CompTIA Linux+: Security

By Andrew Mallett

Security and Cyber-Security skills are more and more sort after. This course will teach you to secure various Linux distributions and to look at the security angle as a first approach.

9.68 hours
  • 112 Lessons

About the course

If you are short on one or more Linux security skills this course is a great starting point. In this course, CompTIA Linux+: Security, you’ll learn to diagnose and secure Linux security issues. First, you’ll explore Linux permissions and access control Lists. Next, you’ll discover securing Linux remote access with SSH and SSH Certificate Servers. Finally, you’ll learn how to protect network access to your systems with firewalls. When you’re finished with this course, you’ll have the skills and knowledge of Linux Security needed to secure a range of Linux distributions.

Recommended order of completion:

  • Introduction to the CompTIA Linux+ (XK0-005) Certification
  • CompTIA Linux+: System Management
  • CompTIA Linux+: Security
  • CompTIA Linux+: Scripting, Containers, and Automation
  • CompTIA Linux+: Troubleshooting
  • Chapter 1 5 Lessons Securing Linux Systems 19:41

    Introducing Linux Security

    3:54

    Web Server Startup and Permissions

    5:52

    Documentation May Not Always Be Correct

    5:09

    Certificate Trusts

    3:31

    Summary and What's Next

    1:15
  • Chapter 2 9 Lessons Understanding the File Mode or Permissions 46:14

    Welcome to the Linux File Mode

    5:18

    Listing File Permissions

    6:33

    Working with the Unmask and Default Permissions

    6:07

    Understanding the Command Chmod

    6:01

    Using Chmod to Manage Permissions

    5:12

    Using Advanced Symbolic Notation

    7:31

    Changing File Ownership

    4:25

    Setting Execute Only on a Directory

    3:11

    Summary and What's Next

    1:56
  • Chapter 3 8 Lessons Managing Special File Permissions 43:27

    What Are Special Permissions

    5:41

    Finding Listing and Setting Special Permissions

    8:20

    Using the Sticky Bit to Prevent Deletions

    7:11

    Setting the SGID Bit on Directories

    4:20

    Showing Collaborative Permissions with the Apache Web Server

    7:19

    Special Permission on Executables

    3:44

    Using Linux Capabilities

    5:03

    Summary and What's Next

    1:49
  • Chapter 4 6 Lessons Extending the File Mode with ACLS 33:20

    Understanding the File Mode Limits

    7:46

    Checking for ACL Support

    4:53

    Configuring HTTPD Securely with ACLS

    7:32

    Understanding ACLS

    2:53

    Working with ACLS

    8:38

    Summary and What's Next

    1:38
  • Chapter 5 7 Lessons Implementing SELinux 43:25

    Welcome to SELinux

    6:02

    Managing SELinux Modes

    7:11

    Configuring SELinux Booleans

    7:00

    Understanding File Contexts

    4:26

    Managing File Contexts

    7:43

    Relocating User Home Directories

    8:19

    Summary and What's Next

    2:44
  • Chapter 6 7 Lessons Working with AppArmor 30:58

    Understanding AppArmor

    3:09

    Installing AppArmor Components

    5:02

    Viewing Active Profiles

    5:49

    Creating Python Script

    5:58

    Generating a Profile for the Script

    3:54

    Using Logprof to Update Profile

    5:00

    Summary and What's Next

    2:06
  • Chapter 7 10 Lessons Managing SSH Servers and Connections 51:14

    Managing Secure Connections in Linux

    2:24

    Understanding Available Authentication Methods

    4:59

    Managing Known SSH Servers or Hosts

    1:51

    Working with Known Hosts Storage

    8:46

    Centralizing Known Hosts

    4:42

    Authenticating SSH Clients

    7:14

    Understanding the SSH CA

    4:05

    Implementing an SSH CA

    3:36

    Signing Server Keys with the CA

    9:42

    Summary and What's Next

    3:55
  • Chapter 8 8 Lessons Elevating Privileges in Linux 38:30

    Becoming the Boss

    3:16

    Using Su

    7:27

    Understanding Sudo

    3:37

    Using Sudo

    8:38

    Environment Variables and Sudo

    4:48

    Understanding PolKit

    1:41

    Recovering Broken Sudo Systems Using Polkit

    6:15

    Summary and What's Next

    2:48
  • Chapter 9 12 Lessons Managing Local Users 58:44

    Managing Local Users and Groups

    4:22

    Listing Users

    7:23

    Working with User Default Settings

    2:58

    Managing New Users

    8:31

    Modifying and Deleting Users

    6:13

    Understanding Password Shadow Data

    3:26

    Working with Shadow Data

    5:39

    Understanding Password Encryption

    1:47

    Working with Passwords and Understanding Authentication

    6:46

    Managing User Passwords

    5:37

    Managing Linux Groups

    3:53

    Summary and What's Next

    2:09
  • Chapter 10 7 Lessons Implementing HTTPS with the Apache Web Server 37:07

    HTTPS Self-signed Certificates

    5:50

    Installing Apache

    5:03

    Understanding the Ubuntu Apache Configuration

    2:25

    Configuring SSL on Apache

    9:18

    Redirect HTTP to HTTPS

    5:35

    Investigating Certificate Chains with OpenSSL

    6:21

    Summary and What's Next

    2:35
  • Chapter 11 7 Lessons Implementing an openSSL Certificate Server 41:58

    Using Certificate Authorities

    7:33

    Creating a CA from the CLI

    9:33

    Creating a Certificate Signing Request

    6:27

    Signing the CSR

    6:05

    Configuring Apache with CA Certificate

    6:55

    Graphical Certificate Management on openSUSE

    3:42

    Summary and What's Next

    1:43
  • Chapter 12 8 Lessons Implementing Identity Management with openLDAP and SSSD 48:39

    Identity Management in Linux

    6:36

    Installing OpenLDAP on Ubuntu 2004

    8:43

    Adding and Searching Entries in OpenLDAP

    8:10

    Understanding StartTLS

    4:09

    Configuring StartTLS in OpenLDAP

    5:06

    Configuring SSSD on Ubuntu

    7:01

    Configuring SSSD on AlmaLinux

    6:55

    Summary and What's Next

    1:59
  • Chapter 13 7 Lessons Hardening Your Linux Systems 35:09

    Security Hardening in Linux

    5:57

    Checking Listening Ports and Restricting Access to SSSD

    4:35

    Removing Extra Services

    3:54

    Securing ICMP Access Using Sysctl

    6:25

    Listing User Details

    6:01

    Locking Failed Login Attempts

    6:37

    Summary and What's Next

    1:40
  • Chapter 14 6 Lessons Implementing Firewalls with Firewalld 32:00

    Introducing Firewalld as a Host Based Firewall

    3:40

    Basic Firewalld Management

    5:54

    Adding and Removing Services

    6:28

    Adding Source Addresses

    6:42

    Editing Service Definitions

    7:52

    Summary and What's Next

    1:24
  • Chapter 15 5 Lessons Implement Firewalls with UFW 20:19

    Welcome to Uncomplicated Firewall

    3:14

    Adding Basic UFW Rules

    3:21

    Tuning SSH Allow Rules

    5:40

    Allowing HTTP Access

    3:38

    Reporting on Rules

    4:26

Practice alongside courses in Cloud Playground

What is Cloud Playground? Cloud Playground lets you build skills in real-world AWS, Google Cloud, and Azure environments. Spin up risk-free Sandboxes, Servers and Terminals and follow along with courses, test a new idea or prepare for exams.

Get Started
Who’s going to be learning?
Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!