Free

Linux Hardening

Are you a Linux systems administrator seeking to learn the best practices for securing your network? In this Linux Hardening course, Corey Holzer walks you through hardening for the system level, services, and user account management and you apply these concepts in a series of secure virtual labs.
11
49
M
Time
intermediate
difficulty
12
ceu/cpe

Course Content

Blocking Unwanted Activities and Traffic

8m

System Hardening in Practice
Making the /boot Volume Read-Only (Lab)

45m

System Hardening in Practice
Securing Storage Devices Part 2

7m

System Hardening in Practice
Securing Storage Devices Part 1

9m

System Hardening in Practice
Securing the Kernel (Lab)

45m

System Hardening in Practice
Disabling Ctrl-Alt-Delete (Demo)

1m

System Hardening in Practice
Securing the Kernel

9m

System Hardening in Practice
Securing the Bootloader (Lab)

45m

System Hardening in Practice
Hardening the Bootloader

4m

System Hardening in Practice
Hardening the Hardware

2m

System Hardening in Practice
Lifecycle Management

4m

Hardening in Theory
Managing Services

5m

Hardening in Theory
Hardening Storage Devices

5m

Hardening in Theory
Hardening the Foundation

2m

Hardening in Theory
The CIS Benchmarks

2m

Hardening in Theory
Why We Harden

4m

Hardening in Theory
Linux Hardening - Course Overview and Instructor Introduction

5m

Linux Hardening Course Overview and Instructor Introduction
Linux Hardening - What's Next?

4m

Course Review and What's Next
Linux Hardening Course Review

2m

Course Review and What's Next
Course Description

Who should take this course?

Our Linux Hardening course is designed for an intermediate-level learner with Linux system administration experience who is interested in learning more about how to secure their network.

What are the prerequisites for this course?

You will gain the most benefit from this course if you have familiarity with the Linux command-line and the Linux filesystem structure.

Why should I take this course?

Our Linux Hardening course will equip you with the knowledge and skills you need to secure your network. You’ll be able to articulate the best practices to secure the operating system, services, and user account administration when building a Linux server or workstation.

What makes this course different from other courses on similar topics?

This course was developed by Corey Holzer, who holds a PhD in Information Security as well as an MBA and Master's in Information Security. He has worked in network security and web development for years. He holds the CISSP, CRISC, CEH, CNDA, and Security+. In the course, Corey not only provides the theory on why it is important to harden your system but also provides guided demonstrations and hands-on labs so learners can apply what they’ve learned.

Why should I take this course on Cybrary and not somewhere else?

Our Linux Hardening course enables you to learn from one of the foremost experts in the field and apply what you have learned in hands-on labs. Our on-demand format affords you the flexibility to learn at your own pace and on your own schedule.

This course is part of a Career Path:
No items found.

Instructed by

Senior Instructor
Corey Holzer

My current title is Information Systems Engineer. As part of my quest for self-improvement, I earned multiple degrees including a Ph.D. in Information Security from Purdue (2016); a Master of Science in Networking and Communications Management (2009) and Master in Business Administration (2009) from Keller Graduate School of Management; a Master of Arts (1994) from St. John's University NY. I also hold multiple industry certifications including CISSP, Security+, CNDA, and CEH.

Growing up in New York City, NY, much of my 13 years of IT work experience in the private sector came while I lived there. My positions included roles from entry-level technician for World Wrestling Entertainment through Lead web developer and Technical Project Manager on several multi-million dollar projects for J. Walter Thompson’s new media division. In 2006, I transitioned over to the public sector. My military career also focuses on Information Technology. In the last 14 years, I filled various technology positions involving systems and network administration, technical project management, and team lead for multiple capability development projects.

At a young age I discovered my love for technology and computers. It began with figuring out how technology worked by taking it apart. Mom wasn’t happy when she found the remains of my tape recorder in my room. I soon moved on to learning about computers and programming languages. While the term “hacker” has taken on a negative connotation in recent years, I still consider myself a hacker based on the original description of the word when talking about people like Gates and Jobs.

I first discovered Cybrary last year when I started studying for the CCNA exam. When I learned they needed instructors for various courses, I applied. Mentorship is one of my favorite aspects of the various roles I held in the last few years. Being an instructor affords me more opportunities for mentorship.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Linux Hardening Certificate of Completion