CompTIA Linux+: Securing Linux
CompTIA
| Intermediate
- 10 videos | 52m 44s
- Includes Assessment
- Earns a Badge
Hardening Linux hosts reduces the potential for security incidents. A wide variety of techniques can be employed to secure the Linux boot process through advanced file system permissions. Begin this course by exploring hardening techniques related to the Linux system. You will discover how Unified Extensible Firmware Interface (UEFI) secure boot can help secure the Linux boot process. Then you will learn how to control default file system permissions with umask, scan for open ports using nmap, and run a vulnerability assessment against a Linux host. Next, you will disable and remove unneeded components and configurations in Linux and configure a reverse shell. Finally, you will find out how to manage advanced file system permissions related to SUID, group ID (GID), and the sticky bit. This course can be used to prepare for the Linux+ XK0-005 certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseSecure a linux system, including user accounts and passwords, as well as securing services and settingsRecognize how uefi secure boot helps secure linux environmentsManage file system permissions defaults with umaskUse nmap to scan a linux host
-
Run a vulnerability scan against a linux hostDisable and remove unneeded components and tweak kernel parametersSet and mitigate reverse shell configurations in linuxDetermine when and how to set the suid, group id (gid), and sticky bet permissionsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 13sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 30sDuring this video, you will learn how to secure a Linux system, including user accounts and passwords, as well as securing services and settings. FREE ACCESS
-
5m 7sUpon completion of this video, you will be able to recognize how UEFI secure boot helps secure Linux environments. FREE ACCESS
-
5m 47sDiscover how to manage file system permissions defaults with umask. FREE ACCESS
-
6m 22sIn this video, find out how to use Nmap to scan a Linux host. FREE ACCESS
-
6m 27sLearn how to run a vulnerability scan against a Linux host. FREE ACCESS
-
6m 16sDuring this video, discover how to disable and remove unneeded components and tweak kernel parameters. FREE ACCESS
-
6m 22sFind out how to set and mitigate reverse shell configurations in Linux. FREE ACCESS
-
6m 48sIn this video, learn how to determine when and how to set the SUID, group ID (GID), and sticky bet permissions. FREE ACCESS
-
55sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.