Learn how to secure Linux servers and clients using iptables, SELinux, password policy definitions, quotas, and more.
This web-based course prepares IT professionals to perform security-related administrative tasks on Linux filesystems and services. The course focuses on CentOS, but many of the concepts apply to any Linux distribution. You will have access to many online resources, including texts, lectures, and virtual labs that duplicate real-world scenarios. Qualified instructors are available to answer questions about the content and theory.
In the labs for this course, you will first practice properly securing a CentOS Linux Server system. You will then apply security hardening for user accounts with a secure password policy definition as well as create temporary user accounts and apply automatic account and password deletion after 90 days. Next, youâ€™ll incorporate security hardening for file systems and user access to mounted file systems by mounting a file system on a CentOS Linux Server that does not have execute permissions. Finally, you will configure security and harden services and applications to ensure the confidentiality, integrity, and availability of those services. You will configure and secure an Apache Web server and MySQL database. You will also configure the Sendmail application for secure local messaging and enable secure encrypted remote access using Secure Shell (SSH).
- Identify threats to the Linux operating system and other open source applications.
- Configure the basic settings to secure a Linux platform.
- Explain user account management and the principle of least privilege to protect and secure the system and its data.
- Examine the flexibility of various options with file permissions and filesystem settings and how granular control isolates data access.
- Describe security solutions to mitigate vulnerabilities in Linux services and the appropriate steps to mitigate the risks.