Tutorials Security

Security

Firewalls, hardening, encryption, access control

security Intermediate

Implement network security with iptables connection tracking and stateful packet filtering

Configure iptables with connection tracking modules to implement stateful packet filtering, advanced NAT rules, and comprehensive network security monitoring. Build robust firewall rules that track connection states and provide granular control over network traffic.

45 min 4 distros 403 views
security Intermediate

Implement Deno JWT authentication with OAuth2 integration for secure API development

Set up production-grade JWT authentication middleware in Deno with OAuth2 provider integration and role-based access control. Learn to secure API endpoints with proper token validation, user management, and enterprise-ready authentication flows.

45 min 4 distros 438 views
security Intermediate

Implement encryption for Consul backups using GPG with automated snapshots and secure storage

Learn to create encrypted Consul backups using GPG encryption with automated snapshot scripts, secure key management, and remote storage integration for production disaster recovery.

45 min 4 distros 388 views
security Intermediate

Implement Apache web application firewall with ModSecurity 3 and OWASP Core Rule Set

Deploy ModSecurity 3 as an Apache module with OWASP Core Rule Set to protect web applications from common attacks. Configure real-time logging, custom rules, and automated threat detection for production environments.

45 min 4 distros 520 views
security Intermediate

Implement HAProxy rate limiting and DDoS protection with advanced security rules

Configure HAProxy with comprehensive rate limiting, connection throttling, and DDoS protection using stick tables, ACLs, and advanced security rules to protect your applications from malicious traffic and ensure service availability.

45 min 4 distros 429 views
security Intermediate

Setup remote backup storage with S3-compatible encryption and automated retention policies

Configure secure, encrypted backup storage using S3-compatible providers with automated retention policies, client-side GPG encryption, and monitoring scripts for reliable data protection.

45 min 4 distros 467 views
security Intermediate

Configure Apache rate limiting and DDoS protection with mod_security and mod_evasive

Set up comprehensive Apache protection against DDoS attacks and malicious traffic using mod_evasive for rate limiting, mod_security with OWASP rules for web application firewall capabilities, and fail2ban integration for automated IP blocking.

25 min 4 distros 447 views
security Intermediate

Implement FastAPI authentication with JWT and OAuth2 for secure API development

Build secure FastAPI applications with JWT token authentication and OAuth2 password bearer flows. Learn to implement role-based access control and protect API endpoints with production-ready security patterns.

45 min 4 distros 938 views
security Intermediate

Set up Node.js application security with Helmet and rate limiting

Secure your Node.js Express applications against common vulnerabilities with Helmet.js middleware and implement rate limiting to prevent abuse and DDoS attacks.

25 min 4 distros 906 views
security Intermediate

Configure GitLab SAML authentication with Keycloak for enterprise SSO

Set up single sign-on (SSO) authentication between GitLab and Keycloak using SAML 2.0 protocol. This enables centralized user management and secure authentication for your GitLab instance through your existing identity provider infrastructure.

45 min 4 distros 364 views
security Intermediate

Configure Kibana LDAP authentication and RBAC with Active Directory integration

Set up secure Kibana authentication using Active Directory LDAP with role-based access control to manage user permissions and streamline enterprise login workflows. This tutorial covers Elasticsearch security configuration, LDAP realm setup, and user role mappings.

45 min 4 distros 508 views
security Intermediate

Configure Linux audit logging for security compliance and monitoring

Set up comprehensive audit logging with auditd daemon to track file system changes, process execution, and network connections for security compliance and forensic analysis.

35 min 4 distros 523 views