Systems need to be secured in order to decrease vulnerabilities and stop attackers from escalating privileges or gaining root access. The hardening process involves a reduction in the number of running services on a system, which ultimately decreases the potential of an attack. In this course, you will learn about the concept of system hardening, and how to apply that to systems based on their role in the network. You will see the importance of an established security baseline, and being aware of your systems vulnerabilities.
A strong foundation in basic networking concepts
A solid understanding of TCP/IP protocols and how they work
James Michael Stewart
Michael has over 30 years experience with computers and technology with a focus on security, certification, and various operating systems. He has been teaching job skills and certification courses on topics like CISSP, ethical hacking and penetration testing, computer forensics, and Security Plus for over 20 years. He is also the primary author of two books and holds a variety of certifications including CISSP, CEH, CHFI, ECSA, and Security Plus.