Table of contents
Course Introduction
13m 49s
Lock icon
About this Course | 9m 8s
Lock icon
About the Training Architect | 36s
Lock icon
Course Features and Tools | 4m 5s
325.1 X.509 Certificates and Public Key Infrastructures
1h 27m 46s
Lock icon
Cryptography Concepts Part 1 | 8m 24s
Lock icon
Cryptography Concepts Part 2 | 6m 9s
Lock icon
PKI and Trust Chains | 7m 20s
Lock icon
Request, Sign, and Manage Certificates | 11m 11s
Lock icon
Operating a Certificate Authority | 9m 42s
Lock icon
X.509 Certificates and Public Key InfrastructuresX.509 Certificates and Public Key Infrastructures | 45m
325.2 X.509 Certificates for Encryption, Signing and Authentication
2h 6m 45s
Lock icon
SSL, TLS, and Apache HTTPD Server | 6m 26s
Lock icon
The ssl.conf File: Important Directives and Security Focused Configurations | 12m 24s
Lock icon
Understanding SNI and HSTS | 7m 4s
Lock icon
Using the openssl Command to Work with Certificates and Web Servers | 10m 51s
Lock icon
Working with OpenSSL and HttpdWorking with OpenSSL and Httpd | 1h 0m
Lock icon
325.2 X.509 Certificates for Encryption, Signing and Authentication325.2 X.509 Certificates for Encryption, Signing and Authentication | 30m
325.3 Encrypted File Systems
45m 40s
Lock icon
Creating Encrypted Volumes | 6m 28s
Lock icon
Demo: Working with LUKS | 9m 12s
Lock icon
Disk Encryption with eCryptfsDisk Encryption with eCryptfs | 30m
325.4 DNS and Cryptography
29m 57s
Lock icon
Working with DNS | 13m 20s
Lock icon
Securing DNS with DNSSEC | 12m 45s
Lock icon
Understanding DANE | 3m 52s
326.1 Host Hardening
56m 34s
Lock icon
Kernel Security Part 1 | 10m 31s
Lock icon
Kernel Security Part 2 | 8m 7s
Lock icon
Securing Grub | 7m 56s
Lock icon
Linux Kernel SecurityLinux Kernel Security | 30m
326.2 Host Intrusion Detection
1h 50m 25s
Lock icon
Threat Detection | 13m 2s
Lock icon
Working with Maldet | 12m 7s
Lock icon
Understanding Rootkits | 8m 51s
Lock icon
System Auditing in LInux | 16m 25s
Lock icon
Working with the Audit LogWorking with the Audit Log | 1h 0m
326.3 User Management and Authentication
2h 13m 54s
Lock icon
Linux Login Essentials | 9m 38s
Lock icon
PAM Concepts | 10m 1s
Lock icon
Kerberos Concepts | 9m 9s
Lock icon
Understanding SSSD | 15m 6s
Lock icon
Configuring PAMConfiguring PAM | 30m
Lock icon
Configuring SSSDConfiguring SSSD | 1h 0m
326.4 FreeIPA Installation and Samba Integration
1h 17m 30s
Lock icon
Overview of FreeIPA | 6m 13s
Lock icon
Installing and Configuring FreeIPA | 5m 25s
Lock icon
Working with FreeIPA | 5m 52s
Lock icon
Working with FreeIPAWorking with FreeIPA | 1h 0m
327.1 Discretionary Access Control
1h 16m 40s
Lock icon
Basic System Permissions | 6m 9s
Lock icon
Extended Attributes | 6m 8s
Lock icon
Using ACLs | 4m 23s
Lock icon
Managing File Attributes and PermissionsManaging File Attributes and Permissions | 1h 0m
327.2 Mandatory Access Control
48m 53s
Lock icon
Understanding MAC | 3m 16s
Lock icon
SELinux | 11m 18s
Lock icon
AppArmor and Smack: MAC alternatives | 4m 19s
Lock icon
Troubleshooting SELinuxTroubleshooting SELinux | 30m
327.3 Network File Systems
1h 29m 55s
Lock icon
NFSv4 Improvements | 3m 17s
Lock icon
NFS in Practice | 6m 58s
Lock icon
NFS4 ACLs | 8m 56s
Lock icon
CIFS Configuration | 10m 44s
Lock icon
Exporting an NFSv4 Volume with ACLsExporting an NFSv4 Volume with ACLs | 1h 0m
328.1 Network Hardening
1h 28m 27s
Lock icon
Configuring FreeRADIUS | 7m 28s
Lock icon
Analyzing Network Traffic | 11m 35s
Lock icon
Network Utilities and Threats | 9m 24s
Lock icon
Packet Capture and AnalysisPacket Capture and Analysis | 1h 0m
328.2 Network Intrusion Detection
22m 13s
Lock icon
Network Monitoring | 4m 11s
Lock icon
Configure and Use Snort | 13m 14s
Lock icon
OpenVAS Overview | 4m 48s
328.3 Packet Filtering
54m 9s
Lock icon
Firewall Concepts | 9m 35s
Lock icon
Advanced Firewall Concepts | 11m 23s
Lock icon
Ebtables and Nftables | 3m 11s
Lock icon
Working with IP Sets and iptablesWorking with IP Sets and iptables | 30m
328.4 Virtual Private Networks
1h 46m 2s
Lock icon
OpenVPN | 8m 1s
Lock icon
IPSec Concepts | 8m 1s
Lock icon
Working with OpenVPN (and iptables)Working with OpenVPN (and iptables) | 1h 30m
Review and Next Steps
1h 43m 7s
Lock icon
Exam Review | 5m 32s
Lock icon
Scheduling and Taking the Exam | 4m 12s
Lock icon
After Certification | 3m 23s
Lock icon
Linux SecurityLinux Security | 1h 30m
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon