Course Library View the full range of courses
Accounting (92 courses)
Employability (850 courses)
Health and Social Care (129 courses)
IT & Software (100 courses)
Language (58 courses)
Management (346 courses)
Personal Development (1318 courses)
Teach & Education (99 courses)
Register on the Linux Security and Hardening today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career.
The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials.
Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get a certificate as proof of your course completion.
The Linux Security and Hardening course is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablets, and smartphones.
The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly!
Unit 01: Course Overview and Downloads | |||
Course Overview | 00:01:00 | ||
Unit 02: General Security | |||
Section Overview – General Security | 00:01:00 | ||
Is Linux Secure? | 00:02:00 | ||
What Makes Linux Secure? | 00:08:00 | ||
Security Guidelines and Principles | 00:08:00 | ||
Section Summary – General Security | 00:02:00 | ||
Unit 03: Physical Security | |||
Section Overview – Physical Security | 00:01:00 | ||
Physical Security Concepts | 00:08:00 | ||
Single User Mode Security | 00:07:00 | ||
Single User Mode and Blank Passwords | 00:03:00 | ||
Securing the Boot Loader | 00:07:00 | ||
Protected: Disk Encryption | 00:06:00 | ||
Encrypting a New Device, Part I | 00:09:00 | ||
Encrypting a New Device, Part II | 00:04:00 | ||
Encrypting an Existing Device | 00:01:00 | ||
Disabling Control Alt Delete | 00:02:00 | ||
Protected: Section Summary – Physical Security | 00:01:00 | ||
Unit 04: Account Security | |||
Section Overview – Account Security | 00:01:00 | ||
Intro to PAM | 00:05:00 | ||
PAM Configuration Example | 00:04:00 | ||
Password Security | 00:08:00 | ||
Account Security Demo #1 (UID 0) | 00:03:00 | ||
Controlling Account Access | 00:05:00 | ||
Security by Account Type | 00:06:00 | ||
Account Security Demo #2 | 00:03:00 | ||
Account Security Demo #3 (Sudo) | 00:05:00 | ||
Unit 05: Network Security | |||
Section Overview – Network Security | 00:01:00 | ||
Network Security, Part I | 00:08:00 | ||
Network Security, Part II | 00:06:00 | ||
Protected: Securing SSHD, Part I | 00:08:00 | ||
Securing SSHD, Part II | 00:03:00 | ||
Linux Firewall Fundamentals | 00:08:00 | ||
Configuring the Firewall from the Command Line | 00:04:00 | ||
Firewall Rule Specifications | 00:05:00 | ||
Protected: Example Firewall Rules | 00:04:00 | ||
Linux Firewall Demonstration | 00:10:00 | ||
TCP Wrappers, Part I | 00:07:00 | ||
TCP Wrappers, Part II | 00:04:00 | ||
Unit 06: File System Security | |||
Section Overview – File System Security | 00:01:00 | ||
File and Directory Permissions, Intro | 00:01:00 | ||
File and Directory Permissions, Part I | 00:11:00 | ||
Protected: File and Directory Permissions, Part II | 00:09:00 | ||
Special Modes, Part I | 00:08:00 | ||
Special Modes, Part II | 00:03:00 | ||
Protected: File Attributes | 00:06:00 | ||
File Attributes Demo | 00:03:00 | ||
ACLs | 00:09:00 | ||
ACLs Demo | 00:06:00 | ||
Rootkits | 00:09:00 | ||
Rootkit Hunter Demonstration | 00:07:00 | ||
Unit 07: Additional Resources | |||
Additional Resources | 00:05:00 | ||
Assignment | |||
Assignment -Linux Security and Hardening | 00:00:00 |
Can’t find the anwser you’re looking for ? Reach out to customer support team.
There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course.
You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience.
For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime.
Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks.
We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase.
Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course.
If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.