CompTIA Linux+: Security
Security and Cyber-Security skills are more and more sort after. This course will teach you to secure various Linux distributions and to look at the security angle as a first approach.
What you'll learn
If you are short on one or more Linux security skills this course is a great starting point. In this course, CompTIA Linux+: Security, you’ll learn to diagnose and secure Linux security issues. First, you’ll explore Linux permissions and access control Lists. Next, you’ll discover securing Linux remote access with SSH and SSH Certificate Servers. Finally, you’ll learn how to protect network access to your systems with firewalls. When you’re finished with this course, you’ll have the skills and knowledge of Linux Security needed to secure a range of Linux distributions.
Table of contents
- Welcome to the Linux File Mode 5m
- Listing File Permissions 7m
- Working with the Umask and Default Permissions 6m
- Understanding the Command Chmod 6m
- Using Chmod to Manage Permissions 5m
- Using Advanced Symbolic Notation 8m
- Changing File Ownership 4m
- Setting Execute Only on a Directory 3m
- Summary and What's Next 2m
- What Are Special Permissions? 6m
- Finding, Listing, and Setting Special Permissions 8m
- Using the Sticky Bit to Prevent Deletions 7m
- Setting the SGID Bit on Directories 4m
- Showing Collaborative Permissions with the Apache Web Server 7m
- Special Permission on Executables 4m
- Using Linux Capabilities 5m
- Summary and What's Next 2m
- Managing Secure Connections in Linux 2m
- Understanding Available Authentication Methods 5m
- Managing Known SSH Servers or Hosts 2m
- Working with Known Hosts Storage 9m
- Centralizing Known Hosts 5m
- Authenticating SSH Clients 7m
- Understanding the SSH CA 4m
- Implementing an SSH CA 4m
- Signing Server Keys with the CA 10m
- Summary and What's Next 4m
- Managing Local Users and Groups 4m
- Listing Users 7m
- Working with User Default Settings 3m
- Managing New Users 9m
- Modifying and Deleting Users 6m
- Understanding Password Shadow Data 3m
- Working with Shadow Data 6m
- Understanding Password Encryption 2m
- Working with Passwords and Understanding Authentication 7m
- Managing User Passwords 6m
- Managing Linux Groups 4m
- Summary and What's Next 2m