From the course: Linux Hardening
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Firewalls and IPS/IDS as endpoint security - Linux Tutorial
From the course: Linux Hardening
Firewalls and IPS/IDS as endpoint security
Hello, and welcome to Cybrary's Linux Hardening course, and this lesson covering firewalls, intrusion protection, and intrusion detection at the endpoint. I'm your instructor, Corey Holzer. There are three objectives that we will cover in this lesson. First, I want to give you the knowledge of how a firewall works, so you will be able to define it for someone else. Second, you must understand the differences between intrusion detection systems and intrusion prevention systems. Finally, you will be able to explain the reasons behind adding host-based or endpoint protection in addition to network protection. If you've ever experienced a home fire in an attached home or know someone who has, you already know the importance of a firewall. Of course, that firewall is different from a technology firewall, but it is where the name is taken from. Unlike physical firewalls, the technological firewall will let some data through instead of blocking everything. In the sample DMC setup shown at…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Why we harden3m 52s
-
(Locked)
Hardening-in-depth as a concept5m 27s
-
(Locked)
The CIS benchmarks1m 41s
-
(Locked)
Hardening the foundation2m 23s
-
(Locked)
Hardening storage devices4m 44s
-
(Locked)
Firewalls and IPS/IDS as endpoint security4m 35s
-
(Locked)
Managing services5m 17s
-
(Locked)
Lifecycle management4m 7s
-
(Locked)
Recommendations for integrating hardening measures4m 56s
-
-
-
-
-