TeamOS-HKRG.CoM_Complete.Linux.Security_&_Hardening.with.Practical.Examples 收录时间:2022-02-06 15:19:15 文件大小:5GB 下载次数:1 最近下载:2022-02-06 15:19:15 磁力链接: magnet:?xt=urn:btih:05fbf724fc712ebe0e87bf0eeb204aeb28a055b3 立即下载 复制链接 文件列表 3. Lab Setup/5. Linux Installation.mp4 225MB 7. Securing Linux System/16. SELinux.mp4 191MB 4. Securing User Environment/17. Monitor User Activity.mp4 173MB 10. Additional Resources/12. NIC Bonding.mp4 161MB 8. Securing Linux System Network/4. Firewall (iptables – practical examples).mp4 152MB 8. Securing Linux System Network/6. Firewall (firewalld – Practical Examples).mp4 149MB 10. Additional Resources/5. sed Command Examples.mp4 136MB 10. Additional Resources/14. File System Check.mp4 125MB 10. Additional Resources/13. Advance Package Management.mp4 124MB 4. Securing User Environment/8. Set Password Policy.mp4 116MB 10. Additional Resources/9. System Log Monitor.mp4 109MB 7. Securing Linux System/3. Customize Message of the Day.mp4 107MB 6. Securing Linux Filesystem/5. Changing File Permission - LAB.mp4 106MB 4. Securing User Environment/16. sudo Access.mp4 105MB 7. Securing Linux System/13. Enable an Network Time Protocol (NTP or Chronyd).mp4 101MB 6. Securing Linux Filesystem/6. Changing FIle Ownership - LAB.mp4 92MB 5. PAM (Pluggable Authentication Module)/8. PAM Config File – Modules (SO).mp4 90MB 10. Additional Resources/11. File Transfer Commands.mp4 84MB 7. Securing Linux System/6. Keep Kernel and System Up to Date.mp4 83MB 6. Securing Linux Filesystem/7. Access Control List (ACL).mp4 81MB 7. Securing Linux System/7. Stop and Disable Unwanted Services.mp4 77MB 10. Additional Resources/6. Talking to Users.mp4 72MB 7. Securing Linux System/5. Remove Un-necessary or Orphan Packages.mp4 72MB 4. Securing User Environment/2. Understanding etcpasswd.mp4 71MB 8. Securing Linux System Network/9. SSH vs. Telnet.mp4 68MB 10. Additional Resources/3. Compress and Uncompress Files.mp4 67MB 4. Securing User Environment/11. Lock User Account After 3 Failed Attempts.mp4 67MB 4. Securing User Environment/7. Change Password Parameters.mp4 67MB 8. Securing Linux System Network/3. Firewall (iptables – tables, chains and targets).mp4 65MB 4. Securing User Environment/6. Create User Account and Change Password.mp4 58MB 7. Securing Linux System/9. Disable Ctrl+Alt+Delete.mp4 58MB 8. Securing Linux System Network/5. Firewall (firewalld).mp4 53MB 4. Securing User Environment/4. Understanding etcshadow.mp4 53MB 4. Securing User Environment/9. Lock or Disable User Accounts.mp4 51MB 4. Securing User Environment/10. Lock or Disable User Accounts Manually.mp4 49MB 5. PAM (Pluggable Authentication Module)/9. PAM Aware Services and Stacks.mp4 47MB 4. Securing User Environment/14. Implement UIDGID Policy.mp4 46MB 1. Introduction/1. Syllabus Overiew.mp4 43MB 7. Securing Linux System/2. Message of the Day.mp4 43MB 5. PAM (Pluggable Authentication Module)/2. What is PAM.mp4 41MB 10. Additional Resources/10. Recover Root Password.mp4 40MB 8. Securing Linux System Network/10. Turn Off IPV6 (If not in use).mp4 39MB 7. Securing Linux System/14. Lockdown Cronjobs.mp4 39MB 10. Additional Resources/8. Difference AD, openLDAP, WinBind etc..mp4 39MB 7. Securing Linux System/15. Change SSH Port.mp4 36MB 4. Securing User Environment/12. Restrict root Login.mp4 36MB 5. PAM (Pluggable Authentication Module)/4. The PAM Configuration Files Format.mp4 34MB 3. Lab Setup/3. Downloading and Installing Oracle VirtualBox.mp4 34MB 7. Securing Linux System/8. Separate Disk Partitions.mp4 33MB 8. Securing Linux System Network/7. Firewall (firewalld GUI).mp4 32MB 3. Lab Setup/4. Creating First Virtual Machine.mp4 32MB 4. Securing User Environment/5. The etclogin.def File.mp4 32MB 6. Securing Linux Filesystem/2. Linux File Types.mp4 32MB 10. Additional Resources/2. Getting Linux Commands Help.mp4 32MB 5. PAM (Pluggable Authentication Module)/5. PAM Config File – Module Interfaces.mp4 32MB 7. Securing Linux System/17. Backups.mp4 30MB 9. Securing Environment Around Linux/2. HardwareNetwork Firewall.mp4 29MB 4. Securing User Environment/3. Understanding etcgroup.mp4 27MB 4. Securing User Environment/13. Disable SSH Access for a Specific User.mp4 26MB 2. Security Concepts/6. Security Implementation Tools.mp4 25MB 10. Additional Resources/4. Changing Password.mp4 24MB 10. Additional Resources/15. Bonus Lecture.mp4 24MB 10. Additional Resources/7. User Directory Authentication.mp4 24MB 2. Security Concepts/5. Importance of Linux Security.mp4 23MB 7. Securing Linux System/11. Change Default Console Passwords (Only Physical).mp4 22MB 4. Securing User Environment/15. Centralized Authentication Service.mp4 22MB 2. Security Concepts/3. Comparing House Security with Computer Security.mp4 21MB 1. Introduction/3. Thank You.mp4 21MB 9. Securing Environment Around Linux/4. VPN Tunnel.mp4 21MB 2. Security Concepts/2. What is Security and OS Hardening.mp4 20MB 5. PAM (Pluggable Authentication Module)/3. The Importance of PAM.mp4 19MB 8. Securing Linux System Network/2. Introduction to Firewall.mp4 18MB 5. PAM (Pluggable Authentication Module)/7. PAM Config File – Control Flags.mp4 17MB 8. Securing Linux System Network/8. Encrypt Incoming and Outgoing Traffic.mp4 17MB 9. Securing Environment Around Linux/3. Network Address Translation (NAT).mp4 17MB 9. Securing Environment Around Linux/5. Application and Database Encryption.mp4 17MB 6. Securing Linux Filesystem/4. Linux File Ownership and Permissions.mp4 16MB 7. Securing Linux System/4. Physical Server Security.mp4 15MB 7. Securing Linux System/10. Running One Service per System.mp4 14MB 2. Security Concepts/7. Type of Security Breach.mp4 13MB 3. Lab Setup/7.4 4-Red_Hat_Enterprise_Linux-7-Installation_Guide-en-US.pdf.pdf 11MB 6. Securing Linux Filesystem/3. Linux File Attributes.mp4 11MB 3. Lab Setup/1. Welcome to Lab Setup.mp4 10MB 2. Security Concepts/4. Securing All Operating Systems.mp4 10MB 7. Securing Linux System/12. Disable USB Stick Detection.mp4 10MB 3. Lab Setup/2. What is Oracle VirtualBox.mp4 9MB 4. Securing User Environment/20.3 Red_Hat_Enterprise_Linux-7-System_Administrators_Guide-en-US.pdf.pdf 6MB 5. PAM (Pluggable Authentication Module)/6. Account Access Through PAM.mp4 5MB 7. Securing Linux System/19.4 Dell iDRAC Admin Guide.pdf.pdf 4MB 3. Lab Setup/7.3 2-Oracle Virtual Box User Manual.pdf.pdf 4MB 3. Lab Setup/7.2 3-CentOS Installation Guide.pdf.pdf 4MB 7. Securing Linux System/19.6 HP iLO Admin Guide.pdf.pdf 3MB 8. Securing Linux System Network/12.1 Red_Hat_Enterprise_Linux-7-Security_Guide-en-US.pdf.pdf 2MB 7. Securing Linux System/19.10 Red_Hat_Enterprise_Linux-7-SELinux_Users_and_Administrators_Guide-en-US.pdf.pdf 1MB 9. Securing Environment Around Linux/9. Congratulations.mp4 905KB 4. Securing User Environment/1. Welcome to Securing User Environment.mp4 555KB 10. Additional Resources/1. Welcome to Additional Resources.mp4 515KB 2. Security Concepts/1. Welcome to Security Concepts.mp4 503KB 8. Securing Linux System Network/12.2 Firewall (iptables).pdf.pdf 487KB 9. Securing Environment Around Linux/1. Welcome to Securing Environment Around Linux.mp4 473KB 5. PAM (Pluggable Authentication Module)/1. Welcome to PAM.mp4 441KB 6. Securing Linux Filesystem/1. Welcome to Securing Linux Filesystem.mp4 433KB 8. Securing Linux System Network/1. Welcome to Securing Linux Network.mp4 421KB 6. Securing Linux Filesystem/9.1 Access Control Lists.pdf.pdf 413KB 7. Securing Linux System/1. Welcome to Securing Linux System.mp4 413KB 6. Securing Linux Filesystem/9.4 File types in Linux.pdf.pdf 378KB 4. Securing User Environment/20.8 Set Password Policy.pdf.pdf 363KB 8. Securing Linux System Network/12.4 Turn Off IPV6.pdf.pdf 351KB 9. Securing Environment Around Linux/7.2 App and DB Encyption.pdf.pdf 346KB 8. Securing Linux System Network/12.6 Firewall (firewalld).pdf.pdf 340KB 1. Introduction/2.1 Syllabus - Complete Linux Security and Hardening with Practical Examples.pdf.pdf 337KB 8. Securing Linux System Network/12.5 SSH vs Telnet.pdf.pdf 326KB 5. PAM (Pluggable Authentication Module)/11.1 PAM.pdf.pdf 320KB 7. Securing Linux System/19.2 Remove Un-neccessary and Orphan Packages.pdf.pdf 314KB 7. Securing Linux System/19.5 NTP or Chronyd.pdf.pdf 290KB 7. Securing Linux System/19.9 Stop and Disable Unwanted Services.pdf.pdf 272KB 4. Securing User Environment/20.5 Disable Root Account in Linux.pdf.pdf 268KB 2. Security Concepts/9.2 3-Security Implementation Measures or Tools.pdf.pdf 261KB 9. Securing Environment Around Linux/7.4 Hardware Firewall.pdf.pdf 254KB 7. Securing Linux System/19.1 Disable Alt+Ctrl+Del.pdf.pdf 254KB 4. Securing User Environment/20.10 2-Understanding etc.group File.docx.pdf.pdf 252KB 4. Securing User Environment/20.9 User Accounts in Linux.pdf.pdf 248KB 7. Securing Linux System/19.8 Change SSH Port.pdf.pdf 247KB 8. Securing Linux System Network/12.3 Encrypt Incoming and Outgoing Traffic.pdf.pdf 244KB 2. Security Concepts/9.5 2-Importance of Linux Security.pdf.pdf 243KB 5. PAM (Pluggable Authentication Module)/11.2 Linux-PAM System Administrator Guide.pdf.pdf 237KB 6. Securing Linux Filesystem/9.2 File Permissions and Ownership.pdf.pdf 234KB 2. Security Concepts/9.3 1-Introduction to Computer Security.pdf.pdf 225KB 9. Securing Environment Around Linux/7.3 VPN.pdf.pdf 222KB 4. Securing User Environment/20.4 1-Understanding etc.passwd File.pdf.pdf 220KB 3. Lab Setup/8.1 Section 3 - Homework.pdf.pdf 219KB 2. Security Concepts/9.4 5-Types of Cyber Security Breach.pdf.pdf 214KB 9. Securing Environment Around Linux/7.1 NAT.pdf.pdf 211KB 7. Securing Linux System/19.3 Message of the Day Examples.pdf.pdf 211KB 4. Securing User Environment/20.6 Switch-users-and-Sudo-Access.pdf.pdf 203KB 3. Lab Setup/7.1 1-Changing-from-32-to-64bit.pdf.pdf 159KB 4. Securing User Environment/20.2 Change Password in Linux.pdf.pdf 154KB 4. Securing User Environment/20.1 User Account Management.pdf.pdf 135KB 7. Securing Linux System/19.7 rpm commands.pdf.pdf 122KB 4. Securing User Environment/20.7 Passwords Standards.pdf.pdf 121KB 6. Securing Linux Filesystem/9.3 File Permissions Cheat Sheet.pdf.pdf 67KB 2. Security Concepts/9.1 4-15 Other Linux Security Tools.pdf.pdf 39KB 7. Securing Linux System/16. SELinux.vtt 35KB 8. Securing Linux System Network/4. Firewall (iptables – practical examples).vtt 25KB 3. Lab Setup/5. Linux Installation.vtt 25KB 4. Securing User Environment/17. Monitor User Activity.vtt 23KB 8. Securing Linux System Network/6. Firewall (firewalld – Practical Examples).vtt 22KB 10. Additional Resources/5. sed Command Examples.vtt 19KB 4. Securing User Environment/16. sudo Access.vtt 18KB 10. Additional Resources/14. File System Check.vtt 17KB 10. Additional Resources/13. Advance Package Management.vtt 16KB 7. Securing Linux System/7. Stop and Disable Unwanted Services.vtt 16KB 10. Additional Resources/12. NIC Bonding.vtt 16KB 7. Securing Linux System/13. Enable an Network Time Protocol (NTP or Chronyd).vtt 14KB 7. Securing Linux System/5. Remove Un-necessary or Orphan Packages.vtt 13KB 8. Securing Linux System Network/3. Firewall (iptables – tables, chains and targets).vtt 12KB 6. Securing Linux Filesystem/7. Access Control List (ACL).vtt 12KB 7. Securing Linux System/6. Keep Kernel and System Up to Date.vtt 12KB 4. Securing User Environment/8. Set Password Policy.vtt 11KB 6. Securing Linux Filesystem/5. Changing File Permission - LAB.vtt 11KB 7. Securing Linux System/3. Customize Message of the Day.vtt 11KB 10. Additional Resources/9. System Log Monitor.vtt 11KB 6. Securing Linux Filesystem/6. Changing FIle Ownership - LAB.vtt 11KB 8. Securing Linux System Network/9. SSH vs. Telnet.vtt 11KB 10. Additional Resources/11. File Transfer Commands.vtt 10KB 5. PAM (Pluggable Authentication Module)/8. PAM Config File – Modules (SO).vtt 10KB 4. Securing User Environment/2. Understanding etcpasswd.vtt 10KB 10. Additional Resources/3. Compress and Uncompress Files.vtt 10KB 10. Additional Resources/8. Difference AD, openLDAP, WinBind etc..vtt 10KB 8. Securing Linux System Network/5. Firewall (firewalld).vtt 9KB 4. Securing User Environment/6. Create User Account and Change Password.vtt 9KB 4. Securing User Environment/11. Lock User Account After 3 Failed Attempts.vtt 9KB 7. Securing Linux System/15. Change SSH Port.vtt 9KB 1. Introduction/1. Syllabus Overiew.vtt 9KB 7. Securing Linux System/9. Disable Ctrl+Alt+Delete.vtt 9KB 10. Additional Resources/6. Talking to Users.vtt 8KB 7. Securing Linux System/17. Backups.vtt 8KB 5. PAM (Pluggable Authentication Module)/2. What is PAM.vtt 8KB 4. Securing User Environment/7. Change Password Parameters.vtt 8KB 7. Securing Linux System/2. Message of the Day.vtt 8KB 4. Securing User Environment/12. Restrict root Login.vtt 8KB 4. Securing User Environment/9. Lock or Disable User Accounts.vtt 7KB 4. Securing User Environment/10. Lock or Disable User Accounts Manually.vtt 7KB 5. PAM (Pluggable Authentication Module)/9. PAM Aware Services and Stacks.vtt 7KB 4. Securing User Environment/4. Understanding etcshadow.vtt 7KB 4. Securing User Environment/14. Implement UIDGID Policy.vtt 7KB 9. Securing Environment Around Linux/2. HardwareNetwork Firewall.vtt 7KB 10. Additional Resources/7. User Directory Authentication.vtt 7KB 7. Securing Linux System/14. Lockdown Cronjobs.vtt 7KB 7. Securing Linux System/8. Separate Disk Partitions.vtt 6KB 2. Security Concepts/5. Importance of Linux Security.vtt 6KB 9. Securing Environment Around Linux/4. VPN Tunnel.vtt 6KB 8. Securing Linux System Network/10. Turn Off IPV6 (If not in use).vtt 6KB 2. Security Concepts/6. Security Implementation Tools.vtt 6KB 6. Securing Linux Filesystem/2. Linux File Types.vtt 6KB 4. Securing User Environment/5. The etclogin.def File.vtt 6KB 8. Securing Linux System Network/7. Firewall (firewalld GUI).vtt 6KB 10. Additional Resources/10. Recover Root Password.vtt 6KB 4. Securing User Environment/3. Understanding etcgroup.vtt 6KB 5. PAM (Pluggable Authentication Module)/5. PAM Config File – Module Interfaces.vtt 5KB 10. Additional Resources/2. Getting Linux Commands Help.vtt 5KB 4. Securing User Environment/13. Disable SSH Access for a Specific User.vtt 5KB 2. Security Concepts/2. What is Security and OS Hardening.vtt 5KB 4. Securing User Environment/15. Centralized Authentication Service.vtt 5KB 3. Lab Setup/4. Creating First Virtual Machine.vtt 5KB 7. Securing Linux System/11. Change Default Console Passwords (Only Physical).vtt 5KB 8. Securing Linux System Network/2. Introduction to Firewall.vtt 5KB 7. Securing Linux System/10. Running One Service per System.vtt 5KB 10. Additional Resources/4. Changing Password.vtt 4KB 7. Securing Linux System/4. Physical Server Security.vtt 4KB 9. Securing Environment Around Linux/5. Application and Database Encryption.vtt 4KB 2. Security Concepts/7. Type of Security Breach.vtt 4KB 5. PAM (Pluggable Authentication Module)/4. The PAM Configuration Files Format.vtt 4KB 2. Security Concepts/3. Comparing House Security with Computer Security.vtt 4KB 9. Securing Environment Around Linux/3. Network Address Translation (NAT).vtt 4KB 8. Securing Linux System Network/8. Encrypt Incoming and Outgoing Traffic.vtt 4KB 10. Additional Resources/15. Bonus Lecture.vtt 4KB 5. PAM (Pluggable Authentication Module)/3. The Importance of PAM.vtt 4KB 6. Securing Linux Filesystem/4. Linux File Ownership and Permissions.vtt 4KB 2. Security Concepts/4. Securing All Operating Systems.vtt 4KB 6. Securing Linux Filesystem/3. Linux File Attributes.vtt 3KB 5. PAM (Pluggable Authentication Module)/7. PAM Config File – Control Flags.vtt 3KB 3. Lab Setup/1. Welcome to Lab Setup.vtt 3KB 3. Lab Setup/3. Downloading and Installing Oracle VirtualBox.vtt 3KB 7. Securing Linux System/12. Disable USB Stick Detection.vtt 2KB 3. Lab Setup/2. What is Oracle VirtualBox.vtt 2KB 7. Securing Linux System/20. Homework.html 2KB 4. Securing User Environment/19. Homework.html 2KB 5. PAM (Pluggable Authentication Module)/6. Account Access Through PAM.vtt 1KB 6. Securing Linux Filesystem/10. Homework.html 1KB 3. Lab Setup/8. Homework.html 1KB 1. Introduction/3. Thank You.vtt 935B 8. Securing Linux System Network/13. Homework.html 690B 9. Securing Environment Around Linux/8. Homework.html 459B 5. PAM (Pluggable Authentication Module)/12. Homework.html 209B 2. Security Concepts/8. Quiz.html 168B 3. Lab Setup/6. Quiz.html 168B 4. Securing User Environment/18. Quiz.html 168B 5. PAM (Pluggable Authentication Module)/10. Quiz.html 168B 6. Securing Linux Filesystem/8. Quiz.html 168B 7. Securing Linux System/18. Quiz.html 168B 8. Securing Linux System Network/11. Quiz.html 168B 9. Securing Environment Around Linux/6. Quiz.html 168B 7. Securing Linux System/19. Handouts.html 57B 2. Security Concepts/10. Homework.html 49B 8. Securing Linux System Network/12. Handouts.html 48B 4. Securing User Environment/20. Handouts.html 44B 1. Introduction/2. Download Syllabus.html 42B 9. Securing Environment Around Linux/7. Handouts.html 37B 2. Security Concepts/9. Handouts.html 35B 5. PAM (Pluggable Authentication Module)/11. Handouts.html 35B 6. Securing Linux Filesystem/9. Handouts.html 35B 3. Lab Setup/7. Handouts.html 34B 2. Security Concepts/1. Welcome to Security Concepts.vtt 8B 4. Securing User Environment/1. Welcome to Securing User Environment.vtt 8B 5. PAM (Pluggable Authentication Module)/1. Welcome to PAM.vtt 8B 6. Securing Linux Filesystem/1. Welcome to Securing Linux Filesystem.vtt 8B 7. Securing Linux System/1. Welcome to Securing Linux System.vtt 8B 8. Securing Linux System Network/1. Welcome to Securing Linux Network.vtt 8B 9. Securing Environment Around Linux/1. Welcome to Securing Environment Around Linux.vtt 8B 9. Securing Environment Around Linux/9. Congratulations.vtt 8B 10. Additional Resources/1. Welcome to Additional Resources.vtt 8B