Tutorials Security

Security

Firewalls, hardening, encryption, access control

security Intermediate

Configure NGINX rate limiting and advanced security rules for DDoS protection

Configure NGINX with comprehensive rate limiting, connection throttling, and advanced security headers to protect your web applications from DDoS attacks and malicious traffic. Learn to implement zone-based rate limiting, geographic blocking, and real-time monitoring for production environments.

25 min 4 distros 241 views
security Intermediate

Configure SSH port forwarding and tunneling for secure connections

Learn to configure SSH port forwarding, remote tunnels, and SOCKS proxy for secure network connections. Set up local, remote, and dynamic port forwarding with automated monitoring and security hardening.

35 min 4 distros 153 views
security Intermediate

Configure Redis backup encryption with GPG for secure automated backups

Set up encrypted Redis backups using GPG keys with automated scheduling through systemd timers. This tutorial covers GPG key management, backup script creation, and secure restoration procedures for production Redis environments.

45 min 4 distros 290 views
security Intermediate

Set up OSSEC agent deployment and centralized management with automated configuration

Deploy and manage OSSEC Host-based Intrusion Detection System (HIDS) across multiple servers with centralized monitoring, automated agent configuration, and real-time security event processing for enterprise-scale infrastructure protection.

45 min 4 distros 250 views
security Intermediate

Setup Nginx with ModSecurity 3 web application firewall for advanced threat protection

Configure Nginx with ModSecurity 3 and OWASP Core Rule Set to protect web applications against SQL injection, XSS, and other common attacks. This tutorial covers complete WAF setup with security rules, performance optimization, and threat testing.

45 min 4 distros 216 views
security Intermediate

Configure SonarQube LDAP authentication with Active Directory and user group management

Set up SonarQube to authenticate users against Active Directory using LDAP. Configure automatic user provisioning, group synchronization, and role-based access control for enterprise environments with centralized authentication.

25 min 4 distros 182 views
security Intermediate

Set up centralized logging with rsyslog and logrotate for security events

Configure a centralized rsyslog server to collect security events from multiple systems, implement automated log rotation with logrotate, and set up filtering and alerting for critical security incidents across your infrastructure.

45 min 4 distros 237 views
security Intermediate

Configure Node.js JWT authentication with Redis session storage and security hardening

Set up secure JWT authentication for Node.js applications with Redis session storage, security middleware, and production-ready hardening practices.

45 min 4 distros 195 views
security Intermediate

Configure SonarQube LDAP authentication and user management with Active Directory integration

Set up enterprise user authentication for SonarQube using LDAP and Active Directory. Configure group mapping, role-based access control, and automated user provisioning for centralized identity management.

45 min 4 distros 208 views
security Intermediate

Configure Vault auto-unseal with AWS KMS for high availability secrets management

Set up HashiCorp Vault with AWS KMS auto-unseal to eliminate manual unsealing processes and enable high availability deployments with automatic recovery.

25 min 4 distros 219 views
security Intermediate

Configure Linux user and group management with sudo access control

Learn to create and manage Linux users and groups with proper sudo access control, security hardening, and monitoring. This comprehensive guide covers account creation, group membership management, sudo configuration, and security best practices for production environments.

45 min 4 distros 281 views
security Intermediate

Set up NGINX web application firewall with ModSecurity 3 and OWASP Core Rule Set

Configure a production-grade web application firewall using NGINX with ModSecurity 3 and OWASP Core Rule Set. Includes logging, monitoring, and fail2ban integration for comprehensive threat protection.

45 min 4 distros 320 views