- 01. Intro to Linux Security
- 02. The Rule of Least Privilege
- 03. Becoming a Super User
- 04. sudo vs. su
- 05. Package Source Lists
- 06. Updating Available Package Lists
- 07. Upgrading Installed Packages
- 08. Other Package Related Tasks
- 09. Discovering Packages
- 10. Using Package Search
- 11. Using Finger
- 12. Introduction to /etc/passwd
- 13. Reading /etc/passwd Entries
- 14. User Account Info
- 15. Introduction to User Management
- 16. Creating a New User
- 17. Connecting as the New User
- 18. Introduction to etc sudoers
- 19. Giving Sudo Access
- 20. Resetting Passwords
- 21. Another Authentication Method
- 22. Public Key Encryption
- 23. Generating Key Pairs
- 24. Supported Key Types
- 25. Installing a Public Key
- 26. Forcing Key Based Authentication
- 27. Introduction to File Permissions
- 28. Owners and Groups
- 29. Identifying Owners and Groups
- 30. Octal Permissions [missing dialogue]
- 31. Octal File Permissions
- 32. chgrp and chown
- 33. Intro to Ports
- 34. Default Ports for Popular Services
- 35. Intro to Firewalls
- 36. Intro to UFW
- 37. Configuring Ports in UFW
- 38. Conclusion