
Securing a Linux Server
Protect your server against most common attacks.
In the last course we walked you through the process of creating your first linux cloud device we walked you through managing users and groups and defining access levels of users. In this Lesson our focus will be turned to protect our server against external threats. By the end of this course you will have all the skills needed to protect your server against most common attacks.
Get this course as part of a bundle.
Your Instructor

An Adobe ACP and part of the Adobe pre-release members. Owner of 02Geek.com and the author of the book HTML5 Graphing and Data Visualization. Award winning developer. Most of all a guy that really loves learning and teaching when ever he can. I hope you find my courses interesting and I really hope you enjoy them.
Course Curriculum
-
StartSecuring a Linux Server Intro
-
StartSudo instead of using the root user
-
StartInstalling packages using the yum command
-
StartSecuring our User from Attacks with Public and Private Keys
-
StartCreating Public/Private Keys on a Mac
-
StartProtecting your Keys on your Mac
-
StartCreating Public and Private Keys on Windows
-
StartConnecting our Key in our Server User
-
StartCreating a Secure Password free login
-
Start5 Security tips you want to enforce
-
StartHow to SSH with a non standard port
-
StartHow to prevent brute force attacks
-
StartWrapping up Our Talk about Security
-
StartBonus - Understanding YUM repos
-
StartUpdate Packages to be more secure