Server Hardening Fundamentals

By John Toler

This course will start you on your way to knowing how to secure servers.

3 hours
  • 38 Lessons

About the course

Servers across many organizations provide a multitude of services including some that are critical infrastructure for keeping a company running. There are a variety of server types such as email, financial data, application databases, and file and print servers. They all need to have safeguards in place to protect these assets not only from threats coming from outside of the organization but insider threats as well.

This course is for those Security and System Administrators that may not have the experience or exposure to implementing some of these baseline controls. The course itself will not be able to cover everything and is not intended to include servers that are used for maintenance or remote connection accessibility. We want the audience to walk away with the knowledge and understanding to get you started and to open up the discussions with those people helping to make these decisions in your own communities and organizations.

It is assumed that learners have a basic understanding of system and network security and can navigate around the Linux and Windows operating systems. Security is everyone’s job and there is a vast number of public resources available that can help.

  • Chapter 1 3 Lessons Course Introduction 6:43

    An Important Note About A Cloud Guru and Linux Academy Courses

    1:19

    An Important Note About A Cloud Guru and Linux Academy Courses

    1:19

    What to Expect

    4:05
  • Chapter 2 1 Lesson Getting Started 0:52

    About the Author

    0:52
  • Chapter 3 2 Lessons Setting Up Servers 3:06

    Windows Server 2019 Overview and Key Features (Optional)

    2:16

    Kali Linux Overview and Key Features (Optional)

    0:50
  • Chapter 4 5 Lessons Threats, Vulnerabilities, and Risks 44:42

    Types of Threats and Threat Actors

    16:39

    Determining Vulnerabilities

    9:52

    Risk Assessments and Mitigation

    4:29

    Security Categorization and Objectives on Information Systems

    7:15

    Conclusion

    6:27
  • Chapter 5 6 Lessons Server Security 30:26

    Installation and Planning Helps Achieve Security Success

    11:03

    Roles and Responsibilities of Security Staff

    3:09

    Server Management Practices and Policies

    4:01

    System Security Plan

    5:57

    Human Resources Requirements

    3:54

    Conclusion

    2:22
  • Chapter 6 6 Lessons Securing the Operating System 25:14

    Patching and Upgrading the Operating System

    2:39

    Hardening and Securely Configuring the Operating System

    1:36

    Remove or Disable Unnecessary Services, Applications, and Network Protocols

    3:19

    Configure Operating System User Authentication

    11:07

    Additional Control Considerations

    2:36

    Conclusion

    3:57
  • Chapter 7 5 Lessons Securing the Server Software 26:04

    Software Security Recommendations

    4:39

    Configuring Access Controls

    3:35

    Resource Constraints and Mitigation Recommendations

    6:26

    Authentication and Encryption Technologies

    6:29

    Conclusion

    4:55
  • Chapter 8 8 Lessons Maintaining the Security of a Server 47:32

    It Starts with Logging

    3:33

    Logging Requirements

    3:09

    Reviewing and Retaining Log Files

    3:50

    Automated Log File Analysis Tools

    4:26

    Server Backup Types, Procedures and Policies

    8:04

    Recovering from a Security Compromise

    8:39

    Continuous Security Testing

    11:25

    Conclusion

    4:26
  • Chapter 9 2 Lessons Wrapping Up 5:02

    Additional Resources

    3:11

    What's Next?

    1:51

What you will need

  • It is assumed that learners have a basic understanding of system and network security and can navigate around the Linux and Windows operating systems.

What are Hands-on Labs

What's the difference between theoretical knowledge and real skills? Practical real-world experience. That's where Hands-on Labs come in! Hands-on Labs are guided, interactive experiences that help you learn and practice real-world scenarios in real cloud environments. Hands-on Labs are seamlessly integrated in courses, so you can learn by doing.

Practice alongside courses in Cloud Playground

What is Cloud Playground? Cloud Playground lets you build skills in real-world AWS, Google Cloud, and Azure environments. Spin up risk-free Sandboxes, Servers and Terminals and follow along with courses, test a new idea or prepare for exams.

Get Started
Who’s going to be learning?

How many seats do you need?

  • $499 USD per seat per year
  • Billed Annually
  • Renews in 12 months

Ready to accelerate learning?

For over 25 licenses, a member of our sales team will walk you through a custom tailored solution for your business.


$2,495.00

Checkout
Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!