589689.xyz

TeamOS-HKRG.CoM_Complete.Linux.Security_&_Hardening.with.Practical.Examples

  • 收录时间:2022-02-06 15:19:15
  • 文件大小:5GB
  • 下载次数:1
  • 最近下载:2022-02-06 15:19:15
  • 磁力链接:

文件列表

  1. 3. Lab Setup/5. Linux Installation.mp4 225MB
  2. 7. Securing Linux System/16. SELinux.mp4 191MB
  3. 4. Securing User Environment/17. Monitor User Activity.mp4 173MB
  4. 10. Additional Resources/12. NIC Bonding.mp4 161MB
  5. 8. Securing Linux System Network/4. Firewall (iptables – practical examples).mp4 152MB
  6. 8. Securing Linux System Network/6. Firewall (firewalld – Practical Examples).mp4 149MB
  7. 10. Additional Resources/5. sed Command Examples.mp4 136MB
  8. 10. Additional Resources/14. File System Check.mp4 125MB
  9. 10. Additional Resources/13. Advance Package Management.mp4 124MB
  10. 4. Securing User Environment/8. Set Password Policy.mp4 116MB
  11. 10. Additional Resources/9. System Log Monitor.mp4 109MB
  12. 7. Securing Linux System/3. Customize Message of the Day.mp4 107MB
  13. 6. Securing Linux Filesystem/5. Changing File Permission - LAB.mp4 106MB
  14. 4. Securing User Environment/16. sudo Access.mp4 105MB
  15. 7. Securing Linux System/13. Enable an Network Time Protocol (NTP or Chronyd).mp4 101MB
  16. 6. Securing Linux Filesystem/6. Changing FIle Ownership - LAB.mp4 92MB
  17. 5. PAM (Pluggable Authentication Module)/8. PAM Config File – Modules (SO).mp4 90MB
  18. 10. Additional Resources/11. File Transfer Commands.mp4 84MB
  19. 7. Securing Linux System/6. Keep Kernel and System Up to Date.mp4 83MB
  20. 6. Securing Linux Filesystem/7. Access Control List (ACL).mp4 81MB
  21. 7. Securing Linux System/7. Stop and Disable Unwanted Services.mp4 77MB
  22. 10. Additional Resources/6. Talking to Users.mp4 72MB
  23. 7. Securing Linux System/5. Remove Un-necessary or Orphan Packages.mp4 72MB
  24. 4. Securing User Environment/2. Understanding etcpasswd.mp4 71MB
  25. 8. Securing Linux System Network/9. SSH vs. Telnet.mp4 68MB
  26. 10. Additional Resources/3. Compress and Uncompress Files.mp4 67MB
  27. 4. Securing User Environment/11. Lock User Account After 3 Failed Attempts.mp4 67MB
  28. 4. Securing User Environment/7. Change Password Parameters.mp4 67MB
  29. 8. Securing Linux System Network/3. Firewall (iptables – tables, chains and targets).mp4 65MB
  30. 4. Securing User Environment/6. Create User Account and Change Password.mp4 58MB
  31. 7. Securing Linux System/9. Disable Ctrl+Alt+Delete.mp4 58MB
  32. 8. Securing Linux System Network/5. Firewall (firewalld).mp4 53MB
  33. 4. Securing User Environment/4. Understanding etcshadow.mp4 53MB
  34. 4. Securing User Environment/9. Lock or Disable User Accounts.mp4 51MB
  35. 4. Securing User Environment/10. Lock or Disable User Accounts Manually.mp4 49MB
  36. 5. PAM (Pluggable Authentication Module)/9. PAM Aware Services and Stacks.mp4 47MB
  37. 4. Securing User Environment/14. Implement UIDGID Policy.mp4 46MB
  38. 1. Introduction/1. Syllabus Overiew.mp4 43MB
  39. 7. Securing Linux System/2. Message of the Day.mp4 43MB
  40. 5. PAM (Pluggable Authentication Module)/2. What is PAM.mp4 41MB
  41. 10. Additional Resources/10. Recover Root Password.mp4 40MB
  42. 8. Securing Linux System Network/10. Turn Off IPV6 (If not in use).mp4 39MB
  43. 7. Securing Linux System/14. Lockdown Cronjobs.mp4 39MB
  44. 10. Additional Resources/8. Difference AD, openLDAP, WinBind etc..mp4 39MB
  45. 7. Securing Linux System/15. Change SSH Port.mp4 36MB
  46. 4. Securing User Environment/12. Restrict root Login.mp4 36MB
  47. 5. PAM (Pluggable Authentication Module)/4. The PAM Configuration Files Format.mp4 34MB
  48. 3. Lab Setup/3. Downloading and Installing Oracle VirtualBox.mp4 34MB
  49. 7. Securing Linux System/8. Separate Disk Partitions.mp4 33MB
  50. 8. Securing Linux System Network/7. Firewall (firewalld GUI).mp4 32MB
  51. 3. Lab Setup/4. Creating First Virtual Machine.mp4 32MB
  52. 4. Securing User Environment/5. The etclogin.def File.mp4 32MB
  53. 6. Securing Linux Filesystem/2. Linux File Types.mp4 32MB
  54. 10. Additional Resources/2. Getting Linux Commands Help.mp4 32MB
  55. 5. PAM (Pluggable Authentication Module)/5. PAM Config File – Module Interfaces.mp4 32MB
  56. 7. Securing Linux System/17. Backups.mp4 30MB
  57. 9. Securing Environment Around Linux/2. HardwareNetwork Firewall.mp4 29MB
  58. 4. Securing User Environment/3. Understanding etcgroup.mp4 27MB
  59. 4. Securing User Environment/13. Disable SSH Access for a Specific User.mp4 26MB
  60. 2. Security Concepts/6. Security Implementation Tools.mp4 25MB
  61. 10. Additional Resources/4. Changing Password.mp4 24MB
  62. 10. Additional Resources/15. Bonus Lecture.mp4 24MB
  63. 10. Additional Resources/7. User Directory Authentication.mp4 24MB
  64. 2. Security Concepts/5. Importance of Linux Security.mp4 23MB
  65. 7. Securing Linux System/11. Change Default Console Passwords (Only Physical).mp4 22MB
  66. 4. Securing User Environment/15. Centralized Authentication Service.mp4 22MB
  67. 2. Security Concepts/3. Comparing House Security with Computer Security.mp4 21MB
  68. 1. Introduction/3. Thank You.mp4 21MB
  69. 9. Securing Environment Around Linux/4. VPN Tunnel.mp4 21MB
  70. 2. Security Concepts/2. What is Security and OS Hardening.mp4 20MB
  71. 5. PAM (Pluggable Authentication Module)/3. The Importance of PAM.mp4 19MB
  72. 8. Securing Linux System Network/2. Introduction to Firewall.mp4 18MB
  73. 5. PAM (Pluggable Authentication Module)/7. PAM Config File – Control Flags.mp4 17MB
  74. 8. Securing Linux System Network/8. Encrypt Incoming and Outgoing Traffic.mp4 17MB
  75. 9. Securing Environment Around Linux/3. Network Address Translation (NAT).mp4 17MB
  76. 9. Securing Environment Around Linux/5. Application and Database Encryption.mp4 17MB
  77. 6. Securing Linux Filesystem/4. Linux File Ownership and Permissions.mp4 16MB
  78. 7. Securing Linux System/4. Physical Server Security.mp4 15MB
  79. 7. Securing Linux System/10. Running One Service per System.mp4 14MB
  80. 2. Security Concepts/7. Type of Security Breach.mp4 13MB
  81. 3. Lab Setup/7.4 4-Red_Hat_Enterprise_Linux-7-Installation_Guide-en-US.pdf.pdf 11MB
  82. 6. Securing Linux Filesystem/3. Linux File Attributes.mp4 11MB
  83. 3. Lab Setup/1. Welcome to Lab Setup.mp4 10MB
  84. 2. Security Concepts/4. Securing All Operating Systems.mp4 10MB
  85. 7. Securing Linux System/12. Disable USB Stick Detection.mp4 10MB
  86. 3. Lab Setup/2. What is Oracle VirtualBox.mp4 9MB
  87. 4. Securing User Environment/20.3 Red_Hat_Enterprise_Linux-7-System_Administrators_Guide-en-US.pdf.pdf 6MB
  88. 5. PAM (Pluggable Authentication Module)/6. Account Access Through PAM.mp4 5MB
  89. 7. Securing Linux System/19.4 Dell iDRAC Admin Guide.pdf.pdf 4MB
  90. 3. Lab Setup/7.3 2-Oracle Virtual Box User Manual.pdf.pdf 4MB
  91. 3. Lab Setup/7.2 3-CentOS Installation Guide.pdf.pdf 4MB
  92. 7. Securing Linux System/19.6 HP iLO Admin Guide.pdf.pdf 3MB
  93. 8. Securing Linux System Network/12.1 Red_Hat_Enterprise_Linux-7-Security_Guide-en-US.pdf.pdf 2MB
  94. 7. Securing Linux System/19.10 Red_Hat_Enterprise_Linux-7-SELinux_Users_and_Administrators_Guide-en-US.pdf.pdf 1MB
  95. 9. Securing Environment Around Linux/9. Congratulations.mp4 905KB
  96. 4. Securing User Environment/1. Welcome to Securing User Environment.mp4 555KB
  97. 10. Additional Resources/1. Welcome to Additional Resources.mp4 515KB
  98. 2. Security Concepts/1. Welcome to Security Concepts.mp4 503KB
  99. 8. Securing Linux System Network/12.2 Firewall (iptables).pdf.pdf 487KB
  100. 9. Securing Environment Around Linux/1. Welcome to Securing Environment Around Linux.mp4 473KB
  101. 5. PAM (Pluggable Authentication Module)/1. Welcome to PAM.mp4 441KB
  102. 6. Securing Linux Filesystem/1. Welcome to Securing Linux Filesystem.mp4 433KB
  103. 8. Securing Linux System Network/1. Welcome to Securing Linux Network.mp4 421KB
  104. 6. Securing Linux Filesystem/9.1 Access Control Lists.pdf.pdf 413KB
  105. 7. Securing Linux System/1. Welcome to Securing Linux System.mp4 413KB
  106. 6. Securing Linux Filesystem/9.4 File types in Linux.pdf.pdf 378KB
  107. 4. Securing User Environment/20.8 Set Password Policy.pdf.pdf 363KB
  108. 8. Securing Linux System Network/12.4 Turn Off IPV6.pdf.pdf 351KB
  109. 9. Securing Environment Around Linux/7.2 App and DB Encyption.pdf.pdf 346KB
  110. 8. Securing Linux System Network/12.6 Firewall (firewalld).pdf.pdf 340KB
  111. 1. Introduction/2.1 Syllabus - Complete Linux Security and Hardening with Practical Examples.pdf.pdf 337KB
  112. 8. Securing Linux System Network/12.5 SSH vs Telnet.pdf.pdf 326KB
  113. 5. PAM (Pluggable Authentication Module)/11.1 PAM.pdf.pdf 320KB
  114. 7. Securing Linux System/19.2 Remove Un-neccessary and Orphan Packages.pdf.pdf 314KB
  115. 7. Securing Linux System/19.5 NTP or Chronyd.pdf.pdf 290KB
  116. 7. Securing Linux System/19.9 Stop and Disable Unwanted Services.pdf.pdf 272KB
  117. 4. Securing User Environment/20.5 Disable Root Account in Linux.pdf.pdf 268KB
  118. 2. Security Concepts/9.2 3-Security Implementation Measures or Tools.pdf.pdf 261KB
  119. 9. Securing Environment Around Linux/7.4 Hardware Firewall.pdf.pdf 254KB
  120. 7. Securing Linux System/19.1 Disable Alt+Ctrl+Del.pdf.pdf 254KB
  121. 4. Securing User Environment/20.10 2-Understanding etc.group File.docx.pdf.pdf 252KB
  122. 4. Securing User Environment/20.9 User Accounts in Linux.pdf.pdf 248KB
  123. 7. Securing Linux System/19.8 Change SSH Port.pdf.pdf 247KB
  124. 8. Securing Linux System Network/12.3 Encrypt Incoming and Outgoing Traffic.pdf.pdf 244KB
  125. 2. Security Concepts/9.5 2-Importance of Linux Security.pdf.pdf 243KB
  126. 5. PAM (Pluggable Authentication Module)/11.2 Linux-PAM System Administrator Guide.pdf.pdf 237KB
  127. 6. Securing Linux Filesystem/9.2 File Permissions and Ownership.pdf.pdf 234KB
  128. 2. Security Concepts/9.3 1-Introduction to Computer Security.pdf.pdf 225KB
  129. 9. Securing Environment Around Linux/7.3 VPN.pdf.pdf 222KB
  130. 4. Securing User Environment/20.4 1-Understanding etc.passwd File.pdf.pdf 220KB
  131. 3. Lab Setup/8.1 Section 3 - Homework.pdf.pdf 219KB
  132. 2. Security Concepts/9.4 5-Types of Cyber Security Breach.pdf.pdf 214KB
  133. 9. Securing Environment Around Linux/7.1 NAT.pdf.pdf 211KB
  134. 7. Securing Linux System/19.3 Message of the Day Examples.pdf.pdf 211KB
  135. 4. Securing User Environment/20.6 Switch-users-and-Sudo-Access.pdf.pdf 203KB
  136. 3. Lab Setup/7.1 1-Changing-from-32-to-64bit.pdf.pdf 159KB
  137. 4. Securing User Environment/20.2 Change Password in Linux.pdf.pdf 154KB
  138. 4. Securing User Environment/20.1 User Account Management.pdf.pdf 135KB
  139. 7. Securing Linux System/19.7 rpm commands.pdf.pdf 122KB
  140. 4. Securing User Environment/20.7 Passwords Standards.pdf.pdf 121KB
  141. 6. Securing Linux Filesystem/9.3 File Permissions Cheat Sheet.pdf.pdf 67KB
  142. 2. Security Concepts/9.1 4-15 Other Linux Security Tools.pdf.pdf 39KB
  143. 7. Securing Linux System/16. SELinux.vtt 35KB
  144. 8. Securing Linux System Network/4. Firewall (iptables – practical examples).vtt 25KB
  145. 3. Lab Setup/5. Linux Installation.vtt 25KB
  146. 4. Securing User Environment/17. Monitor User Activity.vtt 23KB
  147. 8. Securing Linux System Network/6. Firewall (firewalld – Practical Examples).vtt 22KB
  148. 10. Additional Resources/5. sed Command Examples.vtt 19KB
  149. 4. Securing User Environment/16. sudo Access.vtt 18KB
  150. 10. Additional Resources/14. File System Check.vtt 17KB
  151. 10. Additional Resources/13. Advance Package Management.vtt 16KB
  152. 7. Securing Linux System/7. Stop and Disable Unwanted Services.vtt 16KB
  153. 10. Additional Resources/12. NIC Bonding.vtt 16KB
  154. 7. Securing Linux System/13. Enable an Network Time Protocol (NTP or Chronyd).vtt 14KB
  155. 7. Securing Linux System/5. Remove Un-necessary or Orphan Packages.vtt 13KB
  156. 8. Securing Linux System Network/3. Firewall (iptables – tables, chains and targets).vtt 12KB
  157. 6. Securing Linux Filesystem/7. Access Control List (ACL).vtt 12KB
  158. 7. Securing Linux System/6. Keep Kernel and System Up to Date.vtt 12KB
  159. 4. Securing User Environment/8. Set Password Policy.vtt 11KB
  160. 6. Securing Linux Filesystem/5. Changing File Permission - LAB.vtt 11KB
  161. 7. Securing Linux System/3. Customize Message of the Day.vtt 11KB
  162. 10. Additional Resources/9. System Log Monitor.vtt 11KB
  163. 6. Securing Linux Filesystem/6. Changing FIle Ownership - LAB.vtt 11KB
  164. 8. Securing Linux System Network/9. SSH vs. Telnet.vtt 11KB
  165. 10. Additional Resources/11. File Transfer Commands.vtt 10KB
  166. 5. PAM (Pluggable Authentication Module)/8. PAM Config File – Modules (SO).vtt 10KB
  167. 4. Securing User Environment/2. Understanding etcpasswd.vtt 10KB
  168. 10. Additional Resources/3. Compress and Uncompress Files.vtt 10KB
  169. 10. Additional Resources/8. Difference AD, openLDAP, WinBind etc..vtt 10KB
  170. 8. Securing Linux System Network/5. Firewall (firewalld).vtt 9KB
  171. 4. Securing User Environment/6. Create User Account and Change Password.vtt 9KB
  172. 4. Securing User Environment/11. Lock User Account After 3 Failed Attempts.vtt 9KB
  173. 7. Securing Linux System/15. Change SSH Port.vtt 9KB
  174. 1. Introduction/1. Syllabus Overiew.vtt 9KB
  175. 7. Securing Linux System/9. Disable Ctrl+Alt+Delete.vtt 9KB
  176. 10. Additional Resources/6. Talking to Users.vtt 8KB
  177. 7. Securing Linux System/17. Backups.vtt 8KB
  178. 5. PAM (Pluggable Authentication Module)/2. What is PAM.vtt 8KB
  179. 4. Securing User Environment/7. Change Password Parameters.vtt 8KB
  180. 7. Securing Linux System/2. Message of the Day.vtt 8KB
  181. 4. Securing User Environment/12. Restrict root Login.vtt 8KB
  182. 4. Securing User Environment/9. Lock or Disable User Accounts.vtt 7KB
  183. 4. Securing User Environment/10. Lock or Disable User Accounts Manually.vtt 7KB
  184. 5. PAM (Pluggable Authentication Module)/9. PAM Aware Services and Stacks.vtt 7KB
  185. 4. Securing User Environment/4. Understanding etcshadow.vtt 7KB
  186. 4. Securing User Environment/14. Implement UIDGID Policy.vtt 7KB
  187. 9. Securing Environment Around Linux/2. HardwareNetwork Firewall.vtt 7KB
  188. 10. Additional Resources/7. User Directory Authentication.vtt 7KB
  189. 7. Securing Linux System/14. Lockdown Cronjobs.vtt 7KB
  190. 7. Securing Linux System/8. Separate Disk Partitions.vtt 6KB
  191. 2. Security Concepts/5. Importance of Linux Security.vtt 6KB
  192. 9. Securing Environment Around Linux/4. VPN Tunnel.vtt 6KB
  193. 8. Securing Linux System Network/10. Turn Off IPV6 (If not in use).vtt 6KB
  194. 2. Security Concepts/6. Security Implementation Tools.vtt 6KB
  195. 6. Securing Linux Filesystem/2. Linux File Types.vtt 6KB
  196. 4. Securing User Environment/5. The etclogin.def File.vtt 6KB
  197. 8. Securing Linux System Network/7. Firewall (firewalld GUI).vtt 6KB
  198. 10. Additional Resources/10. Recover Root Password.vtt 6KB
  199. 4. Securing User Environment/3. Understanding etcgroup.vtt 6KB
  200. 5. PAM (Pluggable Authentication Module)/5. PAM Config File – Module Interfaces.vtt 5KB
  201. 10. Additional Resources/2. Getting Linux Commands Help.vtt 5KB
  202. 4. Securing User Environment/13. Disable SSH Access for a Specific User.vtt 5KB
  203. 2. Security Concepts/2. What is Security and OS Hardening.vtt 5KB
  204. 4. Securing User Environment/15. Centralized Authentication Service.vtt 5KB
  205. 3. Lab Setup/4. Creating First Virtual Machine.vtt 5KB
  206. 7. Securing Linux System/11. Change Default Console Passwords (Only Physical).vtt 5KB
  207. 8. Securing Linux System Network/2. Introduction to Firewall.vtt 5KB
  208. 7. Securing Linux System/10. Running One Service per System.vtt 5KB
  209. 10. Additional Resources/4. Changing Password.vtt 4KB
  210. 7. Securing Linux System/4. Physical Server Security.vtt 4KB
  211. 9. Securing Environment Around Linux/5. Application and Database Encryption.vtt 4KB
  212. 2. Security Concepts/7. Type of Security Breach.vtt 4KB
  213. 5. PAM (Pluggable Authentication Module)/4. The PAM Configuration Files Format.vtt 4KB
  214. 2. Security Concepts/3. Comparing House Security with Computer Security.vtt 4KB
  215. 9. Securing Environment Around Linux/3. Network Address Translation (NAT).vtt 4KB
  216. 8. Securing Linux System Network/8. Encrypt Incoming and Outgoing Traffic.vtt 4KB
  217. 10. Additional Resources/15. Bonus Lecture.vtt 4KB
  218. 5. PAM (Pluggable Authentication Module)/3. The Importance of PAM.vtt 4KB
  219. 6. Securing Linux Filesystem/4. Linux File Ownership and Permissions.vtt 4KB
  220. 2. Security Concepts/4. Securing All Operating Systems.vtt 4KB
  221. 6. Securing Linux Filesystem/3. Linux File Attributes.vtt 3KB
  222. 5. PAM (Pluggable Authentication Module)/7. PAM Config File – Control Flags.vtt 3KB
  223. 3. Lab Setup/1. Welcome to Lab Setup.vtt 3KB
  224. 3. Lab Setup/3. Downloading and Installing Oracle VirtualBox.vtt 3KB
  225. 7. Securing Linux System/12. Disable USB Stick Detection.vtt 2KB
  226. 3. Lab Setup/2. What is Oracle VirtualBox.vtt 2KB
  227. 7. Securing Linux System/20. Homework.html 2KB
  228. 4. Securing User Environment/19. Homework.html 2KB
  229. 5. PAM (Pluggable Authentication Module)/6. Account Access Through PAM.vtt 1KB
  230. 6. Securing Linux Filesystem/10. Homework.html 1KB
  231. 3. Lab Setup/8. Homework.html 1KB
  232. 1. Introduction/3. Thank You.vtt 935B
  233. 8. Securing Linux System Network/13. Homework.html 690B
  234. 9. Securing Environment Around Linux/8. Homework.html 459B
  235. 5. PAM (Pluggable Authentication Module)/12. Homework.html 209B
  236. 2. Security Concepts/8. Quiz.html 168B
  237. 3. Lab Setup/6. Quiz.html 168B
  238. 4. Securing User Environment/18. Quiz.html 168B
  239. 5. PAM (Pluggable Authentication Module)/10. Quiz.html 168B
  240. 6. Securing Linux Filesystem/8. Quiz.html 168B
  241. 7. Securing Linux System/18. Quiz.html 168B
  242. 8. Securing Linux System Network/11. Quiz.html 168B
  243. 9. Securing Environment Around Linux/6. Quiz.html 168B
  244. 7. Securing Linux System/19. Handouts.html 57B
  245. 2. Security Concepts/10. Homework.html 49B
  246. 8. Securing Linux System Network/12. Handouts.html 48B
  247. 4. Securing User Environment/20. Handouts.html 44B
  248. 1. Introduction/2. Download Syllabus.html 42B
  249. 9. Securing Environment Around Linux/7. Handouts.html 37B
  250. 2. Security Concepts/9. Handouts.html 35B
  251. 5. PAM (Pluggable Authentication Module)/11. Handouts.html 35B
  252. 6. Securing Linux Filesystem/9. Handouts.html 35B
  253. 3. Lab Setup/7. Handouts.html 34B
  254. 2. Security Concepts/1. Welcome to Security Concepts.vtt 8B
  255. 4. Securing User Environment/1. Welcome to Securing User Environment.vtt 8B
  256. 5. PAM (Pluggable Authentication Module)/1. Welcome to PAM.vtt 8B
  257. 6. Securing Linux Filesystem/1. Welcome to Securing Linux Filesystem.vtt 8B
  258. 7. Securing Linux System/1. Welcome to Securing Linux System.vtt 8B
  259. 8. Securing Linux System Network/1. Welcome to Securing Linux Network.vtt 8B
  260. 9. Securing Environment Around Linux/1. Welcome to Securing Environment Around Linux.vtt 8B
  261. 9. Securing Environment Around Linux/9. Congratulations.vtt 8B
  262. 10. Additional Resources/1. Welcome to Additional Resources.vtt 8B