Physical Security for Linux

Contents

keyboard_tab
Introduction
1
Introduction
PREVIEW58s
Disabling Control Alt Delete
Summary
11

The course is part of this learning path

Linux Security and Hardening
course-steps
7
certification
1
Introduction
Overview
Difficulty
Intermediate
Duration
47m
Students
30
Ratings
5/5
starstarstarstarstar
Description

In this course, you'll learn about the importance of physical security and the threats posed by attackers who gain unauthorized physical access to your Linux system. We'll cover a range of points to consider when securing your Linux systems and the best strategies to take.

Learning Objectives

  • Understand the security challenges you'll face both when in direct control of your physical systems and when you use a third party to host them
  • Understand what to look for when choosing a third-party provider
  • Understand the physical security implications of using cloud environments
  • Learn specific strategies for mitigating physical security risks and protecting your Linux systems against the most common physical attacks
  • Learn about data encryption and how to implement it on new Linux systems, as well as those that are already in service

Intended Audience

This course is intended for anyone who wants a solid grasp of physical security considerations for their Linux system.

Prerequisites

To get the most out of this course, you should already have a good working knowledge of Linux. If you want to brush up on your Linux skills, consider taking our Learn Linux in 5 Days learning path first.

Transcript

In this section of the course, you'll learn about the importance of physical security and the threats posed by attackers who gain unauthorized physical access to your Linux system. You'll learn ways to protect your systems when you or your company are in control of physical security. Next, we'll talk about the challenges you'll face when using a third party to host your physical systems. You'll also learn what to look for when choosing a third party provider. We'll get into physical security implications of using Cloud environments as well. From there, you'll learn specific strategies you can employ to mitigate physical security risks. You'll learn how to protect your Linux systems against the most common physical attacks. Finally, we'll spend a good amount of time talking about data encryption, and specifically, how to implement it on new Linux systems, as well as those that are already in service.

About the Author
Avatar
Jason Cannon
Founder, Linux Training Academy
Students
719
Courses
60
Learning Paths
6

Jason is the founder of the Linux Training Academy as well as the author of "Linux for Beginners" and "Command Line Kung Fu." He has over 20 years of professional Linux experience, having worked for industry leaders such as Hewlett-Packard, Xerox, UPS, FireEye, and Amazon.com. Nothing gives him more satisfaction than knowing he has helped thousands of IT professionals level up their careers through his many books and courses.