Skip to main content

Section outline

  • Session 9: Secure Kernel 
    • Configuring Security Features in the Kernel
    • Flattened Image Tree (FIT) Kernel Image
    Session 10: Securing the Root Filesystem 
    • Root Filesystem Hardening
    • Read-Only RootFS for Security
    • Encrypting Images
    Session 11: Data Encryption Methods 
    • Full Disk Encryption (LUKS, TrueCrypt, VeraCrypt)
    • File-Based Encryption (FBE)
    • Pros & Cons of Each Encryption Method
    Session 12: Hands-on Lab – Implementing Various Encryption Techniques