YOUR HOME FOR LINUX-RELATED FUN AND LEARNING

Connect with Learn Linux TV:

  • YouTube
  • LinkedIn
  • GitHub
  • Patreon
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance
  • Latest Updates
  • Courses
    • Linux Essentials: The Complete Certification Workshop
    • Linux Crash Course
    • Getting started with Ansible
    • vim Text Editor for Beginners
    • Getting Started with Tmux
    • Bash Scripting on Linux
    • OpenStack Administration Guide
    • Proxmox Virtual Environment Full Course
    • Docker Essentials
  • Shop
  • Books
  • Community
  • Linux Consulting
  • About
    • About LearnLinuxTV
    • Content Ethics
    • Request Assistance

All Content

⇨

see all

  • Enterprise Linux Security Episode 107 – The Plan is there is no Plan

    How does perception vs reality tie into protecting our infrastructure from threat actors? In this episode, Jay and Joao discuss how pre-concieved notions and misinformation impacts threat response (and more).

    YouTube player

    Thanks to TuxCare for sponsoring the Enterprise Linux Security podcast. Check out their awesome services to see how they can simplify Linux administration!

    Relevant Articles

    • FBI Deletes PlugX Malware From Computers Infected by China Group

    Download Links

    • MP3 version
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 107 – The Plan is there is no Plan
  • CrowdSec 1.5 Gains New Features – Exploring Block Lists, Post Exploitation Behavior & More!

    CrowdSec is a service that aims to enhance the security of your Linux server – which it does in a very interesting way. Leveraging the power of the very “crowd” it serves, CrowSec is able to build intelligence that benefits every server that has it installed. This service has been discussed on the channel before, but in this tutorial you’ll see some of the new features as of CrowdSec 1.5.

    YouTube player

    ⇨

    Read more: CrowdSec 1.5 Gains New Features – Exploring Block Lists, Post Exploitation Behavior & More!
  • Enterprise Linux Security Episode 48 – New Malware, Old Vulnerabilities

    While it’s certainly never a good thing to become the victim of a cyber-attack, it can be even more embarrassing if the CVE the threat actor used to get a foothold into your systems was patched a long time ago. In this episode, Jay and Joao discuss malware that’s currently taking advantage of vulnerabilities that were patched over a year ago! As important as software updates happen to be, why are so many organizations unable to keep up with them?

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (lower bitrate, smaller file)
    • Ogg version

    Relevant Articles

    • Shikitega – New stealthy malware targeting Linux

    ⇨

    Read more: Enterprise Linux Security Episode 48 – New Malware, Old Vulnerabilities
  • Enterprise Linux Security Episode 43 – Grand Theft Data

    In this episode, Jay and Joao discuss a handful of cybersecurity events in the news. While none of these stories are super exciting from a technical standpoint, there’s definitely some lessons to be learned. As part of this discussion, Jay and Joao will talk about topics related to the recent Grand Theft Auto leak, as breaches that targeted Uber, 2k games, and more.

    YouTube player

    Relevant Links

    • GTA 6 source code and videos leaked after Rockstar Games hack
    • Uber suffers computer system breach, alerts authorities
    • 2K Games says hacked help desk targeted players with malware
    • Hackers accessed data on some American Airlines customers
    • Ransomware Gang Claims Customer Data Stolen in TAP Air Portugal Hack

    Download Links

    • MP3 version (normal quality)
    • MP3 version (lower quality, smaller file)
    • Ogg version (normal quality)

    ⇨

    Read more: Enterprise Linux Security Episode 43 – Grand Theft Data
  • Enterprise Linux Security Episode 40 – Continuous Integration / Continuous Delivery

    Continuous Integration/Continuous Delivery is huge concept when it comes to application deployment nowadays, and with good reason. Automating the compilation, testing, and other aspects of the development process increases efficiency and reliability. Security is another layer of a good CI/CD system, and in this episode, Jay and Joao discuss CI/CD and the security aspects of the popular deployment style.

    YouTube player

    Relevant links

    • Unpacking Cloud-Based Cryptocurrency Miners That Abuse GitHub Actions and Azure Virtual Machines

    Download Links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 40 – Continuous Integration / Continuous Delivery
  • Enterprise Linux Security Episode 36 – First Live Episode!

    In episode 36 of the Enterprise Linux Security podcast, Jay and Joao record an episode live for the first time.

    YouTube player

    Download Links

    • MP3 version
    • MP3 version (low)
    • Ogg version

    ⇨

    Read more: Enterprise Linux Security Episode 36 – First Live Episode!
  • CrowdSec Console First Look – A Free and Awesome Security Dashboard for Linux Servers

    CrowdSec is an Intrusion Prevention System that does things a bit differently than other IPS solutions. It’s collaborative, and open-source. CrowdSec has been featured on LearnLinuxTV a few times in the past, but in this video we’ll explore the CrowdSec Console, which allows you to monitor the security events of your Linux servers from an impressive web dashboard. In this video, we’ll get an overview and see it in action!

    YouTube player

    Note: This is not a review, but an overview of a security solution that Learn Linux TV is actually using in real-life.

    ⇨

    Read more: CrowdSec Console First Look – A Free and Awesome Security Dashboard for Linux Servers
  • Enterprise Linux Security Episode 22 – Certificates

    Encryption is a great benefit to take advantage of, especially when it comes to hosting web sites. But how exactly do TLS certificates work? In this episode, Jay and Joao discuss foundational concepts surrounding certificates, as well as some advice and recommended practices.

    YouTube player

    Download:

    • MP3 version
    • Ogg version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 22 – Certificates
  • Enterprise Linux Security Episode 15 – High Availability

    It’s frustrating when critical infrastructure encounters an issue that results in a disruption of service. High Availability is a concept that aims to help alleviate (or hopefully eliminate) such downtime, and is a very attractive goal for system administrators. In this episode, Jay and Joao discuss high availability, as well as its pros and cons.

    YouTube player
    • Ogg version
    • MP3 version
    • MP3 version (low)

    Related articles

    • Log4Shell evolution of evasion patterns
    • Log4Shell Variants and updates

    ⇨

    Read more: Enterprise Linux Security Episode 15 – High Availability
  • Boosting your Linux Server Security with CrowdSec

    CrowdSec is a cutting-edge security solution for your Linux servers. As an intrusion prevention system, its goal is to stop unauthorized access and prevent attacks. But unlike other IPS solutions, it does it a different way – by using knowledge as power. CrowdSec was covered on this channel before, but in this video, you’ll see an updated look complete with an overview of how to set up protection for WordPress as well.

    YouTube player

    ⇨

    Read more: Boosting your Linux Server Security with CrowdSec
  • Enterprise Linux Security Episode 8 – Trojan Source, & CISA’s Directive

    Recently, some interesting security news has occurred, and two specific developments are the main discussion in this episode. Trojan Source is a newly discovered tactic that can be used to hide malicious code and execute something completely unexpected, even when the source code appears to be syntactically correct. In addition, CISA recently mandated a large number of CVE’s to be patched in the very near future, which will likely have ramifications even outside of the United States. Also, Jay and Joao also discuss the recently released Fedora 35, which is a distribution that has a large presence on the workstations that administrators use.

    YouTube player

    Episode downloads

    • OGG version
    • MP3 version
    • MP3 version (low)

    Episode-specific Links

    • Trojan Source
    • CISA (BOD) 22-01 Directive (ZDNet Coverage)
    • CISA (BOD) 22-01 Directive (cisa.gov)
    • CISA (BOD) 22-01 Vulnerabilities Catalog

    ⇨

    Read more: Enterprise Linux Security Episode 8 – Trojan Source, & CISA’s Directive
  • Enterprise Linux Security Episode 7 – ELevate

    Remaining on legacy Linux distributions can lead to additional security risks as time goes on, and migrating to a newer and better supported distribution can be a very difficult endeavor for most administrators. In this episode, Jay and Joao are joined by Jack from AlmaLinux, and we talk about ELevate – a tool that can be used to migrate from a distribution in the Enterprise Linux family to another Enterprise Linux distribution. This helps alleviate some of the burden of distro migration, and as a community project it’s also a great project to get started with contributing to an open-source project.

    YouTube player

    Episode downloads

    • OGG version
    • MP3 version
    • MP3 version (low)

    ⇨

    Read more: Enterprise Linux Security Episode 7 – ELevate
1 2
Next Page
  • YouTube

YOUTUBE

  • Twitter

twitter

  • LinkedIn

LINKEDIN

Copyright 2024 Learn Linux TV, all rights reserved.

All content on this channel adheres to the company’s content ethics guidelines.