From the course: Linux Hardening
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Linux hardening course review - Linux Tutorial
From the course: Linux Hardening
Linux hardening course review
Hello, and welcome back to Cybrary's Linux Hardening course. In this lesson, we review the course itself. And of course, I'm your instructor, Corey Holzer. The learning objective for this lesson is simply to review what we covered throughout the course, and to provide you with my contact information. This course had three overarching objectives. First, to articulate the best practices for securing Linux. Second was to implement security best practices at the OS level, at the services level, and at the user account level. Last, I provided you with additional sources of information when it comes to improving your security. This course was broken down into six modules. The first module presented you with a course overview and allowed me the opportunity to introduce myself. Module 2 was all about the theory of hardening or securing servers and workstations. It was the theory behind the best practices that you could apply to any operating system: Linux, Windows, iOS. It all applies to them…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.