23 OCT 2025 - We are back! If you have been following us over the last few years, you will know that the last 2 months have been rough. We website was practically not loading. Sorry for the mess. We are back though and everything should run smoothly now. New servers. Updated domains. And new owners. We invite you all to start uploading torrents again!
TORRENT DETAILS
[FreeCoursesOnline.Me] [Packtpub.Com] Linux Security And Hardening, The Practical Security Guide - [FCO]
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Keep yourself and your company out of the news by protecting your Linux systems from hackers, crackers, and attackers! This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step. By the end of this course, you will be able to tighten up the security on any Linux system. You’ll learn the security weaknesses of the Linux operating system and will be given step-by-step instructions on how to protect those weaknesses. You’ll even learn some security concepts that apply to information security as a whole while focusing on Linux-specific issues that require special consideration. What you learn in this course applies to any Linux environment or distribution including Ubuntu, Debian, Linux Mint, RedHat, CentOS, Fedora, OpenSUSE, Slackware, Kali Linux, and more.
Style and Approach
In this course we not only teach you the security concepts and guidelines that will keep your Linux servers safe, but we also will walk you through hardening measures step-by-step.
What You Will Learn
- How to protect your Linux systems against hackers.
- Ways to prevent attackers from breaking into your systems, even when they have physical access to your machine.
- How to enforce strong password policies and control password as well as account aging policies on your Linux servers.
- SSH Hardening practices.
- Network security tactics.
- Port scanning and network service detection.
- How the Linux firewall works and exactly how to configure it.
- How to protect the superuser (root) account.
- Ways to share accounts securely with an audit trail.
- File system security and encryption.
- Using and configuring sudo, and why you need to.
- Advanced Linux permissions, including special modes, file attributes, and access control lists (ACLs).
Authors
Jason Cannon
Linux Training Academy was founded by Jason Cannon. This academy provides training and resources on Linux starting at the most basic and beginner level to ninja level of skills at command line. It shares articles, tutorials, how-to’s, exercises, and pro-tips on their blog with students who are struggling with a particular problem. They not only teach you how Linux works, but also demonstrate how to put that knowledge to good use.
For More Udemy Free Courses >>> http://www.freetutorials.eu
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Our Forum for discussion >>> https://discuss.freetutorials.us/
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
1 - Course Overview and Downloads/Course Overview.mp4
2.7 MB
2 - General Security/Is Linux Secure.mp4
5 MB
2 - General Security/Section Overview.mp4
2.3 MB
2 - General Security/Section Summary.mp4
3 MB
2 - General Security/Security Guidelines and Principles.mp4
15.2 MB
2 - General Security/What Makes Linux Secure.mp4
17.7 MB
3 - Physical Security/Disabling Control Alt Delete.mp4
5.8 MB
3 - Physical Security/Disk Encryption.mp4
13.2 MB
3 - Physical Security/Encrypting a New Device, Part I.mp4
30.6 MB
3 - Physical Security/Encrypting a New Device, Part II.mp4
14.4 MB
3 - Physical Security/Encrypting an Existing Device.mp4