Audit Linux Security: Working with the Audit Log Create audit rules to watch `/etc/passwd` for reads, `/etc/sudoers/` for
compliance Linux Security: Performing a Compliance Scan and Active Remediation Using OSCAP Install the Necessary Packages 1. Become root * sudo su 2. Install the
C2S Linux Security: Run an OpenSCAP Compliance Scan on a Host You will learn how to install OpenSCAP and how to scan a
443 Linux Security: Working with OpenSSL and httpd Install ‘mod_ssl’ on the host ‘webserver’ sudo yum install mod_ssl
apt-get Linux Security: Disk Encryption with eCryptfs Install eCryptfs on the Provided System sudo apt-get install ecryptfs-utils Configure ‘/opt/
22 Google Cloud Security: Creating Firewall Rules on a VPC Network I will configure two different firewall rules: (1) to allow SSH access
Compute Engine Google Cloud Compute Engine: Service Accounts and Scopes Instance 1 - Read-Only Create a Compute Engine instance with a Storage
DNS Creating a Network Security Group with Inbound and Outbound Rules in Azure After you follow these steps, you will have a better understanding of
Database What are the several indicators of compromise(IOC) that organizations should monitor? * Unusual Outbound Network Traffic * HTML Response Sizes * Geographical Irregularities * Increases in Database
False Negative What is the difference between a false positive and false negative in IDS? * A false positive is considered to be a false alarm and false
Audit Ensuring Compliance with Azure Policies After this you will know how to create two common Azure objects,
IDS What is the difference between IDS and IPS? IDS is Intrusion Detection System and it only detects intrusions and the