Linux Security and Hardening, The Practical Security Guide

Watch Linux Security and Hardening, The Practical Security Guide

  • 1969
  • 1 Season

Linux Security and Hardening, The Practical Security Guide is an educational show created by Jason Cannon, the founder of LinuxTrainingAcademy.com, to teach viewers how to secure their Linux systems against various cybersecurity threats. The show explores the fundamentals of Linux security, covers an array of practical techniques that can be used to harden a Linux system, and also provides tips on how to stay on top of security best practices.

The show caters to both beginners and experienced Linux users, breaking down complex security concepts into simple, understandable terms. Jason Cannon, a seasoned Linux professional, shares his vast knowledge in the field to help viewers build secure Linux systems from scratch. He starts by covering the basics of digital security, explaining what cybersecurity is and why it's important. He then moves on to cover different types of attacks and vulnerabilities, such as brute force attacks, buffer overflows, and SQL injections.

The show also discusses some common misconceptions about Linux security that need to be debunked. For example, many people believe that because Linux is an open-source operating system, it's inherently more secure than proprietary systems like Windows. While Linux may be more resistant to viruses, it's still susceptible to attacks, particularly if it's not properly secured.

Throughout the show, Jason Cannon shares a plethora of tips and techniques for securing a Linux system. This includes configuring firewalls, securing SSH connections, enabling SELinux, using strong passwords, and much more. In addition to showing viewers how to make their systems more secure, the show also teaches them how to test their security measures. Jason Cannon demonstrates how to conduct security audits and penetration tests to identify potential vulnerabilities.

One of the unique features of Linux Security and Hardening, The Practical Security Guide is the practical approach it takes to teaching Linux security. Jason Cannon doesn't just explain concepts, he shows viewers how to implement them in real-world scenarios. Viewers can expect step-by-step tutorials on how to set up firewalls, secure SSH connections, and configure system settings, making this show an excellent resource for those who like to learn by doing.

Another standout feature of Linux Security and Hardening, The Practical Security Guide is the breadth of topics covered. The show covers a wide range of security-related topics, including network security, file permissions, and user authentication. This makes it an excellent resource for both beginners and experienced Linux users who want to improve their system security.

Finally, the show is delivered in a clear and concise format, making it easy to follow along. Jason Cannon's presentation style is engaging, with a good balance of theory and hands-on demonstrations. The show is well-produced and visually appealing, with high-quality graphics and animations that help reinforce key concepts.

In summary, Linux Security and Hardening, The Practical Security Guide is an excellent resource for anyone who wants to learn how to secure their Linux systems against cyber threats. The show covers a wide range of security-related topics, delivers practical hands-on demonstrations, and is presented in a clear and engaging format. Whether you're a beginner or an experienced Linux user, you'll find plenty of valuable information and tips in this show to help you improve your system's security.

Linux Security and Hardening, The Practical Security Guide is a series that ran for 1 seasons (51 episodes) between and on Jason Cannon - LinuxTrainingAcademy.com

Filter by Source

Seasons
Additional Security Resources
51. Additional Security Resources
 
Information on additional security resources
Rootkit Hunter Demonstration
50. Rootkit Hunter Demonstration
 
Demonstration of Rootkit Hunter
Rootkits
49. Rootkits
 
Introduction to rootkits
ACLs demo
48. ACLs demo
 
Demonstration of ACLs
ACLs
47. ACLs
 
Introduction to ACLs
File Attributes Demo
46. File Attributes Demo
 
Demonstration of file attributes
File Attributes
45. File Attributes
 
Explanation of file attributes
Special Modes, Part II
44. Special Modes, Part II
 
Explanation of special modes (cont'd)
Special Modes, Part I
43. Special Modes, Part I
 
Explanation of special modes
File and Directory Permissions, Part II
42. File and Directory Permissions, Part II
 
Further explanation of file and directory permissions (cont'd)
File and Directory Permissions, Part I
41. File and Directory Permissions, Part I
 
Further explanation of file and directory permissions
File and Directory Permissions, Intro
40. File and Directory Permissions, Intro
 
Introduction to file and directory permissions
File System Security Overview
39. File System Security Overview
 
Overview of the section on file system security
TCP Wrappers, Part II
38. TCP Wrappers, Part II
 
Explanation of TCP wrappers (cont'd)
TCP Wrappers, Part I
37. TCP Wrappers, Part I
 
Explanation of TCP wrappers
Linux Firewall Demonstration
36. Linux Firewall Demonstration
 
Demonstration of Linux firewall configuration
Example Firewall Rules
35. Example Firewall Rules
 
Example of firewall rules
Firewall Rule Specifications
34. Firewall Rule Specifications
 
Detailed look at firewall settings
Configuring the Firewall from the Command Line
33. Configuring the Firewall from the Command Line
 
Explanation of configuration of the Linux firewall from the command line interface
Linux Firewall Fundamentals
32. Linux Firewall Fundamentals
 
Explanation of basic configuration of the Linux firewall
Securing SSHD, Part II
31. Securing SSHD, Part II
 
Explanation of how to secure SSHD (cont'd)
Securing SSHD, Part I
30. Securing SSHD, Part I
 
Explanation of how to secure SSHD
Network Security, Part II
29. Network Security, Part II
 
Explanation of network security (cont'd)
Network Security, Part I
28. Network Security, Part I
 
Explanation of network security
Network Security Overview
27. Network Security Overview
 
Overview of section on network security
Account Security Demo #3 (Sudo)
26. Account Security Demo #3 (Sudo)
 
Demonstration of how to use sudo
Account Security Demo #2
25. Account Security Demo #2
 
Demonstration of how to control access by account type
Security by Account Type
24. Security by Account Type
 
Explanation of how to control access by account type
Controlling Account Access
23. Controlling Account Access
 
Explanation of how to control access through accounts
Account Security Demo #1 (UID 0)
22. Account Security Demo #1 (UID 0)
 
Demonstration of security configuration for UID 0
Password Security
21. Password Security
 
Guidelines on password security
PAM Configuration Example
20. PAM Configuration Example
 
Example of how to configure PAM
Intro to PAM
19. Intro to PAM
 
Introduction to Pluggable Authentication Modules
Account Security Overview
18. Account Security Overview
 
Overview of section on account security
Physical Security Summary
17. Physical Security Summary
 
Summary of topics covered in this section
Disabling Control Alt Delete
16. Disabling Control Alt Delete
 
Explanation of how to disable ctrl+alt+delete at the login screen
Encrypting an Existing Device
15. Encrypting an Existing Device
 
Explanation of how to encrypt an existing device
Encrypting a New Device, Part II
14. Encrypting a New Device, Part II
 
Explanation of how to encrypt a new device (cont'd)
Encrypting a New Device, Part I
13. Encrypting a New Device, Part I
 
Explanation of how to encrypt a new device
Disk Encryption
12. Disk Encryption
 
Introduction to encryption of the system disks
Securing the Boot Loader
11. Securing the Boot Loader
 
Explanation of how to secure the boot loader
Single User Mode and Blank Passwords
10. Single User Mode and Blank Passwords
 
Explanation of how to set up single user mode (cont'd) and information on setting blank passwords
Single User Mode Security
9. Single User Mode Security
 
Explanation of how to set up single user mode
Physical Security Concepts
8. Physical Security Concepts
 
Basic concepts of physical server security
Physical Security
7. Physical Security
 
Introduction to physical security of a server
General Security: Section Summary
6. General Security: Section Summary
 
Summary of information covered in the 'General Security' section
Security Guidelines and Principles
5. Security Guidelines and Principles
 
General security guidelines and principles
What Makes Linux Secure?
4. What Makes Linux Secure?
 
Detailed description security features of Linux
Is Linux Secure?
3. Is Linux Secure?
 
Description security features of Linux and how they compare to other options
General Security: Section Overview
2. General Security: Section Overview
 
Overview of topics covered in the 'General Security' section
Course Overview
1. Course Overview
 
Overview of course topics
Description
Where to Watch Linux Security and Hardening, The Practical Security Guide
Linux Security and Hardening, The Practical Security Guide is available for streaming on the Jason Cannon - LinuxTrainingAcademy.com website, both individual episodes and full seasons. You can also watch Linux Security and Hardening, The Practical Security Guide on demand at Amazon.