Best Practices: A Hackers Perspective
Description
There are some basic things that you need to keep in mind as a Linux administrator if you want to keep your system fairly secure. By fairly secure, i mean that there’s no malware or malicious users, who can easily get access to your systems.
This course explains Linux Security Best Practices. What makes a good password? What can happen if you run scripts from the internet? Can an attacker can root at your system? In this course I will answer all those questions and give you demos of how the systems may be compromised.
Contrary to popular belief, Linux systems can be hacked, have viruses or malware. This course teaches you how to happens from a hacker perspective. You’ll learn some of the ways how hackers can get into your Linux machine and how a hacker does that. This course focuses on Linux systems. It does not cover physical security such as attacks like Rubber Ducky.
This is a beginners course, you don’t need any prior knowledge when doing this course except knowing how to use Linux. Regardless of whether you use Linux as a server or on the desktop, this course will increase your Linux Security knowledge.
If you are a Linux Sysadmin, Software Developer, Ethical Hacker or Linux desktop user, this course is for you.
Who this course is for:
- Linux users
- Sysadmins
- Beginner Ethical Hackers