Krafty Internet Marketing Forum
Hands on Linux Host Security for SysAdmins - Printable Version

+- Krafty Internet Marketing Forum (https://kraftymarketingprofits.com/internetmarketingforum)
+-- Forum: Internet Marketing Tips, Tricks, Courses & Bots! (https://kraftymarketingprofits.com/internetmarketingforum/Forum-internet-marketing-tips-tricks-courses-bots--50)
+--- Forum: Internet Marketing Special Downloads! (https://kraftymarketingprofits.com/internetmarketingforum/Forum-internet-marketing-special-downloads--53)
+--- Thread: Hands on Linux Host Security for SysAdmins (/Thread-hands-on-linux-host-security-for-sysadmins--32873)



Hands on Linux Host Security for SysAdmins - aretr - 09-12-2019

[Image: e4bc8b902b9c910d433a8fd1486d7fcd.jpg]

Hands-on Linux Host Security for SysAdmins
.MP4, AVC, 1920x1080, 30 fps | English, AAC, 2 Ch | 1h 20m | 325 MB
Instructor: Paul Olushile

Gain critical familiarity with the best security tools (AIDE, Rootkit Hunter (rkhunter), and chroot) and access-limiting, auditing tools on host Linux systems
Learn
Examine the Linux procfs filesystem, use systcl to read and write to procfs files, and work hands-on with ASLR
Perform port scanning and network service detection to reduce exposure to the outside world
Make use of chroot to lock users into jails to restrict their access and secure environments
Perform security practicals without the Linux auditing system installed
Monitor system changes with AIDE (Advanced Intrusion Detection Environment)
Use rootkit hunter to find changes in binaries or additional files monitoring the Linux Server
Implement limits and display enforced limits using the command shell built limit, adjust limits, then persist them via the limits.conf file
About
Gaining access to a local user is the first thing a system intruder attempts. Indeed, local users themselves can also cause havoc with your system, especially because they are real people who can exploit your personal data with minimal human engineering. This course will take you through how to lock up your host more securely.
In this course, you will learn the skills you need to lock your Linux server down and protect your data and other resources by tuning the Linux kernel using various commands, practical ports, and service monitoring. You will learn how to perform operations that change the apparent root directory to jail (mis)users. You will learn about Linux Auditing System tools and associated traceability issues, and then work hands-on with malware detection tools, rootkits, and more. You will also learn to limit user access to resources and how to deal with processing and statistics.
By the end of this course, you will have gained the skills and knowledge you need to make sure that your local security is tight and secure. You'll be confident about hardening your Linux servers so intruders have more hurdles to cross.
Features
Tune the kernel via procfs (using systctl to write as root user in the file), scan ports, and use service detection to protect the system from outside attacks
Discover the best industry-leading tools to secure your server, and the best host system to jail users and restrict access to system files
Take charge of malware detection tools such as AIDE (Advanced Intrusion Detection Environment) then implement, enforce, and persist limits on Linux systems
More Info
Code:
https://www.packtpub.com/cloud-networking/hands-on-linux-host-security-for-sysadmins-video



[Image: 9fb5237e0c679a98d0cc341c5a3bc9f5.jpg]
DOWNLOAD

Code:
http://nitroflare.com/view/662CE19BEB44CB1/dqkdd.Handson.Linux.Host.Security.for.SysAdmins.rar

Code:
https://rapidgator.net/file/b9b6ecd46e589430d7e9a4f8e1521227/dqkdd.Handson.Linux.Host.Security.for.SysAdmins.rar