Linux Hardening and Security, Part 1 of 3: General and Physical
Interactive

Linux Hardening and Security, Part 1 of 3: General and Physical

LearnNow Online
Updated Jul 20, 2020

Course description

The Linux Security course explores the various tools and techniques commonly used by Linux system administrators and end users to complete their day-to-day tasks in a Linux environment. It is designed for experienced computer users who have limited previous exposure to Linux, whether they are working in an individual or a corporate environment. This course covers an Overview of Linux Security, physical security as well as encryption.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

A basic understanding of the Linux operating system.


Meet the expert

Jason Cannon

Jason Cannon is the author of Linux Administration, the founder of the Linux Training Academy, and an instructor to thousands of satisfied students. He has worked for many technology companies who take information security seriously as well as security firms such as Mandiant and FireEye.

Video Runtime

71 Minutes

Time to complete

126 Minutes

Course Outline

General and Physical

Overview of Linux Security (23:03)

  • Introduction (00:13)
  • Course Overview (01:30)
  • Principles Intro (01:09)
  • Is Linux Secure? (02:26)
  • What Makes Linux Secure (08:18)
  • Guidelines (07:41)
  • Wrap-up (01:36)
  • Summary (00:08)

Physical Security (25:55)

  • Introduction (00:08)
  • Physical Security Overview (00:58)
  • General Options (07:41)
  • Demo: Single User Mode Password (06:45)
  • Demo: Single User Mode Blank Password (03:13)
  • Demo: Boot Loader Password (07:01)
  • Summary (00:08)

Disk Encryption (22:05)

  • Introduction (00:08)
  • Disk encryption (05:34)
  • Demo: Setting up LUKS on a New Device (08:38)
  • Demo: Setting up LUKS Manually (04:17)
  • Converting a Device to LUKS (00:52)
  • Disabling Ctrl+Alt+Del (01:44)
  • Physical Security Summary (00:42)
  • Summary (00:08)