Refer and Earn

Monitoring and Managing Linux Processes

  • by CertCop
  • Course level: Intermediate


Security Policies, what are the high-value assets you’re trying to pry to protect, what types of threats you are protecting against, and who are you trying to protect it from. Additional tools include installing fail2banm cryptsetup (disk encryption), and a password to nuke encrypted partitions. Also covered will be securing network services using the Beef framework, using firewalls including firewall builder, netfilter, uncomplicated firewall, iptables, and ip6tables. Monitoring and Logging will be covered as well as monitoring logs in real-time. Advanced Intrusion Detection Environment (AIDE)

Topics for this course

1 Lessons54m

Monitoring and Managing Linux Processes

Monitoring and Managing Linux Processes00:54:00

About the instructor

0 (0 ratings)

193 Courses

212 students


Refer & Earn

Signup or Login to start sharing your link
Signup / Login

Available Coupon