Securing a Linux Server
Duration: 01:27:48
Created with
Ben Fhala
Ben Fhala is the creative force and founder behind 02geek, a pioneering platform dedicated to making web development accessible to everyone. With over 18 years of experience in the industry, Ben has a deep passion for teaching and a knack for breaking down complex concepts into easy-to-understand lessons.
Securing a Linux Server Overview
What you'll learn
In the last course we walked you through the process of creating your first linux cloud device we walked you through managing users and groups and defining access levels of users. In this Lesson our focus will be turned to protect our server against external threats. By the end of this course you will have all the skills needed to protect your server against most common attacks.
Ready to Level Up Your Skills?
Join thousands of learners on 02GEEK and start your journey to becoming a coding expert today!
Enroll Now for Free!Securing a Linux Server Intro
The next few lessons we will install configure and protect our server against common attacks and improve the default security configurations of linux.
Sudo instead of using the root user
Before we do anything else we need to meet the sudo command. We talked about the importance of not using the root user and as such from now on we won't use that user. To access the rights of that user
Installing packages using the yum command
In this session we will see how we add a new package into our server using the yum command.
Securing our User from Attacks with Public and Private Keys
The idea behind public and private keys is removing the need for passwords. It automates the process of logging in but more then that it makes it literally impossible to hack.
Creating Public/Private Keys on a Mac
In this lesson we create a public private key that will be used to protect our access to our server. Our first step will be to create a new private/public key using the mac terminal
Protecting your Keys on your Mac
What we want to do is change the access level of the file itself to validate no one but you can access it.
Creating Public and Private Keys on Windows
We are back to the toolset of Putty and this time we are creating a key using the Putty Key generator (PuTTYgen). Follow the steps in our video to create your new public and private keys.
Connecting our Key in our Server User
It's time for us to connect this new key pair with our server so it can be used as the main way we validate the user and to log in.
Creating a Secure Password free login
Now that we validated our key works we are ready to disable the password and enable logins only via a public and private key.
5 Security tips you want to enforce
This is my 5 tips to help protect your server from attacks.
How to SSH with a non standard port
How to SSH with a non standard port. We will see how this is done both on windows and mac.
How to prevent brute force attacks
In this session we will talk about how you can avoid brute force attacks and keep your server fast and secure.
Wrapping up Our Talk about Security
Wrapping up Our Talk about Security
Bonus - Understanding YUM repos
We are about two hours into our server configurations but before we move into the next topic that will involve installing many applications using the YUM repo.
Update Packages to be more secure
We talk about keeping our server up to date using the yum command.
Ready to Level Up Your Skills?
Join thousands of learners on 02GEEK and start your journey to becoming a coding expert today!
Enroll Now for Free!