Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Certified: SANS GIAC GSEC Audio Course

Episode 40 — Linux Hardening: SSH, PAM, and Auditd

22 Oct 2025

Description

Hardening Linux turns flexibility into security discipline, and this episode focuses on three pillars that make it possible: SSH, PAM, and Auditd. You’ll learn how Secure Shell (SSH) operates, why key-based authentication outperforms passwords, and how to limit access through configuration directives like PermitRootLogin and AllowUsers. The discussion then moves to the Pluggable Authentication Modules (PAM) framework, which provides a modular way to enforce password policies, lockout thresholds, and multifactor methods at the system level.Finally, listeners explore Auditd, the Linux auditing subsystem that records system calls and rule-based events for deep accountability. You’ll hear how to define audit rules, interpret logs, and use this information to trace unauthorized activity or verify compliance. The episode emphasizes the relationship between prevention, detection, and verification—showing how these components complement one another for full lifecycle security. Whether you’re preparing for GSEC or managing real infrastructure, this session equips you with configuration habits that protect, monitor, and prove security in Linux environments. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.