LFCS Additional Networking Topics
|
Securing your Linux server on the network and understanding network routing is a great skill to have. This course will teach you how to secure your system with a firewall and configure networking and network address translation (NAT).
Protecting your servers from the internet and obscuring your client systems from the internet are huge cyber security mitigations. In this course, LFCS Additional Networking Topics, you’ll learn to implement network security mitigations. First, you’ll explore raw packet filtering techniques. Next, you’ll discover how scripted applications like firewalld and UFW can simplify the firewall management. Finally, you’ll learn how to combine raw packet filtering into your simplified management to ensure all aspects are available. When you’re finished with this course, you’ll have the skills and knowledge of Linux networking needed to secure network access.
Author Name: Andrew Mallett
Author Description:
Andrew is an all around Linux professional with in depth knowledge of the OS and this is supported with scripting in bash, perl, python and ruby and application development in C, C++ and Java. Having worked for many years in training, Andrew has developed automated course build systems after endless time wasted on Friday nights. The first build system he built was aptly named “Friday nights.” This has inspired his interest in all things deployment related. He has authored training courses on M… more
Table of Contents
- Course Overview
1min - Implement Packet Filtering Using IPtables
30mins - Implement Packet Filtering Using UFW
21mins - Implement Packet Filtering Using Firewalld
20mins - Implementing Masquerading and NAT in Firewalld
19mins - Implementing Load Balancing Using Apache HTTPD
24mins - Service Independent Load Balancing Using HAProxy
17mins
User Reviews
Be the first to review “LFCS Additional Networking Topics” Cancel reply
Related Products

RedHat: Fundamentals of Red Hat Enterprise Linux 9
This course is designed to equip students with the skills and knowledge needed for effective administration of Linux systems, with a particular focus on Red Hat® Enterprise Linux® . It covers fundamental Linux concepts, command-line tools, system management, and network configuration, using both the command-line interface and web console.

LinuxFoundationX: Linux Tools for Software Development
Learn the tools you need to confidently work in Linux development environments and beyond.

LinuxFoundationX: Introduction to Cloud Infrastructure Technologies
Learn the fundamentals of building and managing cloud technologies directly from The Linux Foundation, the leader in open source.

DartmouthX, IMTx: C Programming: Language Foundations
Master foundational concepts in the C programming language such as logical statements and arrays.

Linux Unhatched
A quick introduction to the popular operating system, Linux.

LinuxFoundationX: Secure Software Development: Requirements, Design, and Reuse
Learn the security basics that allow you to develop software that is hardened against attacks, and understand how you can reduce the damage and speed the response when a vulnerability is exploited.
There are no reviews yet.