From the course: Linux Hardening
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Securing storage devices, part one - Linux Tutorial
From the course: Linux Hardening
Securing storage devices, part one
Hello, and welcome back to Cybrary's Linux Hardening course. In this lesson, we'll cover the first half of our discussion about securing storage devices. I'm your instructor, Corey Holzer. Should we get started? In this lesson, we have two objectives. First, we'll describe the process for partitioning disks and encrypting volumes. At the end of the lesson, you'll be able to explain how to make a boot partition read-only. In the past, it was a best practice to create multiple volumes in order to ensure each function had sufficient harddrive space. The space issue was important because if the root partition ran out of disk space, it would adversely affect the operation of the system, with the worst effect being the computer would crash. With the drives being smaller and pricier than storage available to us today, partitions were the most cost-effective means to prevent issues like these from arising. Today, adding storage is relatively cheap and the size of drives reduces the risk of…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Hardening the hardware2m 22s
-
(Locked)
Hardening the bootloader4m 24s
-
(Locked)
Securing the kernel9m
-
(Locked)
Disabling Ctrl-Alt-Delete (demo)1m 6s
-
(Locked)
Securing storage devices, part one9m 3s
-
(Locked)
Securing storage devices, part two7m 35s
-
(Locked)
Disabling SUID and SGID permissions (demo)51s
-
(Locked)
Blocking unwanted activities and traffic7m 52s
-
(Locked)
Minimizing the OS attack surface, part one5m 36s
-
(Locked)
Minimizing the OS attack surface, part two4m 41s
-
(Locked)
Network hardening at the host4m 54s
-
(Locked)
System administration hardening6m 8s
-
(Locked)
Testing, monitoring, and reviewing9m 25s
-
-
-
-