In this video, learn how to encrypt data. Additionally, learn how to use dm-crypt and LUKS on Linux systems.
- [Instructor] If you don't want someone to easily read…or alter the data on your system's disk,…then you should encrypt it.…When you encrypt your data,…it looks like a large blob of random data.…For example, if you were to encrypt the text, letmein123,…it might look like the seemingly random series of letters…and numbers displayed on your screen.…The OS can't operate on this nonsensical data.…So after you encrypt your data,…you need to allow the operating system and its applications…access to that data in a way that can be understood by them.…
In short, the OS needs access to the decrypted…or unlocked form of that data.…To unlock the encrypted data, a user needs to supply…some sort of secret information.…This can be a passphrase or a keyfile.…In some cases, this passphrase or key is used to encrypt…and decrypt the data.…In other cases, it's used to unlock the master key…that is used to do the actual encryption and decryption.…In any case, it's stored in memory…for as long as the encrypted device is mounted.…
Author
Released
6/11/2018- What makes Linux secure?
- Physical security concepts
- Encrypting new and existing devices
- Account and network security
- Linux firewall fundamentals
- File system security
- File and directory permissions
- ACLs and rootkits
Skill Level Intermediate
Duration
Views
Related Courses
-
Linux: Bash Shell and Scripts
with Kevin Dankwardt2h 46m Intermediate -
Building an Ubuntu Home Server
with Scott Simpson2h 16m Beginner
-
Introduction
-
Welcome1m 25s
-
-
1. General Security
-
General security1m 9s
-
Is Linux secure?2m 26s
-
What makes Linux secure?8m 18s
-
-
2. Physical Security
-
Physical security concepts7m 41s
-
Single user mode security6m 45s
-
Secure the bootloader6m 57s
-
Disk encryption5m 34s
-
Encrypt a new device: Part 18m 38s
-
Encrypt a new device: Part 24m 17s
-
Disable Control-Alt-Delete1m 44s
-
3. Account Security
-
Account security45s
-
Introduction to PAM5m 13s
-
Password security7m 58s
-
Control account access5m 6s
-
Security by account type6m 1s
-
Account security: Demo 22m 44s
-
-
4. Network Security
-
Network security35s
-
Network security: Part 17m 54s
-
Network security: Part 26m 20s
-
Secure SSHD: Part 17m 52s
-
Secure SSHD: Part 23m 15s
-
Linux firewall fundamentals7m 36s
-
Firewall rule specifications4m 43s
-
Example firewall rules3m 59s
-
Linux firewall demo9m 47s
-
TCP Wrappers: Part 17m 2s
-
TCP Wrappers: Part 24m 2s
-
-
5. File System Security
-
File system security1m 2s
-
Special modes: Part 17m 55s
-
Special modes: Part 23m 4s
-
File attributes6m 5s
-
File attributes demo2m 48s
-
ACLs9m 25s
-
ACLs demo6m 13s
-
Rootkits8m 33s
-
Rootkit hunter demo7m 12s
-
-
Conclusion
-
Summary4m 52s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Disk encryption