TorBT - Torrents and Magnet Links Search Engine
Linux Academy Red Hat Certificate of Expertise in Server Hardening Prep Course
- Date: 2026-05-10
- Size: 2.0 GB
- Files: 57
File Name
Size
1 - Introduction/1 - Meet Your Course Author.mp4
10 MB
1 - Introduction/2 - Introduction to Linux Academy.mp4
86 MB
1 - Introduction/3 - Course Prerequisites.mp4
18 MB
1 - Introduction/4 - Why Server Hardening.mp4
32 MB
1 - Introduction/5 - Get Recognized!.mp4
7.6 MB
10 - Configure System-wide Acceptable Use Notifications/1 - Changing the SSH Banner.mp4
15 MB
10 - Configure System-wide Acceptable Use Notifications/2 - Changing the Message of the Day.mp4
16 MB
10 - Configure System-wide Acceptable Use Notifications/3 - Use a Shell Script to Customize a Message Viewed Upon Login.mp4
27 MB
11 - Install and Configure Identity Management Service/1 - What is IdM - Identity Management.mp4
25 MB
11 - Install and Configure Identity Management Service/2 - Install IdM - Identity Management Server.mp4
51 MB
11 - Install and Configure Identity Management Service/3 - Install IdM on a Client Server.mp4
49 MB
12 - Configure Remote System Logging Services/1 - System Logging via rsyslog.mp4
33 MB
12 - Configure Remote System Logging Services/2 - Managing System Log Files.mp4
51 MB
12 - Configure Remote System Logging Services/3 - Configure Remote Logging Services.mp4
47 MB
13 - Configure System Auditing Services/1 - Configure and Install System Auditing Services.mp4
28 MB
13 - Configure System Auditing Services/2 - Review Audit Data.mp4
70 MB
13 - Configure System Auditing Services/3 - Getting Reports Out of Audit Data.mp4
32 MB
14 - Network Scanning Tools and IPTables/1 - Install and Use nmap.mp4
71 MB
14 - Network Scanning Tools and IPTables/2 - Install and Use nessus.mp4
64 MB
14 - Network Scanning Tools and IPTables/3 - IPTables Overview.mp4
32 MB
14 - Network Scanning Tools and IPTables/4 - IPTables - Part 2.mp4
88 MB
15 - Conclusion/1 - Conclusion.mp4
8.7 MB
15 - Conclusion/2 - Next Steps.mp4
6.6 MB
15 - Conclusion/3 - Get Recognized!.mp4
7.6 MB
2 - Identify Common Red Hat Vulnerabilities and Exposures/1 - The CIA Model.mp4
62 MB
2 - Identify Common Red Hat Vulnerabilities and Exposures/2 - Updating Systems.mp4
45 MB
3 - Verify Package Security and Validity/1 - Verifying Packages - Yum.mp4
46 MB
3 - Verify Package Security and Validity/2 - Installing and Verifying Packages with RPM.mp4
26 MB
4 - Identify and Employ Standards-based Practices/1 - Common Standards.mp4
61 MB
4 - Identify and Employ Standards-based Practices/2 - Common Standards - Examples.mp4
73 MB
4 - Identify and Employ Standards-based Practices/3 - Create and Use Encrypted File Systems.mp4
62 MB
4 - Identify and Employ Standards-based Practices/4 - File System Features.mp4
48 MB
4 - Identify and Employ Standards-based Practices/5 - File System Features - Hands On.mp4
55 MB
5 - Configure Defaults for File Systems/1 - File System Properties for ext4.mp4
22 MB
5 - Configure Defaults for File Systems/2 - File System Properties for XFS.mp4
26 MB
5 - Configure Defaults for File Systems/3 - Files - SUID.mp4
46 MB
5 - Configure Defaults for File Systems/4 - Files - GID.mp4
18 MB
5 - Configure Defaults for File Systems/5 - Files - Sticky Bit.mp4
25 MB
5 - Configure Defaults for File Systems/6 - Files - FACL.mp4
63 MB
6 - Install and Use Intrusion Detection/1 - Security Tools - AIDE.mp4
49 MB
6 - Install and Use Intrusion Detection/2 - Security Tools - OSSEC.mp4
66 MB
7 - Manage User Account and Password Security/1 - User Accounts.mp4
39 MB
7 - Manage User Account and Password Security/2 - Setting User Account Defaults.mp4
31 MB
7 - Manage User Account and Password Security/3 - Group Accounts and Group Administrators.mp4
28 MB
8 - PAM - Pluggable Authentication Modules/1 - What is PAM.mp4
32 MB
8 - PAM - Pluggable Authentication Modules/2 - A Further Look at PAM.mp4
32 MB
9 - Configure Console Security/1 - Console Security.mp4
46 MB
9 - Configure Console Security/2 - Console Security - Hands On.mp4
32 MB
red-hat-enterprise-linux-6-identity-management-guide-en-us.pdf
50 MB
red-hat-enterprise-linux-6-security-enhanced-linux-en-us.pdf
3.8 MB
red-hat-enterprise-linux-6-security-guide-en-us.pdf
25 MB
red-hat-enterprise-linux-6-storage-administration-guide-en-us.pdf
18 MB
red-hat-enterprise-linux-7-security-guide-en-us.pdf
9.4 MB
red-hat-enterprise-linux-7-selinux-users-and-administrators-guide-en-us.pdf
26 MB
redhat-serverhardening-study-guide.pdf
396 kB
rhel-certficate-of-expertise-in-server-hardening-course-slides.pdf
2.1 MB
Setuid Test.rar
2.7 kB