

Linux Security and Hardening, The Practical Security Guide – Jason Cannon

Rated 0 out of 5
(be the first to review)

$26.00

Hello. My name is Jason Cannon and I'm the author of Linux Administration, the founder of the Linux Training Academy, and an instructor to thousands of satisfied students. I started my IT career in the late 1990's as a Unix and Linux System Engineer. 

Purchase this course you will earn 26 Points = $2.60!
Category:

Description

Purchase Linux Security and Hardening, The Practical Security Guide – Jason Cannon Course at eBokly. We actively participate in group buys and are committed to sharing knowledge with a wider audience. What's more, our courses maintain the same quality as the original sale page. You have the option to buy directly from the sale page at the full price (sale page link is provided within the post).

Hours of Content: 4

Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers!

This the course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step.

Hello. My name is Jason Cannon and I'm the author of Linux Administration, the founder of the Linux Training Academy, and an instructor to thousands of satisfied students. I started my IT career in the late 1990's as a Unix and Linux System Engineer. I've worked for many technology companies who take information security seriously. I've even worked for security firms such as Mandiant and FireEye. I'll be sharing my real-world Linux security experience with you throughout this course.

By the end of this course you will be able to tighten up the security on any Linux system. You'll learn the security weaknesses of the Linux operating system and be given step-by-step instructions on how to protect those weaknesses. You'll even learn some security concepts that apply to information security as a whole while focusing on the Linux specific issues that require special consideration.

What People Are Saying About Jason and his Courses:

"Excellent course on Linux! It is the best way to get started using Linux that I have come across." –Chris Bischoff, Student

"This class was a great review of the 2 Linux classes I took in school. I learned plenty of new stuff and got a great refresher on things I haven't used in some time. I did well on my interview and got the job I was looking for. Thanks!" –Alan Derrick, Student

"This was a great course! Learned a lot from it!" –Ricardo José Crosara Junior, Student

"Awesome Course! Another great one. Thanks Jason!" –John Wilmont, Student

"Great course, great instructor. I enjoyed every minute of it. I recommend this course 100%." –Alfredo, Student

"I am lovin' it. Nice way to begin one's journey into Linux." –Rohit Gupta, Student

Here is just some of what you will learn by taking this Linux Security and Hardening course:

  • How to protect your Linux systems against hackers.
  • Ways to prevent attackers from breaking into your systems, even when they have physical access to your machine.
  • How to enforce strong password policies and control password as well as account aging policies on your Linux servers.
  • SSH Hardening practices.
  • Network security tactics.
  • Port scanning and network service detection.
  • How the Linux firewall works and exactly how to configure it.
  • How to protect the superuser (root) account.
  • Ways to share accounts securely with an audit trail.
  • File system security and encryption.
  • Using and configuring sudo, and why you need to.
  • Advanced Linux permissions include special modes, file attributes, and access control lists (ACLs).
  • Much, much more!
  • What you learn in course applies to any Linux environment or distribution including Ubuntu, Debian, Linux Mint, RedHat, CentOS, Fedora, OpenSUSE, Slackware, Kali Linux and more.

Enroll now and start learning the skills you need to hack-proof your Linux systems today!

What are the requirements?

  • A basic understanding of the Linux operating system. Please consider taking "Learn Linux in 5 Days" before taking this course.

What am I going to get from this course?

  • By the end of this course you will be able to harden a Linux system, reduce its surface of vulnerability, and reduce the risk of your Linux system being hacked or compromised.

What is the target audience?

  • Anyone with a desire to learn how to secure and harden a computer running the Linux operating system.
  • Linux system administrators looking to make the systems they support more secure.
  • People thinking about a career as a Linux system administrator or engineer.
  • This course is not for people who have never used the Linux operating system before.

Get Linux Security and Hardening, The Practical Security Guide – Jason Cannon, Only Price $29

Course Curriculum

Course Overview and Downloads

  • 1. Course Overview (1:25)
  • 2. Course Downloads

General Security

  • 3. Section Overview (1:09)
  • 4. Is Linux Secure (2:26)
  • 5. What Makes Linux Secure (8:18)
  • 6. Security Guidelines and Principles (7:41)
  • 7. Section Summary (1:36)
  • Quiz 1: General Security

Physical Security

  • 8. Section Overview (0:58)
  • 9. Physical Security Concepts (7:43)
  • 10. Single User Mode Security (6:47)
  • 11. Single User Mode and Blank Passwords (3:14)
  • 12. Securing the Boot Loader (7:03)
  • 13. Disk Encryption (5:34)
  • 14. Encrypting a New Device, Part I (8:40)
  • 15. Encrypting a New Device, Part II (4:17)
  • 16. Encrypting an Existing Device (0:52)
  • 17. Disabling Control Alt Delete (1:45)
  • 18. Section Summary (0:42)
  • Quiz 2: Physical Security

Account Security

  • 19. Section Overview (0:45)
  • 20. Intro to PAM (5:13)
  • 21. PAM Configuration Example (4:05)
  • 22. Password Security (7:58)
  • 23. Account Security Demo #1 (UID 0) (3:11)
  • 24. Controlling Account Access (5:06)
  • 25. Security by Account Type (6:02)
  • 26. Account Security Demo #2 (2:44)
  • 27. Account Security Demo #3 (Sudo) (4:43)
  • Quiz 3: Account Security

Network Security

  • 28. Section Overview (0:35)
  • 29. Network Security, Part I (7:56)
  • 30. Network Security, Part II (6:20)
  • 31. Securing SSHD, Part I (7:54)
  • 32. Securing SSHD, Part II (3:15)
  • 33. Linux Firewall Fundamentals (7:36)
  • 34. Configuring the Firewall from the Command Line (4:06)
  • 35. Firewall Rule Specifications (4:45)
  • 36. Example Firewall Rules (4:00)
  • 37. Linux Firewall Demonstration (9:49)
  • 38. TCP Wrappers, Part I (7:04)
  • 39. TCP Wrappers, Part II (4:04)
  • Quiz 5: Network Security

File System Security

  • 40. Section Overview (1:02)
  • 41. File and Directory Permissions, Intro (0:32)
  • 42. File and Directory Permissions, Part I (11:16)
  • 43. File and Directory Permissions, Part II (9:28)
  • 44. Special Modes, Part I (7:56)
  • 45. Special Modes, Part II (3:04)
  • 46. File Attributes (6:08)
  • 47. File Attributes Demo (2:48)
  • 48. ACLs (9:27)
  • 49. ACLs Demo (6:15)
  • 50. Rootkits (8:33)
  • 51. Rootkit Hunter Demonstration (7:14)
  • Rootkit Detection Software

Additional Security Resources

  • 53. Additional Security Resources (4:52)
  • Linux Hardening Guides
  • Linux Security Email Lists
  • Security Meetups List
  • Security Conference Videos

Get Linux Security and Hardening, The Practical Security Guide – Jason Cannon, Only Price $29


Tag: Linux Security and Hardening, The Practical Security Guide – Jason Cannon Review. Linux Security and Hardening, The Practical Security Guide – Jason Cannon download. Linux Security and Hardening, The Practical Security Guide – Jason Cannon discount.


Purchase the Linux Security and Hardening, The Practical Security Guide – Jason Cannon course at the best price at eBokly. Upon completing your purchase, you will gain access to the downloads page. where you can conveniently retrieve all associated course files. Additionally, we will send you a download notification email to your registered mail.

Unlock your full potential with our Linux Security and Hardening, The Practical Security Guide – Jason Cannon courses. Our courses are meticulously designed to empower you with the skills and knowledge needed for excellence.

Why wait? Take the first step towards greatness by acquiring our Linux Security and Hardening, The Practical Security Guide – Jason Cannon courses today. We ensure a smooth and secure purchasing experience that guarantees your peace of mind. Rest assured that your financial information is safeguarded through our trusted payment gateways, Stripe and PayPal.

Stripe, renowned for its robust security measures, offers a secure and dependable payment process. Your sensitive data is encrypted using state-of-the-art technology, ensuring its confidentiality throughout the transaction.

PayPal, a globally recognized payment platform, adds an extra layer of security. With its buyer protection program, you can make your purchase with confidence, knowing that your financial details are protected, allowing you to focus on your learning journey.

Is it secure? to Use of?
  • Rest assured, your identity remains completely confidential. We do not share your information with anyone, ensuring the utmost security when you buy the Linux Security and Hardening, The Practical Security Guide – Jason Cannon course.
  • 100% Safe Checkout Privateness coverage
  • We employ robust communication and encryption methods to protect sensitive information. All card numbers are encrypted using AES at rest-256, and the transmission of card numbers occurs in a separate hosting environment, without sharing or storing any data.
How Will the Course Be Delivered?
  • Upon successful payment for the “Linux Security and Hardening, The Practical Security Guide – Jason Cannon course”, Most of the products will come to you immediately. But for some products were posted for offer. Please wait for our response, it might take a few hours due to the time zone difference.
  • If this occurs, kindly be patient. Our technical department will process the link shortly, and you will receive notifications directly via email. Your patience is greatly appreciated.
What Shipping Methods Are Available?
How Do I Track Order?
  • We promptly update the status of your order following your payment. If, after 7 days, there is no download link provided, the system will automatically process a refund..
  • We love to hear from you. Please don’t hesitate to email us with any comments, questions and suggestions.

Reviews

There are no reviews yet.

Leave a customer review
Cart
Back To Top