Содержание
Course Overview2m 2s Course Overview2m 2sIntroduction to Linux Security8m 32s Introduction to Linux Security3m 52s Verify the Exam Objectives3m 12s Summary and What's Next1m 27sThe Lab Environment7m 54s Creating Your Own Labs3m 14s Lab Networking3m 29s Summary and What's Next1m 9sConfiguring Routing Between Networks20m 27s Introduction to Routing1m 15s Routing Tables3m 57s Enabling IP Forwarding5m 45s Persisting Routing Tables4m 22s Summary and What's Next5m 6sConfiguring Firewalls28m 39s Firewalls in Linux1m 3s Configuring NAT in Linux4m 26s Port Forwarding in Linux4m 53s Listing Firewall Rules3m 25s Building Firewall Rules7m 35s Persisting Firewall Rules3m 12s Summary and What's Next4m 3sDynamic Firewalls with Fail2ban16m 11s What Is Fail2ban?1m 50s Listing Failed SSH Logins1m 58s Installing Fail2ban and Creating Jails6m 36s Working with the Fail2ban Client3m 52s Summary and What's Next1m 54sSecuring OpenSSH31m 52s OpenSSH Servers and Clients1m 10s SSH Server Configuration Files6m 9s Authenticating Servers6m 39s Restricting Root and User Access6m 16s Authenticating Clients6m 34s Summary and What's Next5m 2sSecuring FTP Services24m 3s Linux FTP Servers1m 31s Firewalling FTP Servers7m 12s Installing and Configuring Pure-FTPD Server5m 46s Installing and Configuring VSFTPD6m 29s Summary and What's Next3m 3sMonitoring Systems27m 29s Why Monitor Your System?1m 40s Using the Port Scanner Nmap5m 51s Vulnerability Scanning with OpenVAS8m 37s Snort Intruder Detection System7m 32s Summary and What's Next3m 48sVirtual Private Networks19m 39s Creating Virtual Private Networks2m 18s Installing OpenVPN4m 38s Creating VPN Connections7m 24s Summary and What's Next5m 17s