02Geek HTML5 and JavaScript, TypeScript, React, Flash, ActionScript online School

Securing a Linux Server

protecting our server against external threats. By the end of this course you will have all the skills needed to protect your server against most common attacks.

Duration: 01:27:48

Created with

Ben Fhala

Ben Fhala

Ben Fhala is the creative force and founder behind 02geek, a pioneering platform dedicated to making web development accessible to everyone. With over 18 years of experience in the industry, Ben has a deep passion for teaching and a knack for breaking down complex concepts into easy-to-understand lessons.

Securing a Linux Server Overview

What you'll learn

In the last course we walked you through the process of creating your first linux cloud device we walked you through managing users and groups and defining access levels of users. In this Lesson our focus will be turned to protect our server against external threats. By the end of this course you will have all the skills needed to protect your server against most common attacks.

Securing a Linux Server Intro

The next few lessons we will install configure and protect our server against common attacks and improve the default security configurations of linux.

00:49

Sudo instead of using the root user

Before we do anything else we need to meet the sudo command. We talked about the importance of not using the root user and as such from now on we won't use that user. To access the rights of that user

04:32

Installing packages using the yum command

In this session we will see how we add a new package into our server using the yum command.

07:33

Securing our User from Attacks with Public and Private Keys

The idea behind public and private keys is removing the need for passwords. It automates the process of logging in but more then that it makes it literally impossible to hack.

01:29

Creating Public/Private Keys on a Mac

In this lesson we create a public private key that will be used to protect our access to our server. Our first step will be to create a new private/public key using the mac terminal

06:42

Protecting your Keys on your Mac

What we want to do is change the access level of the file itself to validate no one but you can access it.

02:08

Creating Public and Private Keys on Windows

We are back to the toolset of Putty and this time we are creating a key using the Putty Key generator (PuTTYgen). Follow the steps in our video to create your new public and private keys.

08:22

Connecting our Key in our Server User

It's time for us to connect this new key pair with our server so it can be used as the main way we validate the user and to log in.

15:23

Creating a Secure Password free login

Now that we validated our key works we are ready to disable the password and enable logins only via a public and private key.

02:57

5 Security tips you want to enforce

This is my 5 tips to help protect your server from attacks.

13:59

How to SSH with a non standard port

How to SSH with a non standard port. We will see how this is done both on windows and mac.

06:17

How to prevent brute force attacks

In this session we will talk about how you can avoid brute force attacks and keep your server fast and secure.

10:42

Wrapping up Our Talk about Security

Wrapping up Our Talk about Security

00:22

Bonus - Understanding YUM repos

We are about two hours into our server configurations but before we move into the next topic that will involve installing many applications using the YUM repo.

03:17

Update Packages to be more secure

We talk about keeping our server up to date using the yum command.

03:15
Download Source Files