Course Overview and Downloads
  • Course Overview
  • Course Downloads
General Security
  • Section Overview
  • Is Linux Secure?
  • What Makes Linux Secure?
  • Security Guidelines and Principles
  • Section Summary
  • General Security
Physical Security
  • Section Overview
  • Physical Security Concepts
  • Single User Mode Security
  • Single User Mode and Blank Passwords
  • Securing the Boot Loader
  • Disk Encryption
  • Encrypting a New Device, Part I
  • Encrypting a New Device, Part II
  • Encrypting an Existing Device
  • Disabling Control Alt Delete
  • Section Summary
  • Physical Security
Account Security
  • Section Overview
  • Intro to PAM
  • PAM Configuration Example
  • Password Security
  • Account Security Demo #1 (UID 0)
  • Controlling Account Access
  • Security by Account Type
  • Account Security Demo #2
  • Account Security Demo #3 (Sudo)
  • Account Security
Network Security
  • Section Overview
  • Network Security, Part I
  • Network Security, Part II
  • Securing SSHD, Part I
  • Securing SSHD, Part II
  • Linux Firewall Fundamentals
  • Configuring the Firewall from the Command Line
  • Firewall Rule Specifications
  • Example Firewall Rules
  • Linux Firewall Demonstration
  • Linux Firewalls
  • TCP Wrappers, Part I
  • TCP Wrappers, Part II
  • Network Security
File System Security
  • Section Overview
  • File and Directory Permissions, Intro
  • File and Directory Permissions, Part I
  • File and Directory Permissions, Part II
  • Special Modes, Part I
  • Special Modes, Part II
  • File Attributes
  • File Attributes Demo
  • ACLs
  • ACLs Demo
  • Rootkits
  • Rootkit Hunter Demonstration
  • Rootkit Detection Software
Additional Security Resources
  • Additional Security Resources
  • Linux Hardening Guides
  • Linux Security Email Lists
  • Security Meetups List
  • Security Conference Videos
Bonus Section
  • Bonus Lecture