From the course: Linux Hardening

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Linux hardening course review

Linux hardening course review - Linux Tutorial

From the course: Linux Hardening

Linux hardening course review

Hello, and welcome back to Cybrary's Linux Hardening course. In this lesson, we review the course itself. And of course, I'm your instructor, Corey Holzer. The learning objective for this lesson is simply to review what we covered throughout the course, and to provide you with my contact information. This course had three overarching objectives. First, to articulate the best practices for securing Linux. Second was to implement security best practices at the OS level, at the services level, and at the user account level. Last, I provided you with additional sources of information when it comes to improving your security. This course was broken down into six modules. The first module presented you with a course overview and allowed me the opportunity to introduce myself. Module 2 was all about the theory of hardening or securing servers and workstations. It was the theory behind the best practices that you could apply to any operating system: Linux, Windows, iOS. It all applies to them…

Contents