Linux Hardening and Security, Part 3 of 3: File System
Interactive

Linux Hardening and Security, Part 3 of 3: File System

LearnNow Online
Updated Jul 20, 2020

Course description

The Linux Security course explores the various tools and techniques commonly used by Linux system administrators and end users to complete their day-to-day tasks in a Linux environment. It is designed for experienced computer users who have limited previous exposure to Linux, whether they are working in an individual or a corporate environment. This course covers Permissions, Special Modes, ACL's and Rootkits.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

A basic understanding of the Linux operating system.


Meet the expert

Jason Cannon

Jason Cannon is the author of Linux Administration, the founder of the Linux Training Academy, and an instructor to thousands of satisfied students. He has worked for many technology companies who take information security seriously as well as security firms such as Mandiant and FireEye.

Video Runtime

78 Minutes

Time to complete

137 Minutes

Course Outline

Filesystem

Permissions (21:36)

  • Introduction (00:13)
  • Permissions (00:32)
  • File and Directory Permissions (11:14)
  • File and Director Permissions Cont. (09:28)
  • Summary (00:08)

Special Modes (19:50)

  • Introduction (00:08)
  • Filesystem security special modes 1 (07:36)
  • Filesystem security special modes 2 (03:04)
  • Filesystem security file attributes (06:05)
  • Demo: filesystem attributes (02:48)
  • Summary (00:08)

ACLs (15:54)

  • Introduction (00:08)
  • filesystem security ACLs (09:25)
  • Demo: filesystem security acls (06:13)
  • Summary (00:08)

Rootkits (20:54)

  • Introduction (00:08)
  • Rootkits (08:33)
  • Demo: Rootkits (07:12)
  • Additional Resources (04:52)
  • Summary (00:08)