UsefulLinks
Computer Science
Operating Systems
Linux
Linux Administration
1. Introduction to Linux and System Administration
2. The Command-Line Interface (CLI)
3. User and Group Management
4. File Permissions and Ownership
5. Process Management
6. Software and Package Management
7. System Services and Daemons
8. Networking
9. Storage Management
10. System Security
11. Shell Scripting and Automation
12. System Monitoring and Performance
13. Backup and Recovery
14. Advanced Topics
10.
System Security
10.1.
Principles of System Hardening
10.1.1.
Minimizing Attack Surface
10.1.2.
Disabling Unused Services
10.1.3.
Applying Security Updates
10.1.4.
Secure Configuration Practices
10.2.
Firewall Management
10.2.1.
Concepts of Firewalls
10.2.2.
Managing Rules with iptables
10.2.3.
Using firewalld
10.2.4.
Using ufw (Uncomplicated Firewall)
10.2.5.
Opening and Closing Ports
10.2.6.
Saving and Restoring Rules
10.3.
Intrusion Detection and Prevention
10.3.1.
Host-Based Intrusion Detection Systems (HIDS)
10.3.2.
Monitoring Suspicious Activity
10.3.3.
Security Auditing Tools
10.4.
Security-Enhanced Linux (SELinux) and AppArmor
10.4.1.
SELinux Concepts
10.4.1.1.
Modes
10.4.1.1.1.
Enforcing
10.4.1.1.2.
Permissive
10.4.1.1.3.
Disabled
10.4.1.2.
Policy Types
10.4.1.3.
Managing Contexts
10.4.2.
AppArmor Concepts
10.4.2.1.
Profiles and Modes
10.4.2.2.
Managing Profiles
10.4.3.
Basic Policy Management
10.4.3.1.
Allowing and Denying Access
10.4.3.2.
Troubleshooting Denials
10.5.
Auditing and Logging
10.5.1.
System Logs in /var/log
10.5.1.1.
Log File Types
10.5.1.2.
Log Rotation
10.5.2.
Syslog and Rsyslog
10.5.2.1.
Configuration and Management
10.5.3.
Monitoring and Analyzing Logs
Previous
9. Storage Management
Go to top
Next
11. Shell Scripting and Automation