File System Security in Linux

Contents

keyboard_tab
Introduction
1
Introduction
PREVIEW1m 2s
File Attributes
ACLs
9
ACLs
9m 25s
10
ACLs Demo
6m 13s
Rootkits
11
Rootkits
8m 33s

The course is part of this learning path

Linux Security and Hardening
course-steps
7
certification
1
Introduction
Overview
Difficulty
Intermediate
Duration
1h 13m
Students
23
Ratings
5/5
starstarstarstarstar
Description

This course covers the security features that you can use in order to secure your files and directories on Linux. We look at permissions, data sharing, special modes, file attributes, ACLs, and rootkits. You will also have the chance to follow along with guided demonstrations which will give you a practical understanding of the concepts covered.

Learning Objectives

  • Learn how Linux file and directory permissions work and how to apply the proper permissions to files and directories
  • Learn how to share data securely with groups and multiple users on a Linux system
  • Understand how special modes add extra security to file systems
  • Learn how to make files unchangeable even by the root user and how to secure the log files on a Linux system by making them append-only
  • Learn how to secure files and directories using ACLs
  • Learn about rootkits and how to discover and remove them

Intended Audience

This course is intended for anyone who wants to understand how to secure their Linux systems.

Prerequisites

To get the most out of this course, you should already have a good working knowledge of Linux. If you want to brush up on your Linux skills, consider taking our Learn Linux in 5 Days learning path first.

Transcript

In this section of the course, you'll learn exactly how Linux file and directory permissions work and how to apply the proper permissions to files and directories. We'll pay special attention to sharing data with groups and multiple users on a Linux system, and how to do that in a secure fashion. From there, you'll learn about special permission modes, what they are, what they mean and how to manage them. Next, we'll cover file attributes. You'll learn how to make files unchangeable even by the root user. I'll also show you how to secure the log files on a Linux system by making them append-only. This way attackers can't easily cover their tracks. You'll also learn about access control lists or ACLs. You'll learn how to add an entirely new layer of security to files and directories that go beyond traditional Linux permissions. Finally, you'll learn about rootkits, how to discover them and how to remove them.

About the Author
Avatar
Jason Cannon
Founder, Linux Training Academy
Students
719
Courses
60
Learning Paths
6

Jason is the founder of the Linux Training Academy as well as the author of "Linux for Beginners" and "Command Line Kung Fu." He has over 20 years of professional Linux experience, having worked for industry leaders such as Hewlett-Packard, Xerox, UPS, FireEye, and Amazon.com. Nothing gives him more satisfaction than knowing he has helped thousands of IT professionals level up their careers through his many books and courses.