CompTIA Linux+: Securing Linux

CompTIA    |    Intermediate
  • 10 videos | 52m 44s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 18 users Rating 4.4 of 18 users (18)
Hardening Linux hosts reduces the potential for security incidents. A wide variety of techniques can be employed to secure the Linux boot process through advanced file system permissions. Begin this course by exploring hardening techniques related to the Linux system. You will discover how Unified Extensible Firmware Interface (UEFI) secure boot can help secure the Linux boot process. Then you will learn how to control default file system permissions with umask, scan for open ports using nmap, and run a vulnerability assessment against a Linux host. Next, you will disable and remove unneeded components and configurations in Linux and configure a reverse shell. Finally, you will find out how to manage advanced file system permissions related to SUID, group ID (GID), and the sticky bit. This course can be used to prepare for the Linux+ XK0-005 certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Secure a linux system, including user accounts and passwords, as well as securing services and settings
    Recognize how uefi secure boot helps secure linux environments
    Manage file system permissions defaults with umask
    Use nmap to scan a linux host
  • Run a vulnerability scan against a linux host
    Disable and remove unneeded components and tweak kernel parameters
    Set and mitigate reverse shell configurations in linux
    Determine when and how to set the suid, group id (gid), and sticky bet permissions
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 13s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 30s
    During this video, you will learn how to secure a Linux system, including user accounts and passwords, as well as securing services and settings. FREE ACCESS
  • Locked
    3.  Managing Unified Extensible Firmware Interface (UEFI) Secure Boot
    5m 7s
    Upon completion of this video, you will be able to recognize how UEFI secure boot helps secure Linux environments. FREE ACCESS
  • Locked
    4.  Setting Default File System Permissions with umask
    5m 47s
    Discover how to manage file system permissions defaults with umask. FREE ACCESS
  • Locked
    5.  Scanning Linux Hosts for Open Ports
    6m 22s
    In this video, find out how to use Nmap to scan a Linux host. FREE ACCESS
  • Locked
    6.  Assessing Linux Security
    6m 27s
    Learn how to run a vulnerability scan against a Linux host. FREE ACCESS
  • Locked
    7.  Disabling and Removing Unnecessary Components
    6m 16s
    During this video, discover how to disable and remove unneeded components and tweak kernel parameters. FREE ACCESS
  • Locked
    8.  Configuring a Linux Reverse Shell
    6m 22s
    Find out how to set and mitigate reverse shell configurations in Linux. FREE ACCESS
  • Locked
    9.  Managing Advanced File System Permissions
    6m 48s
    In this video, learn how to determine when and how to set the SUID, group ID (GID), and sticky bet permissions. FREE ACCESS
  • Locked
    10.  Course Summary
    55s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.3 of 15 users Rating 4.3 of 15 users (15)
Rating 4.8 of 52 users Rating 4.8 of 52 users (52)
Rating 4.5 of 39 users Rating 4.5 of 39 users (39)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 39 users Rating 4.5 of 39 users (39)
Rating 4.6 of 7 users Rating 4.6 of 7 users (7)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)