Linux Security Online Course

Linux Security Online Course

Linux Security Online Course

This course provides a comprehensive guide to Linux security, covering essential techniques to protect Linux systems. You’ll start with an overview of modern Linux security features and move on to practical skills such as managing logs with syslog and journald, auditing passwords, and configuring firewalls. Through hands-on exercises, you’ll learn to secure filesystems, use SELinux, and isolate applications via chroot jails and LXC containers. The course also covers data-at-rest protection with LUKS and GPG, along with network security strategies and testing using tools like Wireshark and TCPDUMP.

By the end, you’ll be equipped to implement and verify robust security measures to safeguard Linux environments.

Who should take this Course?

This course is designed for Linux administrators, IT security professionals, and developers who want to strengthen their system security skills. It is also suitable for beginners with basic Linux knowledge looking to gain hands-on experience in securing Linux environments. Network engineers and system auditors can benefit from learning advanced techniques in filesystem protection, application isolation, and firewall configuration. Anyone aiming to enhance their cybersecurity expertise and protect Linux systems against evolving threats will find this course highly valuable.

What you will learn

  • Implement various Linux security features effectively.
  • Manage and audit logs with syslog and journald.
  • Secure filesystems and configure firewalls.
  • Protect services with SELinux and isolate applications.
  • Encrypt data using LUKS and GPG.
  • Perform security testing to verify configurations and data encryption.

Course Outline

Monitoring and Auditing Security

  • Overview
  • Managing Logs with syslog
  • Managing Logs with journald
  • Auditing User Passwords Part 1
  • Auditing User Passwords Part 2
  • Auditing the Filesystem
  • Auditing SUID and SGID
  • Auditing Logins with fail2ban

Data Security

  • LUKS Disk Encryption
  • Data Encryption with GPG
  • MD5 and SHA Checksums
  • Data Encryption with SSH

Securing Services

  • Securing Services with SELinux Part 1
  • Securing Services with SELinux Part 2
  • Chroot Jails
  • LXC Containers

Securing Networks

  • TCP Wrappers
  • Network Security with iptables
  • Network Security with firewalld

Security Testing

  • Verifying Firewall Configurations
  • Verifying Network Data Encryption Part 1
  • Verifying Network Data Encryption Part 2

Reviews

No reviews yet. Be the first to review!

Write a review

Note: HTML is not translated!
Bad           Good

Tags: Linux Security Online Course, Learn Linux Security, Linux Security Training, Linux Security Free course, Linux Security Questions,