Hackproof your Linux server

Linux security guide with practical hardening tips

   Watch Promo   Enroll in Course

Linux Servers provide many user transactions, which are constantly vulnerable to security threats, due to data sensitivity. To bring an application up and running on a server is an important thing, but without taking security measures, it can end up in a disaster. Although Linux is immune to some of the dangers Windows servers encounters, Internet is still a dangerous place. Therefore it's important to apply security measures to prevent malicious attacks like brute force attack, etc.

This course was designed to show some practical tips on how to protect your server, that once applied, they will increase the level of security on your system and decrease the chances of it being compromised.

Along with the video lectures, you will also find exercises to help you improve your hands-on experience.


Your Instructor(s)


Gabriel Avramescu
Gabriel Avramescu

Senior Information Security Consultant

  • I work in the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.
  • Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking).
  • Make recommendations on security weaknesses and report on activities and findings. 
  • Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated) 
  • Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment
  • Perform analysis and testing to verify the strengths and weaknesses of Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.)
  • Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures 
  • Assist with the development of remediation services for identified findings 
  • Customize, operate, audit, and maintain security related tools and applications

IT Trainer 

  • CEH, ECSA, CHFI from EC-Council
  • Cisco CCNA, CCNA Security, Linux Essentials

Certifications

  • OSCE
  • OSWE
  • OSWP
  • CREST Registered Penetration Tester (CRT)
  • OSCP
  • CHFI (Computer Hacking Forensic Investigator)
  • ISO 270001 Lead Auditor
  • ECSA (EC-Council Security Analyst)
  • CEH (Certified Ethical Hacker)
  • CCNA and CCNA Security
  • CCNP Routing and CCNP Switching
  • Advanced Linux&InfoSEC
  • VMWare vSphere Install, Configure, Manage
  • Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.

Course Curriculum


  Introduction
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.

Start Learning Today!