Linux Hardening

Cybrary
Course
Beta

Who should take this course? Our Linux Hardening course is designed for an intermediate-level learner with Linux system administration experience who is interested in learning more about how to secure their network. What are the prerequisites for this course? You will gain the most benefit from this course if you have familiarity with the Linux com...

Time
11 hours 49 minutes
Difficulty
Intermediate
CEU/CPE
12
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course Content
Module 1: Linux Hardening Course Overview and Instructor Introduction
Linux Hardening - Course Overview and Instructor Introduction
5m
Module 2: Hardening in Theory

2.1Why We Harden

4m

2.2Hardening-in-Depth as a Concept

5m

2.3The CIS Benchmarks

2m

2.4Hardening the Foundation

2m

2.5Hardening Storage Devices

5m

2.6Firewalls and IPS/IDS as Endpoint Security

4m

2.7Managing Services

5m

2.8Lifecycle Management

4m

2.9Recommendations for Integrating Hardening Measures

5m
Module 3: System Hardening in Practice

3.1Hardening the Hardware

2m

3.2Hardening the Bootloader

4m

3.3Securing the Bootloader (Lab)

45m

3.4Securing the Kernel

9m

3.5Disabling Ctrl-Alt-Delete (Demo)

1m

3.6Securing the Kernel (Lab)

45m

3.7Securing Storage Devices Part 1

9m

3.8Securing Storage Devices Part 2

7m

3.9Disabling SUID and SGID Permissions (Demo)

1 minute

3.10Making the /boot Volume Read-Only (Lab)

45m

3.11Blocking Unwanted Activities and Traffic

7m

3.12Protecting Storage Devices (Lab)

45m

3.13Minimizing the OS Attack Surface Part 1

5m

3.14Minimizing the OS Attack Surface Part 2

4m

3.15Reducing the Attack Surface on a Server (Lab)

45m

3.16Network Hardening at the Host

4m

3.17Network Hardening at the Host (Lab)

45m

3.18System Administration Hardening

6m

3.19Hardening Administration through sudo (Lab)

45m

3.20Testing, Monitoring, and Reviewing

9m

3.21Log Management (Lab)

45m
Module 4: Services Hardening in Practice

4.1General Handling of Services Part 1

4m

4.2General Handling of Services Part 2

5m

4.3Basic Handling of Services (Lab)

45m

4.4Hardening Public-Facing Services

4m

4.5Hardening the Secure Shell (SSH) Service Part 1

6m

4.6Limiting Logins through SSH (Demo)

4m

4.7Hardening the Secure Shell (SSH) Service Part 2

2m

4.8Hardening SSH Services (Lab)

45m
Module 5: Accounts Hardening in Practice

5.1User Password Authentication Requirements

7m

5.2Alternate User Authentication Requirements

3m

5.3Creating and Implementing a Key Pair for Login (Demo)

4m

5.4Account Management Requirements

3m

5.5Hardening User Accounts (Lab)

45m

5.6Reviewing Accounts

6m

5.7Managing User Accounts (Lab)

45m
Module 6: Course Review and What's Next

6.1Linux Hardening Course Review

2m

6.2Linux Hardening - What's Next?

3m
Course Description

Who should take this course?

Our Linux Hardening course is designed for an intermediate-level learner with Linux system administration experience who is interested in learning more about how to secure their network.

What are the prerequisites for this course?

You will gain the most benefit from this course if you have familiarity with the Linux command-line and the Linux filesystem structure.

Why should I take this course?

Our Linux Hardening course will equip you with the knowledge and skills you need to secure your network. You’ll be able to articulate the best practices to secure the operating system, services, and user account administration when building a Linux server or workstation.

What makes this course different from other courses on similar topics?

This course was developed by Corey Holzer, who holds a PhD in Information Security as well as an MBA and Master's in Information Security. He has worked in network security and web development for years. He holds the CISSP, CRISC, CEH, CNDA, and Security+. In the course, Corey not only provides the theory on why it is important to harden your system but also provides guided demonstrations and hands-on labs so learners can apply what they’ve learned.

Why should I take this course on Cybrary and not somewhere else?

Our Linux Hardening course enables you to learn from one of the foremost experts in the field and apply what you have learned in hands-on labs. Our on-demand format affords you the flexibility to learn at your own pace and on your own schedule.

Instructed By
Corey Holzer
Corey Holzer
Information Systems Engineer
Senior Instructor
Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a Linux Hardening Certificate of Completion

Skillset