From the course: Linux Hardening
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Hardening the foundation - Linux Tutorial
From the course: Linux Hardening
Hardening the foundation
Hello, and welcome to Cybrary's Linux Hardening course. This lesson is Hardening the Foundation. I am your instructor, Corey Holzer. At the end of this lesson, you will be able to articulate the advantages of hardening at the hardware level. You will also be able to describe the security advantages of the bootloader and kernel hardening. Taking steps to secure a server at the hardware level means you are taking the operating system out of the equation. Changes in the operating system cannot supersede those made in the BIOS. These security measures cannot be modified by a person attacking the server from another physical location. The only way to alter BIOS-level changes is by somebody physically standing or sitting at that machine. A bootloader manages the loading of the operating system. Changes to secure the bootloader, ensure that a malicious individual cannot change boot parameters or employ a compromised kernel. Keep in mind, the bootloader configuration can be modified from…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Why we harden3m 52s
-
(Locked)
Hardening-in-depth as a concept5m 27s
-
(Locked)
The CIS benchmarks1m 41s
-
(Locked)
Hardening the foundation2m 23s
-
(Locked)
Hardening storage devices4m 44s
-
(Locked)
Firewalls and IPS/IDS as endpoint security4m 35s
-
(Locked)
Managing services5m 17s
-
(Locked)
Lifecycle management4m 7s
-
(Locked)
Recommendations for integrating hardening measures4m 56s
-
-
-
-
-