From Fedora Project Wiki

Line 11: Line 11:
* [https://benchmarks.cisecurity.org/downloads/multiform/index.cfm Center for Internet Security Benchmarks]
* [https://benchmarks.cisecurity.org/downloads/multiform/index.cfm Center for Internet Security Benchmarks]
* [https://www.stigviewer.com/stig/red_hat_enterprise_linux_6/ Security Technical Implementation Guide (RHEL 6)] ''(contains mainly useful tips for securing Fedora systems)''
* [https://www.stigviewer.com/stig/red_hat_enterprise_linux_6/ Security Technical Implementation Guide (RHEL 6)] ''(contains mainly useful tips for securing Fedora systems)''
* [https://www.sans.org/reading-room/whitepapers/linux/securing-linux-containers-36142 Securing Linux Containers] - research paper on securing Linux container deployments/infrastructure


== Cryptography ==
== Cryptography ==

Revision as of 14:19, 3 December 2015

Information security is a specialized skill-set that requires years of education and experience to master. Unfortunately, many security gurus agree that it's next to impossible to teach many of the skills necessary to become an expert. While we agree with this we'll, in any case, try to lead those willing to put in the time to expand their knowledge of information security.

Below, is a list of resources, broken down by subject, to help those with an interest in information security expand their horizons.

Auditing

Basic Security Topics

Cryptography

Encryption

Hashing

Network Security

Product-specific Documentation

Fedora

Red Hat

Secure Programming