Tutorials Security

Security

Firewalls, hardening, encryption, access control

security Intermediate

Configure ModSecurity 3 web application firewall with OWASP Core Rule Set for advanced threat protection

Set up ModSecurity 3 with OWASP Core Rule Set 4.0 to protect web applications from SQL injection, XSS, and other attacks. Configure integration with Nginx and Apache, implement custom rules, and optimize performance for production environments.

45 min 6 distros 705 views
security Intermediate

Configure ClamAV antivirus scanning with automated threat detection and email alerts

Set up ClamAV daemon for real-time malware detection with automated scanning schedules, email notifications for threats, and optimized performance settings for production servers.

25 min 6 distros 539 views
security Intermediate

Configure AppArmor security profiles for web servers and databases with custom policy enforcement

Set up mandatory access control for Nginx, Apache, MySQL, and PostgreSQL using AppArmor security profiles. Learn to create custom policies, debug profile violations, and implement advanced enforcement for production web servers and databases.

45 min 6 distros 493 views
security Intermediate

Configure GitLab LDAP authentication and user management with Active Directory integration

Set up GitLab LDAP authentication with Active Directory to centralize user management, enable automatic user provisioning, and implement group-based access control for your GitLab instance.

45 min 4 distros 351 views
security Intermediate

Configure NGINX rate limiting and DDoS protection with advanced security rules

Learn to configure production-grade NGINX rate limiting and DDoS protection with multiple security zones, advanced rules, and real-time monitoring to protect your web applications from malicious traffic and resource exhaustion attacks.

45 min 4 distros 368 views
security Intermediate

Secure Podman containers with SELinux and AppArmor mandatory access controls

Implement mandatory access controls for Podman containers using SELinux on Red Hat-based systems and AppArmor on Debian-based systems. Learn to configure security policies, monitor violations, and harden container security with production-grade controls.

45 min 4 distros 389 views
security Advanced

Implement Cilium Tetragon runtime security for Kubernetes with eBPF monitoring and threat detection

Deploy Cilium Tetragon for advanced runtime security monitoring in Kubernetes clusters using eBPF technology. Configure security policies, threat detection rules, and real-time monitoring with Grafana dashboards for comprehensive container protection.

45 min 4 distros 523 views
security Advanced

Configure Apache Airflow LDAP authentication and RBAC with Active Directory integration

Configure Apache Airflow with LDAP authentication against Active Directory, implement role-based access control (RBAC), and set up secure user group management for enterprise environments.

45 min 4 distros 444 views
security Intermediate

Install and configure Keycloak for enterprise authentication with clustering

Set up Keycloak as an enterprise identity provider with PostgreSQL backend, SSL encryption, and high availability clustering for OAuth2, OpenID Connect, and SAML authentication across your organization.

45 min 6 distros 392 views
security Intermediate

Install and configure Fail2ban with advanced rules and email alerts

Set up Fail2ban intrusion prevention system with custom SSH, web server, and application protection rules. Configure email notifications and advanced filtering to automatically block malicious IP addresses based on log patterns.

45 min 6 distros 458 views
security Intermediate

Install and configure Vault for secrets management with high availability

Set up HashiCorp Vault with Consul backend for production-grade secrets management. Configure clustering, authentication, policies, and security hardening for enterprise environments.

45 min 6 distros 571 views