• Post category:StudyBullet-8
  • Reading time:3 mins read


Best Practices: A Hackers Perspective

What you will learn

Learn Security Based Practices

Compromise a Linux machine

Understand common misconfigurations

Explain common security mistakes

Description

There are some basic things that you need to keep in mind as a Linux administrator if you want to keep your system fairly secure. By fairly secure, i mean that there’s no malware or malicious users, who can easily get access to your systems.

This course explains Linux Security Best Practices. What makes a good password? What can happen if you run scripts from the internet?Β Can an attacker can root at your system? In this course IΒ will answer all those questions and give you demos of how the systems may be compromised.

Contrary to popular belief, Linux systems can be hacked, have viruses or malware. This course teaches you how to happens from a hacker perspective. You’ll learn some of the ways how hackers can get into your Linux machine and how a hacker does that. This course focuses on Linux systems. It does not cover physical security such as attacks like Rubber Ducky.


Get Instant Notification of New Courses on our Telegram channel.


This is a beginners course, you don’t need any prior knowledge when doing this course except knowing how to use Linux. Regardless of whether you use Linux as a server or on the desktop, this course will increase your Linux Security knowledge.

If you are a Linux Sysadmin, Software Developer, Ethical Hacker or Linux desktop user, this course is for you.

English
language

Content

Introduction

Introduction
Why Good Passwords?
Is it a Good Password?
Why NOT run scripts from the web?
Why NOT run scripts from the web? (notes)
Why Permissions Matter
Misconfigurations
Misconfigurations notes