Securing our User from Attacks with Public and Private Keys
The idea behind public and private keys is removing the need for passwords. It automates the process of logging in but more then that it makes it literally impossible to hack into the key because its a lot more complex then what we can type on our own. The only weakness of the key is if someone has direct access to our private/public keys. In the next few lessons we will see how to create a private/public key on mac and windows.
Securing a Linux Server Intro
The next few lessons we will install configure and protect our server against common attacks and improve the default security configurations of linux.
00:49
Sudo instead of using the root user
Before we do anything else we need to meet the sudo command. We talked about the importance of not using the root user and as such from now on we won't use that user. To access the rights of that user
04:32
Installing packages using the yum command
In this session we will see how we add a new package into our server using the yum command.
07:33
Securing our User from Attacks with Public and Private Keys
The idea behind public and private keys is removing the need for passwords. It automates the process of logging in but more then that it makes it literally impossible to hack.
01:29
Creating Public/Private Keys on a Mac
In this lesson we create a public private key that will be used to protect our access to our server. Our first step will be to create a new private/public key using the mac terminal
06:42
Protecting your Keys on your Mac
What we want to do is change the access level of the file itself to validate no one but you can access it.
02:08
Creating Public and Private Keys on Windows
We are back to the toolset of Putty and this time we are creating a key using the Putty Key generator (PuTTYgen). Follow the steps in our video to create your new public and private keys.
08:22
Connecting our Key in our Server User
It's time for us to connect this new key pair with our server so it can be used as the main way we validate the user and to log in.
15:23
Creating a Secure Password free login
Now that we validated our key works we are ready to disable the password and enable logins only via a public and private key.
02:57
5 Security tips you want to enforce
This is my 5 tips to help protect your server from attacks.
13:59
How to SSH with a non standard port
How to SSH with a non standard port. We will see how this is done both on windows and mac.
06:17
How to prevent brute force attacks
In this session we will talk about how you can avoid brute force attacks and keep your server fast and secure.
10:42
Wrapping up Our Talk about Security
Wrapping up Our Talk about Security
00:22
Bonus - Understanding YUM repos
We are about two hours into our server configurations but before we move into the next topic that will involve installing many applications using the YUM repo.
03:17
Update Packages to be more secure
We talk about keeping our server up to date using the yum command.
03:15