Monitoring and Managing Linux Processes

  • by CertCop
  • Course level: Intermediate


Security Policies, what are the high-value assets you’re trying to pry to protect, what types of threats you are protecting against, and who are you trying to protect it from. Additional tools include installing fail2banm cryptsetup (disk encryption), and a password to nuke encrypted partitions. Also covered will be securing network services using the Beef framework, using firewalls including firewall builder, netfilter, uncomplicated firewall, iptables, and ip6tables. Monitoring and Logging will be covered as well as monitoring logs in real-time. Advanced Intrusion Detection Environment (AIDE)

Topics for this course

1 Lessons54m

Monitoring and Managing Linux Processes

Monitoring and Managing Linux Processes00:54:00

About the instructors

0 (0 ratings)

193 Courses

226 students