Security (9h 41m)
Course Overview 1m 29s Course Overview 1m 29sSecuring Linux Systems 19m 37s Introducing LInux Security 3m 53s Web Server Startup and Permissions 5m 51s Documentation May Not Always Be Correct 5m 8s Certificate Trusts 3m 29s Summary and What's Next 1m 14sUnderstanding the File Mode or Permissions 46m 10s Welcome to the Linux File Mode 5m 17s Listing File Permissions 6m 32s Working with the Umask and Default Permissions 6m 6s Understanding the Command Chmod 6m 0s Using Chmod to Manage Permissions 5m 11s Using Advanced Symbolic Notation 7m 30s Changing File Ownership 4m 24s Setting Execute Only on a Directory 3m 10s Summary and What's Next 1m 55sManaging Special File Permissions 43m 21s What Are Special Permissions? 5m 40s Finding, Listing, and Setting Special Permissions 8m 19s Using the Sticky Bit to Prevent Deletions 7m 10s Setting the SGID Bit on Directories 4m 19s Showing Collaborative Permissions with the Apache Web Server 7m 18s Special Permission on Executables 3m 43s Using Linux Capabilities 5m 2s Summary and What's Next 1m 48s Extending the File Mode with ACLs 33m 16s Understanding the File Mode Limits 7m 45s Checking for ACL Support 4m 52s Configuring HTTPD Securely with ACLS 7m 31s Understanding ACLS 2m 52s Working with ACLS 8m 37s Summary and What's Next 1m 37sImplementing SELinux 43m 23s Welcome to SELinux 6m 1s Managing SELinux Modes 7m 10s Configuring SELinux Booleans 6m 59s Understanding File Contexts 4m 25s Managing File Contexts 7m 42s Relocating User Home Directories 8m 18s Summary and What's Next 2m 43sWorking with AppArmor 30m 53s Understanding AppArmor 3m 8s Installing AppArmor Components 5m 1s Viewing Active Profiles 5m 48s Creating Python Script 5m 57s Generating a Profile for the Script 3m 53s Using Logprof to Update Profile 4m 59s Summary and What's Next 2m 5sManaging SSH Servers and Connections 51m 9s Managing Secure Connections in Linux 2m 23s Understanding Available Authentication Methods 4m 58s Managing Known SSH Servers or Hosts 1m 50s Working with Known Hosts Storage 8m 45s Centralizing Known Hosts 4m 41s Authenticating SSH Clients 7m 13s Understanding the SSH CA 4m 4s Implementing an SSH CA 3m 35s Signing Server Keys with the CA 9m 41s Summary and What's Next 3m 54sElevating Privileges in Linux 38m 25s Becoming the Boss 3m 15s Using Su 7m 26s Understanding Sudo 3m 36s Using Sudo 8m 37s Environment Variables and Sudo 4m 47s Understanding PolKit 1m 39s Recovering Broken Sudo Systems Using Polkit 6m 14s Summary and What's Next 2m 47sManaging Local Users 58m 39s Managing Local Users and Groups 4m 21s Listing Users 7m 21s Working with User Default Settings 2m 57s Managing New Users 8m 30s Modifying and Deleting Users 6m 12s Understanding Password Shadow Data 3m 25s Working with Shadow Data 5m 38s Understanding Password Encryption 1m 45s Working with Passwords and Understanding Authentication 6m 45s Managing User Passwords 5m 36s Managing Linux Groups 3m 52s Summary and What's Next 2m 8sImplementing HTTPS with the Apache Web Server 37m 3s HTTPS Self-signed Certificates 5m 49s Installing Apache 5m 2s Understanding the Ubuntu Apache Configuration 2m 24s Configuring SSL on Apache 9m 17s Redirect HTTP to HTTPS 5m 34s Investigating Certificate Chains with OpenSSL 6m 20s Summary and What's Next 2m 34sImplementing an openSSL Certificate Server 41m 53s Using Certificate Authorities 7m 32s Creating a CA from the CLI 9m 32s Creating a Certificate Signing Request 6m 26s Signing the CSR 6m 4s Configuring Apache with CA Certitficate 6m 54s Graphical Certificate Management on openSUSE 3m 41s Summary and What's Next 1m 42sImplementing Identity Management with openLDAP and SSSD 48m 33s Identity Management in Linux 6m 35s Installing OpenLDAP on Ubuntu 20.04 8m 42s Adding and Searching Entries in OpenLDAP 8m 9s Understanding StartTLS 4m 8s Configuring StartTLS in OpenLDAP 5m 5s Configuring SSSD on Ubuntu 7m 0s Configuring SSSD on AlmaLinux 6m 54s Summary and What's Next 1m 58sHardening Your Linux Systems 35m 4s Security Hardening in Linux 5m 56s Checking Listening Ports and Restricting Access to SSSD 4m 34s Removing Extra Services 3m 53s Securing ICMP Access Using Sysctl 6m 24s Listing User Details 6m 0s Locking Failed Login Attempts 6m 36s Summary and What's Next 1m 39sImplementing Firewalls with Firewalld 31m 56s Introducing Firewalld as a Host Based Firewall 3m 39s Basic Firewalld Management 5m 53s Adding and Removing Services 6m 27s Adding Source Addresses 6m 41s Editing Service Definitions 7m 51s Summary and What's Next 1m 23sImplement Firewalls with UFW 20m 16s Welcome to the Uncomplicated Firewall 3m 13s Adding Basic UFW Rules 3m 20s Tuning SSH Allow Rules 5m 39s Allowing HTTP Access 3m 37s Reporting on Rules 4m 25s