Tutorials Security

Security

Firewalls, hardening, encryption, access control

security Intermediate

Configure automated compliance scanning with OpenSCAP and audit reporting

Set up OpenSCAP security compliance scanning with automated systemd timers, generate HTML and XML audit reports, and configure SCAP security profiles for continuous compliance monitoring.

25 min 4 distros 31 views
security Advanced

Configure encrypted network storage with LUKS and NFS for secure file sharing

Set up enterprise-grade encrypted network storage by combining LUKS disk encryption with NFS file sharing. This advanced configuration provides secure, centralized file access across multiple systems while maintaining data protection at rest.

45 min 4 distros 39 views
security Intermediate

Set up LUKS full disk encryption during Linux installation

Configure full disk encryption with LUKS during OS installation to secure your data at rest. Includes post-installation key management, performance optimization, and troubleshooting for production systems.

45 min 4 distros 76 views
security Advanced

Configure auditd with Elasticsearch and Kibana for compliance reporting

Set up comprehensive Linux audit logging with auditd, integrate with Elasticsearch 8 and Kibana 8 for centralized analysis, and create compliance dashboards for PCI DSS, HIPAA, and SOX reporting requirements.

45 min 4 distros 39 views
security Intermediate

Configure LDAP authentication for centralized user management with OpenLDAP and SSSD

Set up centralized user authentication using OpenLDAP server with SSSD client integration. Configure PAM and NSS for seamless login across multiple Linux systems with directory-based user management.

45 min 4 distros 47 views
security Intermediate

Configure Nagios Core 4.5 SSL certificates and security hardening with authentication controls

Secure your Nagios monitoring with SSL certificates, advanced authentication, and comprehensive access controls. This guide covers Let's Encrypt integration, web interface hardening, and security monitoring setup.

45 min 4 distros 51 views
security Intermediate

Configure SELinux mandatory access controls for enhanced security

Set up SELinux on Ubuntu and Debian systems, configure security modes and policies, create custom application rules, and implement comprehensive monitoring for enhanced Linux security hardening.

45 min 4 distros 39 views
security Intermediate

Implement Linux file system encryption with LUKS and cryptsetup

Encrypt Linux file systems and partitions using LUKS (Linux Unified Key Setup) with cryptsetup tools. Configure encrypted storage, manage encryption keys, and implement backup procedures for production environments.

25 min 4 distros 72 views
security Advanced

Configure SSH certificate authentication with CA signing for secure server access

Set up SSH certificate-based authentication using a Certificate Authority to eliminate individual key management. Create signed user certificates that provide secure, scalable access control for multiple servers and users.

45 min 4 distros 62 views
security Intermediate

Configure SSH two-factor authentication with Google Authenticator TOTP

Add an extra layer of security to SSH logins by requiring both a password and a time-based one-time password (TOTP) generated by Google Authenticator or compatible apps.

25 min 4 distros 78 views
security Intermediate

Configure OSSEC vulnerability detection with CVE scanning and automated security alerts

Set up OSSEC Host Intrusion Detection System with vulnerability scanning capabilities, CVE database integration, and automated alerting for comprehensive security monitoring across your infrastructure.

25 min 4 distros 37 views
security Advanced

Integrate OSSEC with Splunk for centralized security monitoring and log analysis

Set up OSSEC HIDS with Splunk Universal Forwarder to centralize security events, create monitoring dashboards, and enable real-time threat correlation across your infrastructure.

45 min 4 distros 40 views