About
About Us
Help
Privacy Policy
Terms of Service
LearnDesk
Learn
Academics
Business
Creative
Health and Fitness
Lifestyle
Personal Development
Software
Topics
Admissions
Engineering
Hardware
Hospitality
Humanities
Chinese
Languages
Maths
Pharma
View All Topics
Topics
Accounting
Advertising
Analysis
Analytics
Business Communication
eCommerce
Entrepreneurship
Finance
Finance - India
Freelancing
View All Topics
Topics
Arts & Crafts
Audio Editing
Audio Production
Dance
Design
Film Production
Music
Photography
Video Production
Writing
View All Topics
Topics
Dieting
Fitness
Food Safety
Games
Medical
Medical Professionals
Meditation
Mental Health
Pregnancy
Safety & First Aid
View All Topics
Topics
Beauty & Makeup
Food
Fashion
Gaming
Home Improvement
Parenting
Pet Care & Training
Relationships
Sustainable Living
View All Topics
Topics
Career Development
Learning
Religion and Spirituality
Self-Improvement
View All Topics
Topics
Accounting
Amazon Web Services
App Development
Continuous Integration
Backup Software
Business Automation
Computational Fluid Dynamics
Business Intelligence
Computer Aided Design (CAD)
View All Topics
Teach
Teach Online
Schedule
Items
Billing
Users
Marketing
Analytics
Settings
Change School
Account
Log In
Sign Up
Guide to Security for Linux Systems
Introduction and Course Overview
Introduction
Preview
Syllabus Overiew
Preview
Download Syllabus
Lab Setup
Creating First Virtual Machine
Download and Install VirtualBox
Linux Installation
Linux CentOS8 Installation
Security Concepts
Securing All Operating Systems
Importance of Linux Security
Preview
Type of Security Breach
Preview
What is Security and OS Hardening?
Preview
Change Password Parameters
Creating User Account and Changing Password
Disable SSH Access for a Specific User
Lock or Disable User Accounts Manually
Lock or Disable User Accounts
Lock User Account After 3 Failed Attempts
Restrict Direct "Root" Login
Set Password Policy
Change File Ownership
Change File Permissions
Linux File Ownership an Permissions
Change SSH Port
Message of the Day
One Service Per Server
Type of Security Breach
Guide to Security for Linux Systems
Security Concepts
By:
Imran Afzal
4 minutes
Share
Share the link to this page
Copied
Facebook
Twitter
WhatsApp
LinkedIn
Email
Add to Calendar
Add the class to your calendar
Add to Google Calendar
Add to Apple Calendar
Add to Yahoo Calendar
Add to Outlook Calendar
Print
Completed
In this lecture we are covering the type of computer or Linux security breach:
Data
Steal Corrupt
Remove Application
Apache webserver
Database
Financial applications
Operating System
File system corruption
System failure
Process management
Hardware
Attack on CPU, Memory, etc.
Previous
Next
Sign Up
Signup to access thousands of classes
Continue with Facebook
Continue with Google
OR
Continue with Email
Already a member?
Log In
By registering for a LearnDesk account, you agree to our
Terms of Service
and
Privacy Policy
.
Share
Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.
Share with Google Contacts