Linux Security Red Hat Cert of Expertise in Server Hardening EX413 & LPIC-3 303 For Sale

Linux Security Red Hat Cert of Expertise in Server Hardening EX413 & LPIC-3 303

This item has been shown 8 times.

Buy Now

Linux Security Red Hat Cert of Expertise in Server Hardening EX413 & LPIC-3 303 :

*** Linux Security Complete Video for Red Hat Certificate of Expertise in Server Hardening (EX413) & LPIC-3 303 (Security) Exams DVD ***


1. This is the most comprehensive and only tutorial you will ever need.2. Includes tutorials for absolutely every aspect of understanding Linux Security Complete Video for Red Hat Certificate of Expertise in Server Hardening (EX413) & LPIC-3 303 (Security) Exams.3. Learn at your own pace and achieve personal satisfaction when you have perfected your task. 4. This DVD is only suitable for a PC/laptop/Mac; it WILL NOT play on a TV (VLC Media Player will need to be installed to enable use on a Mac).

OverviewLearn everything you need to know about Linux security in one title.DescriptionLinux Security Complete Video Course teaches you everything you need to know to build a safe Linux environment. Taught by best-selling author and trainer Sander van Vugt, Linux Security Complete Video Course covers every aspect of Linux security, including Linux operating system security, managing Linux user security, securing Linux services, and securing Linux infrastructure.
Table of ContentsModule 1: Linux Operating System SecurityLesson 1: Keeping Linux up-to-date
1.1 Developing an update strategy
1.2 Applying security updates on Red Hat
1.3 Applying security updates on Ubuntu
1.4 Validating packages
Lesson 1 Lab
Lesson 1 SolutionLesson 2: Managing file system security properties
2.1 Creating encrypted volumes - Part 1
2.2 Creating encrypted volumes - Part 2
2.3 Using security related mount options
2.4 Monitoring file system changes (AIDE)
Lesson 2 Lab
Lesson 2 SolutionLesson 3: Securing server access
3.1 Securing the GRUB boot loader
3.2 Modifying text console settings
3.3 Modifying graphical console settings
Lesson 3 Lab
Lesson 3 SolutionLesson 4: Configuring system logging
4.1 Understanding Linux logging
4.2 Configuring secure remote logging: Creating the CA
4.3 Configuring secure remote logging: Configuring the key material
4.4 Configuring secure remote logging: Setting up the log server
4.5 Configuring secure remote logging: Setting up log filtering
4.6 Managing log rotation
4.7 Making journald logs persistent
4.8 Using Logwatch for log analysis
Lesson 4 Lab
Lesson 4 SolutionLesson 5: Managing system auditing
5.1 Reading the audit log
5.2 Configuring auditing
5.3 Audit reporting
5.4 Writing custom audit rules
5.5 Using predefined audit sets
Lesson 5 Lab
Lesson 5 SolutionLesson 6: Managing mandatory access control (MAC)
6.1 Understanding the need for MAC
6.2 Comparing SELinux to AppArmor
6.3 Configuring AppArmor
6.4 Understanding SELinux workings
6.5 Configuring SELinux file context
6.6 Configuring SELinux port context
6.7 Analyzing SELinux events
6.8 Writing custom SELinux modules
6.9 Managing users in SELinux
6.10 Other MAC solutions (Smack)
Lesson 6 Lab
Lesson 6 SolutionLesson 7: Managing kernel security
7.1 Understanding kernel security architecture
7.2 Linux kernel security issues
7.3 Fixing Linux kernel vulnerabilities
Lesson 7 Lab
Lesson 7 SolutionModule 2: Managing Linux User Security
Lesson 8: Managing Linux permissions and attributes
8.1 Summarizing basic permission usage
8.2 Managing special permissions
8.3 Finding files with special permissions
8.4 Managing default permissions
8.5 Managing access control lists
8.6 Using extended attributes
Lesson 8 Lab
Lesson 8 SolutionLesson 9: Managing user accounts
9.1 Managing password properties
9.2 Auditing user accounts
9.3 Understanding PAM Part 1
9.4 Understanding PAM Part 2
9.5 Understanding security related PAM options
9.6 Configuring PAM
9.7 Applying account lockout with PAM Tally
9.8 Configuring sudo
Lesson 9 Lab
Lesson 9 Lab SolutionLesson 10: Installing central authentication
10.1 Understanding LDAP
10.2 Understanding Kerberos
10.3 Installing FreeIPA server
10.4 Installing FreeIPA clients
10.5 Understanding the role of sssd
10.6 Managing users and groups on FreeIPA
10.7 Setting policies on FreeIPA
10.8 Configuring centralized sudo rules
Lesson 10 Lab
Lesson 10 Lab SolutionModule 3: Securing Linux Services
Lesson 11: Securing services
11.1 Understanding DNS security issues
11.2 Securing DNS
11.3 Securing Apache
11.4 Securing e-mail
11.5 Securing SSH
11.6 Securing vsftpd
Lesson 11 Lab
Lesson 11 SolutionLesson 12: Securing network file systems
12.1 Understanding NFSv4 security improvements
12.2 Configuring NFSv4 server and clients
12.3 Understanding NFSv4 authentication mechanisms
12.4 Using NFSv4 pseudo file systems
12.5 Understanding NFSv4 ACLS
12.6 Understanding and using CIFS UNIX extensions
12.7 Understanding and configuring CIFS security modes (NTLM, Kerberos)
12.8 Managing, mapping and handling of CIFS, ACLs and SIDs
Lesson 12 Lab
Lesson 12 SolutionLesson 13: Applying secure remote access solutions
13.1 Configuring FreeRADIUS to authenticate network nodes
13.2 Identifying and dealing with rogue router advertisements and DHCP
13.3 Configuring and operating OpenVPN server and clients
13.4 Configuring and operating IPsec server and clients
Lesson 13 Lab
Lesson 13 SolutionModule 4: Securing Linux Infrastructure
Lesson 14: Sniffing and port scanning
14.1 Understanding network sniffing
14.2 Using tcpdump and Wireshark for package capture
14.3 Introducing nmap
14.4 Understanding Nessus
14.5 Using tripwire
Lesson 14 Lab
Lesson 14 SolutionLesson 15: Configuring analyzing and intrusion detection tools
15.1 Introducing Snort
15.2 Performing a base Snort configuration
15.3 Understanding Snort output
15.4 Introducing Nagios
15.5 Using ntop
15.6 Using John the Ripper
15.7 Introducing Puppet
Lesson 15 Lab
Lesson 15 SolutionLesson 16: Managing firewalls
16.1 Understanding IPtables basics
16.2 Advanced IPtables usage
16.3 Working with firewalld
16.4 Working with firewalls
Lesson 16 Lab
Lesson 16 SolutionLesson 17: Managing certificates and public key infrastructures
17.1 Understand x.509 certificates and their properties
17.2 Understanding trust chains and public key infrastructures
17.3 Generating and managing public and private keys
17.4 Creating, operating, and securing a certification authority
17.5 Request, sign, and manage server and client certificates
17.6 Revoke certificates and certification authorities
17.7 Using openssl for SSL/TLS client and server tests
17.8 Using the openssl command for testing TLS certificates
Lesson 17 Lab
Lesson 17 SolutionLesson 18: Managing GPG
18.1 Performing Basic GnuPG configuration, usage, and key revocation
18.2 Using GnuPG in e-mail
18.3 Using GnuPG to encrypt files
Lesson 18 Lab
Lesson 18 Solution

Note to :

This item DOES NOT infringe any trademark, copyright, or any other rights, nor does it infringe 's listing or spam policies. Everything contained on the advertised DVD is distributed freely & globally under the terms of the GNU Public License, or the GNU Lesser General Public License (L.G.P.L). I have a full & legal right to re-distribute this product.

This IS NOT a digital download; the item will be posted to the buyer on a ‘solid-state’ DVD.



Buy Now

Popular Tutorials