Tutorials Security

Security

Firewalls, hardening, encryption, access control

security Advanced

Configure SSL encryption and authentication for ClamAV cluster with high availability scanning

Set up a secure ClamAV cluster with SSL/TLS encryption, certificate-based authentication, and load balancing for enterprise-grade antivirus scanning. This tutorial covers SSL certificate generation, encrypted inter-node communication, and HAProxy SSL termination.

45 min 4 distros 222 views
security Advanced

Implement MinIO security hardening with IAM policies and audit logging

Secure your MinIO object storage with comprehensive IAM policies, role-based access control, and audit logging for compliance monitoring. This tutorial covers user management, policy creation, and security validation for production environments.

45 min 4 distros 275 views
security Intermediate

Configure Vault auto-unseal with AWS KMS for high availability secrets management

Set up HashiCorp Vault with AWS KMS auto-unseal to eliminate manual unsealing processes and enable high availability deployments with automatic recovery.

25 min 4 distros 130 views
security Advanced

Configure SELinux policies for web applications and databases with custom rules and security hardening

Learn how to implement mandatory access controls with SELinux for web servers and databases. Configure custom security contexts, create application-specific policies, and harden your infrastructure with advanced SELinux rules.

45 min 4 distros 140 views
security Intermediate

Configure Linux user and group management with sudo access control

Learn to create and manage Linux users and groups with proper sudo access control, security hardening, and monitoring. This comprehensive guide covers account creation, group membership management, sudo configuration, and security best practices for production environments.

45 min 4 distros 215 views
security Intermediate

Set up NGINX web application firewall with ModSecurity 3 and OWASP Core Rule Set

Configure a production-grade web application firewall using NGINX with ModSecurity 3 and OWASP Core Rule Set. Includes logging, monitoring, and fail2ban integration for comprehensive threat protection.

45 min 4 distros 256 views
security Intermediate

Implement network security with iptables connection tracking and stateful packet filtering

Configure iptables with connection tracking modules to implement stateful packet filtering, advanced NAT rules, and comprehensive network security monitoring. Build robust firewall rules that track connection states and provide granular control over network traffic.

45 min 4 distros 282 views
security Advanced

Configure ClickHouse users and RBAC for production environments with authentication and access control

Secure your ClickHouse deployment with proper user authentication, role-based access control, and production-grade security policies. Learn to create users, manage roles, implement quota systems, and monitor access patterns for enterprise environments.

45 min 4 distros 299 views
security Intermediate

Implement Deno JWT authentication with OAuth2 integration for secure API development

Set up production-grade JWT authentication middleware in Deno with OAuth2 provider integration and role-based access control. Learn to secure API endpoints with proper token validation, user management, and enterprise-ready authentication flows.

45 min 4 distros 354 views
security Intermediate

Implement encryption for Consul backups using GPG with automated snapshots and secure storage

Learn to create encrypted Consul backups using GPG encryption with automated snapshot scripts, secure key management, and remote storage integration for production disaster recovery.

45 min 4 distros 296 views
security Advanced

Set up intrusion detection with OSSEC HIDS and nftables integration for automated threat response

Configure OSSEC Host-based Intrusion Detection System with nftables firewall integration for real-time threat detection and automated response. Monitor system activity, detect intrusions, and automatically block malicious IPs using active response mechanisms.

45 min 4 distros 322 views
security Intermediate

Implement Apache web application firewall with ModSecurity 3 and OWASP Core Rule Set

Deploy ModSecurity 3 as an Apache module with OWASP Core Rule Set to protect web applications from common attacks. Configure real-time logging, custom rules, and automated threat detection for production environments.

45 min 4 distros 377 views