From the course: Linux Hardening
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
System administration hardening - Linux Tutorial
From the course: Linux Hardening
System administration hardening
Hello and welcome back to Cybrary's Linux Hardening course. In this lesson, we're going to cover system administration. I'm your instructor, Corey Holzer. Let's begin. There are two objectives for this lesson. First, I want you to walk away from this lesson being able to describe the why and how behind disabling the root account's remote access. I also want you to know the role of the sudo command and how to configure it. One of the goals of every threat actor who infiltrates a network is to gain elevated permissions. The highest of privileges are those of the root account. With root privileges, the adversary has almost unlimited power on a given workstation. Therefore, we want to make his attempts to gain root privileges as difficult as possible. In this case, we want to disable remote access for the root account. We do this by editing the sshd_config file in /etc/ssh. And in that file we changed the value for permit route login to no. All we need to do at that point is save the file…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Hardening the hardware2m 22s
-
(Locked)
Hardening the bootloader4m 24s
-
(Locked)
Securing the kernel9m
-
(Locked)
Disabling Ctrl-Alt-Delete (demo)1m 6s
-
(Locked)
Securing storage devices, part one9m 3s
-
(Locked)
Securing storage devices, part two7m 35s
-
(Locked)
Disabling SUID and SGID permissions (demo)51s
-
(Locked)
Blocking unwanted activities and traffic7m 52s
-
(Locked)
Minimizing the OS attack surface, part one5m 36s
-
(Locked)
Minimizing the OS attack surface, part two4m 41s
-
(Locked)
Network hardening at the host4m 54s
-
(Locked)
System administration hardening6m 8s
-
(Locked)
Testing, monitoring, and reviewing9m 25s
-
-
-
-