Table of contents
Introduction
9m 29s
Lock icon
Meet Your Course Author | 49s
Lock icon
Course Prerequisites | 2m 44s
Lock icon
Why Server Hardening? | 5m 56s
Identify Common Red Hat Vulnerabilities and Exposures
1h 17m 11s
Lock icon
The CIA Model | 9m 36s
Lock icon
Updating Systems | 7m 35s
Lock icon
Updating Software on Linux | 1h 0m
Lock icon
RHCS Certified Specialist in Server Hardening - Identify Common Vulnerabilities and Exposures
Verify Package Security and Validity
16m 31s
Lock icon
Verifying Packages - Yum | 8m 49s
Lock icon
Installing and Verifying Packages with RPM | 7m 42s
Lock icon
RHCS Certified Specialist in Server Hardening - Verify package security and validity
Identify and Employ Standards-based Practices
1h 9m 16s
Lock icon
Common Standards | 16m 22s
Lock icon
Common Standards - Examples | 16m 5s
Lock icon
Create and Use Encrypted File Systems | 15m 30s
Lock icon
File System Features | 9m 22s
Lock icon
File System Features - Hands On | 11m 57s
Lock icon
RHCS - Server Hardening - Identify and Employ Standard Base Practices
Configure Defaults for File Systems
46m 20s
Lock icon
File System Properties for ext4 | 5m 45s
Lock icon
File System Properties for XFS | 5m 7s
Lock icon
Files - SUID | 11m 19s
Lock icon
Files - GID | 3m 33s
Lock icon
Files - Sticky Bit | 5m 14s
Lock icon
Files - FACL | 15m 22s
Lock icon
RHCS - Server Hardening - Configure Defaults for Filesystems
Install and Use Intrusion Detection
21m 45s
Lock icon
Security Tools - AIDE | 10m 54s
Lock icon
Security Tools - OSSEC | 10m 51s
Lock icon
RHCS - Server Hardening - Install and use intrusion detection
Manage User Account and Password Security
22m 39s
Lock icon
User Accounts | 9m 17s
Lock icon
Setting User Account Defaults | 6m 26s
Lock icon
Group Accounts and Group Administrators | 6m 56s
Lock icon
RHCS - Server Hardening - Manage User Account and Password Security
PAM - Pluggable Authentication Modules
14m 41s
Lock icon
What is PAM | 6m 19s
Lock icon
A Further Look at PAM | 8m 22s
Lock icon
RHCS - Server Hardening - Pluggable authentication modules
Configure Console Security
18m 3s
Lock icon
Console Security | 9m 49s
Lock icon
Console Security - Hands On | 8m 14s
Lock icon
RHCS - Server Hardening - Configure Console Security
Configure System-wide Acceptable Use Notifications
14m 48s
Lock icon
Changing the SSH Banner | 4m 25s
Lock icon
Changing the Message of the Day | 4m 22s
Lock icon
Use a Shell Script to Customize a Message Viewed Upon Login | 6m 1s
Lock icon
RHCS - Server Hardening - System-wide Acceptable Use Notifications
Install and Configure Identity Management Service
23m
Lock icon
What is IdM? - Identity Management | 4m 47s
Lock icon
Install IdM - Identity Management Server | 8m 2s
Lock icon
Install IdM on a Client Server | 10m 11s
Lock icon
RHCS - Server Hardening - Install and Configure Identity Management Services
Configure Remote System Logging Services
23m 58s
Lock icon
System Logging via rsyslog | 5m 23s
Lock icon
Managing System Log Files | 9m 10s
Lock icon
Configure Remote Logging Services | 9m 25s
Lock icon
RHCS - Server Hardening - Configure remote system logging services
Configure System Auditing Services
22m 59s
Lock icon
Configure and Install System Auditing Services | 6m 2s
Lock icon
Review Audit Data | 11m 31s
Lock icon
Getting Reports Out of Audit Data | 5m 26s
Lock icon
RHCS - Server Hardening - Configure System Auditing Services
Network Scanning Tools and IPTables
43m 30s
Lock icon
Install and Use nmap | 10m 57s
Lock icon
Install and Use nessus | 9m 59s
Lock icon
IPTables Overview | 6m 53s
Lock icon
IPTables - Part 2 | 15m 41s
Lock icon
RHCS - Server Hardening - Network Scanning Tools and iptables
Conclusion
3m 35s
Lock icon
Conclusion | 2m 13s
Lock icon
Next Steps | 1m 22s
About the author
A Cloud Guru
The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!
More Courses by A G.
Get access now
Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere
Cancel
Close button icon