From the course: Linux Hardening
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Securing storage devices, part two - Linux Tutorial
From the course: Linux Hardening
Securing storage devices, part two
Hello, and welcome back to Cybrary's Hardening Linux course. This is the second half discussion of how to secure storage devices. I'm your instructor, Corey Holzer. In this lesson, there are three objectives. First, I want you to be able to describe how to get and set permissions through access control lists. Second, at the end of this lesson, you will be able to describe how to access ownership of a file and the permissions through some more basic functionality. Finally, you'll be able to explain why we disabled SUID and SGID, as well as how to do so. Being familiar with Linux, you probably already know this, but I would like to quickly review how to retrieve the permissions of a file and what they are. You can find the permissions for any given file with the ls command using the -la option, as well as specifying the file name in order to show information about that particular file. Every file in Linux has permissions associated with the owner of the file, the group owner of the…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Hardening the hardware2m 22s
-
(Locked)
Hardening the bootloader4m 24s
-
(Locked)
Securing the kernel9m
-
(Locked)
Disabling Ctrl-Alt-Delete (demo)1m 6s
-
(Locked)
Securing storage devices, part one9m 3s
-
(Locked)
Securing storage devices, part two7m 35s
-
(Locked)
Disabling SUID and SGID permissions (demo)51s
-
(Locked)
Blocking unwanted activities and traffic7m 52s
-
(Locked)
Minimizing the OS attack surface, part one5m 36s
-
(Locked)
Minimizing the OS attack surface, part two4m 41s
-
(Locked)
Network hardening at the host4m 54s
-
(Locked)
System administration hardening6m 8s
-
(Locked)
Testing, monitoring, and reviewing9m 25s
-
-
-
-