Linux is beloved by its many users for its efficiency, reliability, and customizability, and is commonly used in many organizations, often at the core of their operations. Unfortunately, threat actors have also turned their gazes towards Linux servers, with the valuable data they store and networks they support too tempting to pass over. Attacks against Linux servers are higher than ever, and many organizations may unknowingly be putting themselves at risk. After so many years of Linux being ignored by attackers, the simplest steps to decrease vulnerability and reduce risk may not have ever been implemented in your Linux infrastructure.
Join Bob Erdman, noted cybersecurity expert and senior product manager at Core Security for the Linux Security Tips and Tricks eCourse to learn how to make sure your Linux systems have a solid foundation of security, with easy to follow instructions and lessons
Linux has become a staple in most organizational IT environments, due to its reliability and capacity to handle heavy duty tasks for enterprise servers. Unfortunately, these are the very same reasons Linux has become a popular target for attackers. The data Linux servers store and the networks they support are so valuable, attackers have decided it is worth the time to invest in creating malware geared toward Linux.
For many years, Linux was thought to be immune to attack. But even though those days are long over, many environments have still not taken the basic steps needed to decrease their vulnerability and significantly reduce risk.
This course is designed to teach you Linux security tips and tricks that are easy to implement while making it harder to be attacked.
- Introduction to Linux Security
- Chapter 1 | Verify Defaults and Functionality
- Chapter 2 | Verify Origins and Authenticity
- Chapter 3 | Remove Unnecessary Software
- Chapter 4 | Avoid Unexpected Downtime
- Chapter 5 | Enforce Authentication and Encryption
- Chapter 6 | Audits and Ownership
- Chapter 7 | Root Best Practices
- Next Steps