Booking options
£25
£25
On-Demand course
4 hours 12 minutes
All levels
Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step training course. This Ultimate Linux Security and Hardening Training has been specially designed to help learners gain a good command of Ultimate Linux Security and Hardening Training, providing them with a solid foundation of knowledge to become a qualified professional.
Through this Ultimate Linux Security and Hardening Training, you will gain both practical and theoretical understanding of Ultimate Linux Security and Hardening Training that will increase your employability in this field, help you stand out from the competition and boost your earning potential in no time.
Not only that, but this training includes up-to-date knowledge and techniques that will ensure you have the most in-demand skills to rise to the top of the industry. This qualification is fully accredited, broken down into several manageable modules, ideal for aspiring professionals.
Familiar yourself with the recent development and updates of the relevant industry
Know how to use your theoretical knowledge to adapt in any working environment
Get help from our expert tutors anytime you need
Access to course contents that are designed and prepared by industry professionals
Study at your convenient time and from wherever you want
Affordable premium-quality E-learning content, you can learn at your own pace.
You will receive a completion certificate upon completing the course.
Internationally recognized Accredited Qualification will boost up your resume.
You will learn the researched and proven approach adopted by successful people to transform their careers.
You will be able to incorporate various techniques successfully and understand your customers better.
No formal qualifications required, anyone from any academic background can take this course.
Access to a computer or digital device with internet connectivity.
Unit 01: Course Overview and Downloads | |||
▶ | Course Overview | 🕐 00:01:00 | |
Unit 02: General Security | |||
▶ | Section Overview - General Security | 🕐 00:01:00 | |
▶ | Is Linux Secure? | 🕐 00:02:00 | |
▶ | What Makes Linux Secure? | 🕐 00:08:00 | |
▶ | Security Guidelines and Principles | 🕐 00:08:00 | |
▶ | Section Summary - General Security | 🕐 00:02:00 | |
Unit 03: Physical Security | |||
▶ | Section Overview - Physical Security | 🕐 00:01:00 | |
▶ | Physical Security Concepts | 🕐 00:08:00 | |
▶ | Single User Mode Security | 🕐 00:07:00 | |
▶ | Single User Mode and Blank Passwords | 🕐 00:03:00 | |
▶ | Securing the Boot Loader | 🕐 00:07:00 | |
▶ | Disk Encryption | 🕐 00:06:00 | |
▶ | Encrypting a New Device, Part I | 🕐 00:09:00 | |
▶ | Encrypting a New Device, Part II | 🕐 00:04:00 | |
▶ | Encrypting an Existing Device | 🕐 00:01:00 | |
▶ | Disabling Control Alt Delete | 🕐 00:02:00 | |
▶ | Section Summary - Physical Security | 🕐 00:01:00 | |
Unit 04: Account Security | |||
▶ | Section Overview - Account Security | 🕐 00:01:00 | |
▶ | Intro to PAM | 🕐 00:05:00 | |
▶ | PAM Configuration Example | 🕐 00:04:00 | |
▶ | Password Security | 🕐 00:08:00 | |
▶ | Account Security Demo #1 (UID 0) | 🕐 00:03:00 | |
▶ | Security by Account Type | 🕐 00:06:00 | |
▶ | Controlling Account Access | 🕐 00:05:00 | |
▶ | Account Security Demo #2 | 🕐 00:03:00 | |
▶ | Account Security Demo #3 (Sudo) | 🕐 00:05:00 | |
Unit 05: Network Security | |||
▶ | Section Overview - Network Security | 🕐 00:01:00 | |
▶ | Network Security, Part I | 🕐 00:08:00 | |
▶ | Network Security, Part II | 🕐 00:06:00 | |
▶ | Securing SSHD, Part II | 🕐 00:03:00 | |
▶ | Securing SSHD, Part II | 🕐 00:03:00 | |
▶ | Linux Firewall Fundamentals | 🕐 00:08:00 | |
▶ | Firewall Rule Specifications | 🕐 00:05:00 | |
▶ | Configuring the Firewall from the Command Line | 🕐 00:04:00 | |
▶ | Example Firewall Rules | 🕐 00:04:00 | |
▶ | Linux Firewall Demonstration | 🕐 00:10:00 | |
▶ | TCP Wrappers, Part I | 🕐 00:07:00 | |
▶ | TCP Wrappers, Part II | 🕐 00:04:00 | |
Unit 06: File System Security | |||
▶ | Section Overview - File System Security | 🕐 00:01:00 | |
▶ | File and Directory Permissions, Intro | 🕐 00:01:00 | |
▶ | File and Directory Permissions, Part I | 🕐 00:11:00 | |
▶ | File and Directory Permissions, Part II | 🕐 00:09:00 | |
▶ | Special Modes, Part I | 🕐 00:08:00 | |
▶ | Special Modes, Part II | 🕐 00:03:00 | |
▶ | File Attributes | 🕐 00:06:00 | |
▶ | File Attributes Demo | 🕐 00:03:00 | |
▶ | ACLs | 🕐 00:09:00 | |
▶ | ACLs Demo | 🕐 00:06:00 | |
▶ | Rootkits | 🕐 00:09:00 | |
▶ | Rootkit Hunter Demonstration | 🕐 00:07:00 | |
Unit 07: Additional Resources | |||
▶ | Additional Resources | 🕐 00:05:00 |
Skill Up presents a rigorous online education experience, helping you obtain industry-relevant skills certified by the world’s...