Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Cybrary

Linux Hardening

via Cybrary

Overview

Who should take this course?

Our Linux Hardening course is designed for an intermediate-level learner with Linux system administration experience who is interested in learning more about how to secure their network.

What are the prerequisites for this course?

You will gain the most benefit from this course if you have familiarity with the Linux command-line and the Linux filesystem structure.

Why should I take this course?

Our Linux Hardening course will equip you with the knowledge and skills you need to secure your network. You’ll be able to articulate the best practices to secure the operating system, services, and user account administration when building a Linux server or workstation.

What makes this course different from other courses on similar topics?

This course was developed by Corey Holzer, who holds a PhD in Information Security as well as an MBA and Master's in Information Security. He has worked in network security and web development for years. He holds the CISSP, CRISC, CEH, CNDA, and Security+. In the course, Corey not only provides the theory on why it is important to harden your system but also provides guided demonstrations and hands-on labs so learners can apply what they’ve learned.

Why should I take this course on Cybrary and not somewhere else?

Our Linux Hardening course enables you to learn from one of the foremost experts in the field and apply what you have learned in hands-on labs. Our on-demand format affords you the flexibility to learn at your own pace and on your own schedule.

Syllabus

  • Linux Hardening Course Overview and Instructor Introduction
    • Linux Hardening - Course Overview and Instructor Introduction
  • Hardening in Theory
    • Why We Harden
    • Hardening-in-Depth as a Concept
    • The CIS Benchmarks
    • Hardening the Foundation
    • Hardening Storage Devices
    • Firewalls and IPS/IDS as Endpoint Security
    • Managing Services
    • Lifecycle Management
    • Recommendations for Integrating Hardening Measures
  • System Hardening in Practice
    • Hardening the Hardware
    • Hardening the Bootloader
    • Securing the Bootloader (Lab)
    • Securing the Kernel
    • Disabling Ctrl-Alt-Delete (Demo)
    • Securing the Kernel (Lab)
    • Securing Storage Devices Part 1
    • Securing Storage Devices Part 2
    • Disabling SUID and SGID Permissions (Demo)
    • Making the /boot Volume Read-Only (Lab)
    • Blocking Unwanted Activities and Traffic
    • Protecting Storage Devices (Lab)
    • Minimizing the OS Attack Surface Part 1
    • Minimizing the OS Attack Surface Part 2
    • Reducing the Attack Surface on a Server (Lab)
    • Network Hardening at the Host
    • Network Hardening at the Host (Lab)
    • System Administration Hardening
    • Hardening Administration through sudo (Lab)
    • Testing, Monitoring, and Reviewing
    • Log Management (Lab)
  • Services Hardening in Practice
    • General Handling of Services Part 1
    • General Handling of Services Part 2
    • Basic Handling of Services (Lab)
    • Hardening Public-Facing Services
    • Hardening the Secure Shell (SSH) Service Part 1
    • Limiting Logins through SSH (Demo)
    • Hardening the Secure Shell (SSH) Service Part 2
    • Hardening SSH Services (Lab)
  • Accounts Hardening in Practice
    • User Password Authentication Requirements
    • Alternate User Authentication Requirements
    • Creating and Implementing a Key Pair for Login (Demo)
    • Account Management Requirements
    • Hardening User Accounts (Lab)
    • Reviewing Accounts
    • Managing User Accounts (Lab)
  • Course Review and What's Next
    • Linux Hardening Course Review
    • Linux Hardening - What's Next?

Taught by

Corey Holzer

Reviews

Start your review of Linux Hardening

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.