Many people assume that Linux is already secure, some of this comes from the misunderstanding the press and general population has about Linux, such as that Linux can’t be hacked or that there are no Linux-based malware, these are all false assumptions. This course starts with an introduction to Linux security hardening and how to build your lab. It then deep-dives into the Linux attack surface and how to perform threat modeling in Linux-based systems (on-premises and in the cloud).
In this course, you will learn how to securely configure Linux EC2 instances in Amazon Web Services (AWS) and how to monitor and perform automated actions for Linux systems in the cloud. You will learn how to use cloud services such as Cloudwatch and Cloudtrail to maintain visibility and control of cloud-based Linux environments. In this course, you will explore techniques for BIOS protection, hard-disk encryption, and how to protect different cryptographic services in Red Hat Enterprise Linux, Debian-based distributions, and Amazon Linux. You will also learn details about open source security, Software Bill of Materials (SBOMs), and Vulnerability Exploitability Exchange (VEX) profiles using the Common Security Advisory Framework (CSAF) machine-readable format for automation. This course ends with an introduction of container-optimized Linux distributions, their security benefits, and challenges.
Additional information coming soon!