Tutorials Security

Security

Firewalls, hardening, encryption, access control

security Intermediate

Configure backup encryption with GPG and rsync for secure automated backups

Set up automated encrypted backups using GPG 2.4 and rsync with systemd timers. This tutorial covers GPG key management, encrypted backup scripts, and restoration procedures for production environments.

45 min 4 distros 673 views
security Intermediate

Configure OSSEC HIDS for intrusion detection with email alerts and real-time monitoring

Set up OSSEC Host-based Intrusion Detection System with server-agent architecture, custom detection rules, email notifications, and real-time monitoring for comprehensive security monitoring across multiple systems.

45 min 6 distros 543 views
security Intermediate

Configure Linux firewall rules with fail2ban for SSH brute force protection and intrusion prevention

Set up fail2ban to automatically block SSH brute force attacks and protect your Linux server from unauthorized access attempts. Configure custom jails, firewall integration, and email notifications for comprehensive intrusion prevention.

25 min 6 distros 601 views
security Intermediate

Configure ModSecurity 3 web application firewall with OWASP Core Rule Set for advanced threat protection

Set up ModSecurity 3 with OWASP Core Rule Set 4.0 to protect web applications from SQL injection, XSS, and other attacks. Configure integration with Nginx and Apache, implement custom rules, and optimize performance for production environments.

45 min 6 distros 1,040 views
security Intermediate

Configure ClamAV antivirus scanning with automated threat detection and email alerts

Set up ClamAV daemon for real-time malware detection with automated scanning schedules, email notifications for threats, and optimized performance settings for production servers.

25 min 6 distros 640 views
security Intermediate

Configure AppArmor security profiles for web servers and databases with custom policy enforcement

Set up mandatory access control for Nginx, Apache, MySQL, and PostgreSQL using AppArmor security profiles. Learn to create custom policies, debug profile violations, and implement advanced enforcement for production web servers and databases.

45 min 6 distros 696 views
security Intermediate

Configure GitLab LDAP authentication and user management with Active Directory integration

Set up GitLab LDAP authentication with Active Directory to centralize user management, enable automatic user provisioning, and implement group-based access control for your GitLab instance.

45 min 4 distros 516 views
security Intermediate

Configure NGINX rate limiting and DDoS protection with advanced security rules

Learn to configure production-grade NGINX rate limiting and DDoS protection with multiple security zones, advanced rules, and real-time monitoring to protect your web applications from malicious traffic and resource exhaustion attacks.

45 min 4 distros 506 views
security Intermediate

Secure Podman containers with SELinux and AppArmor mandatory access controls

Implement mandatory access controls for Podman containers using SELinux on Red Hat-based systems and AppArmor on Debian-based systems. Learn to configure security policies, monitor violations, and harden container security with production-grade controls.

45 min 4 distros 536 views
security Intermediate

Install and configure Keycloak for enterprise authentication with clustering

Set up Keycloak as an enterprise identity provider with PostgreSQL backend, SSL encryption, and high availability clustering for OAuth2, OpenID Connect, and SAML authentication across your organization.

45 min 6 distros 511 views
security Intermediate

Install and configure Fail2ban with advanced rules and email alerts

Set up Fail2ban intrusion prevention system with custom SSH, web server, and application protection rules. Configure email notifications and advanced filtering to automatically block malicious IP addresses based on log patterns.

45 min 6 distros 604 views
security Intermediate

Install and configure Vault for secrets management with high availability

Set up HashiCorp Vault with Consul backend for production-grade secrets management. Configure clustering, authentication, policies, and security hardening for enterprise environments.

45 min 6 distros 668 views