In this video, review the general security section of the course.
- [Instructor] In this section of the course, you learn that…even though Linux is a relatively secure operating system,…that doesn't mean you can let your guard down.…End users and system administrators alike…play an important role in security.…Some of those people may not have the proper training.…Some are not security-focused,…and everybody makes mistakes from time to time.…Sometimes, those mistakes can have security implications.…We also talked about how security is an ongoing process.…Once systems are put into service, they change through use.…
Accounts need to be created or deleted,…logs need to be monitored, et cetera.…Security is a consideration…for the entire lifespan of a system.…You also learned about some of the security features…of Linux, including that it's open source.…It's not as easy or popular of a target…than some other operating systems are currently.…You also learned about the security advantages…of using packages provided by popular Linux distributions.…We even talked about the advantages of Linux…
Author
Released
6/11/2018- What makes Linux secure?
- Physical security concepts
- Encrypting new and existing devices
- Account and network security
- Linux firewall fundamentals
- File system security
- File and directory permissions
- ACLs and rootkits
Skill Level Intermediate
Duration
Views
Related Courses
-
Linux: Bash Shell and Scripts
with Kevin Dankwardt2h 46m Intermediate -
Building an Ubuntu Home Server
with Scott Simpson2h 16m Beginner
-
Introduction
-
Welcome1m 25s
-
-
1. General Security
-
General security1m 9s
-
Is Linux secure?2m 26s
-
What makes Linux secure?8m 18s
-
-
2. Physical Security
-
Physical security concepts7m 41s
-
Single user mode security6m 45s
-
Secure the bootloader6m 57s
-
Disk encryption5m 34s
-
Encrypt a new device: Part 18m 38s
-
Encrypt a new device: Part 24m 17s
-
Disable Control-Alt-Delete1m 44s
-
3. Account Security
-
Account security45s
-
Introduction to PAM5m 13s
-
Password security7m 58s
-
Control account access5m 6s
-
Security by account type6m 1s
-
Account security: Demo 22m 44s
-
-
4. Network Security
-
Network security35s
-
Network security: Part 17m 54s
-
Network security: Part 26m 20s
-
Secure SSHD: Part 17m 52s
-
Secure SSHD: Part 23m 15s
-
Linux firewall fundamentals7m 36s
-
Firewall rule specifications4m 43s
-
Example firewall rules3m 59s
-
Linux firewall demo9m 47s
-
TCP Wrappers: Part 17m 2s
-
TCP Wrappers: Part 24m 2s
-
-
5. File System Security
-
File system security1m 2s
-
Special modes: Part 17m 55s
-
Special modes: Part 23m 4s
-
File attributes6m 5s
-
File attributes demo2m 48s
-
ACLs9m 25s
-
ACLs demo6m 13s
-
Rootkits8m 33s
-
Rootkit hunter demo7m 12s
-
-
Conclusion
-
Summary4m 52s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Section summary: General security