Secure Firewall Setup
Servers for Hackers
Secure Firewall Setup
8:24
Secure SSH Setup
Servers for Hackers
Secure SSH Setup
6:05
Secure User Setup
Servers for Hackers
Secure User Setup
6:07
Getting Started - PHP App and Permissions
Servers for Hackers
Getting Started - PHP App and Permissions
11:57
Getting Started - PHP, FPM, and Nginx Config
Servers for Hackers
Getting Started - PHP, FPM, and Nginx Config
11:09
Getting Started - Nginx
Servers for Hackers
Getting Started - Nginx
16:02
Getting Started - Linux Permissions
Servers for Hackers
Getting Started - Linux Permissions
9:59
Getting Started - Hosting Web Apps
Servers for Hackers
Getting Started - Hosting Web Apps
6:16
Getting Started - Getting Around Your Server
Servers for Hackers
Getting Started - Getting Around Your Server
9:57
Getting Started - Local SSH Configuration
Servers for Hackers
Getting Started - Local SSH Configuration
2:47
Servers for Hackers Live Stream
Servers for Hackers
Servers for Hackers Live Stream
MySQL Backup Intro
Servers for Hackers
MySQL Backup Intro
1:10
Mapping Headers in Nginx
Servers for Hackers
Mapping Headers in Nginx
10:50
The Workflow
Servers for Hackers
The Workflow
9:16
Dev Workflow Intro
Servers for Hackers
Dev Workflow Intro
5:12
Adding a NodeJS Service
Servers for Hackers
Adding a NodeJS Service
5:51
Variables in Docker Compose
Servers for Hackers
Variables in Docker Compose
4:58
The Working Directory
Servers for Hackers
The Working Directory
2:02
Our App Service
Servers for Hackers
Our App Service
8:08
Compose and Volumes
Servers for Hackers
Compose and Volumes
2:35
Docker Compose Services
Servers for Hackers
Docker Compose Services
6:54
Docker Compose Intro
Servers for Hackers
Docker Compose Intro
3:58
Docker Volumes
Servers for Hackers
Docker Volumes
4:14
Connecting Containers
Servers for Hackers
Connecting Containers
6:18
Docker Networks
Servers for Hackers
Docker Networks
6:13
Entrypoint vs Cmd
Servers for Hackers
Entrypoint vs Cmd
4:39
Docker Logs
Servers for Hackers
Docker Logs
4:45
Configuring PHP-FPM
Servers for Hackers
Configuring PHP-FPM
3:58
Running Multiple Processes
Servers for Hackers
Running Multiple Processes
5:08
Serving Web Files
Servers for Hackers
Serving Web Files
7:08
Using Dockerfiles
Servers for Hackers
Using Dockerfiles
9:08
Docker Images
Servers for Hackers
Docker Images
6:31
Images vs Containers
Servers for Hackers
Images vs Containers
3:26
Course Intro
Servers for Hackers
Course Intro
1:19
LEMP with PHP-7.1 -  Setting Up MySQL
Servers for Hackers
LEMP with PHP-7.1 - Setting Up MySQL
10:13
LEMP with PHP-7.1 - Setting up Nginx, PHP, and Laravel
Servers for Hackers
LEMP with PHP-7.1 - Setting up Nginx, PHP, and Laravel
13:24
LEMP with PHP-7.1 - PHP-FPM Configuration
Servers for Hackers
LEMP with PHP-7.1 - PHP-FPM Configuration
8:56
LEMP with PHP-7.1 - A Laravel Forge-Like Setup
Servers for Hackers
LEMP with PHP-7.1 - A Laravel Forge-Like Setup
9:23
LEMP with PHP-7.1 - Managing PHP Modules
Servers for Hackers
LEMP with PHP-7.1 - Managing PHP Modules
5:29
LEMP with PHP-7.1 - Using Redis
Servers for Hackers
LEMP with PHP-7.1 - Using Redis
2:24
Nginx Load Balancing - Network Security
Servers for Hackers
Nginx Load Balancing - Network Security
8:17
Nginx Load Balancing - Application Prep
Servers for Hackers
Nginx Load Balancing - Application Prep
6:48
Nginx Load Balancing - Load Balancer Setup
Servers for Hackers
Nginx Load Balancing - Load Balancer Setup
4:21
Nginx Load Balancing - Persistence & State
Servers for Hackers
Nginx Load Balancing - Persistence & State
14:07
Nginx Load Balancing - Server Setup
Servers for Hackers
Nginx Load Balancing - Server Setup
8:39
Nginx Load Balancing - SSL Setup
Servers for Hackers
Nginx Load Balancing - SSL Setup
8:42
Docker in Development - A Development Workflow
Servers for Hackers
Docker in Development - A Development Workflow
8:50
Docker in Development - When localhost isn't the Local Host
Servers for Hackers
Docker in Development - When localhost isn't the Local Host
3:15
Docker in Development - Docker Volumes
Servers for Hackers
Docker in Development - Docker Volumes
7:36
Docker in Development - The Docker Compose File
Servers for Hackers
Docker in Development - The Docker Compose File
4:02
Docker in Development - Using Docker Networks and Volumes Manually
Servers for Hackers
Docker in Development - Using Docker Networks and Volumes Manually
6:40
Docker in Development - Building an Nginx Container
Servers for Hackers
Docker in Development - Building an Nginx Container
7:21
Docker in Development - Docker Networks
Servers for Hackers
Docker in Development - Docker Networks
4:17
Docker in Development - Docker Hub and Images
Servers for Hackers
Docker in Development - Docker Hub and Images
3:22
Docker in Development - Docker and File Permissions
Servers for Hackers
Docker in Development - Docker and File Permissions
5:16
Docker in Development - Building a PHP Image
Servers for Hackers
Docker in Development - Building a PHP Image
3:52
Docker in Development - Up & Running Quickstart
Servers for Hackers
Docker in Development - Up & Running Quickstart
5:56
Getting Started - Logging In
Servers for Hackers
Getting Started - Logging In
5:46
Getting Started - Users and SSH Security
Servers for Hackers
Getting Started - Users and SSH Security
8:37
Getting Started - Flavors of Linux
Servers for Hackers
Getting Started - Flavors of Linux
4:51
Getting Started - What we'll cover
Servers for Hackers
Getting Started - What we'll cover
1:14
Securing Details with Ansible Vault
Servers for Hackers
Securing Details with Ansible Vault
14:21
Installing Ansible & Basic  Usage
Servers for Hackers
Installing Ansible & Basic Usage
13:04
Creating Ansible Roles
Servers for Hackers
Creating Ansible Roles
24:40
Explaining Ansible Playbooks
Servers for Hackers
Explaining Ansible Playbooks
9:20
Set Up a Blue Ocean Pipeline with Github
Servers for Hackers
Set Up a Blue Ocean Pipeline with Github
9:08
Github Authentication & Authorization
Servers for Hackers
Github Authentication & Authorization
7:34
Installing Jenkins
Servers for Hackers
Installing Jenkins
9:15
Covering a Simpler Jenkinsfile
Servers for Hackers
Covering a Simpler Jenkinsfile
11:48
What We’ll Cover with Jenkins
Servers for Hackers
What We’ll Cover with Jenkins
1:47
Finish Getting CI Working in Jenkins
Servers for Hackers
Finish Getting CI Working in Jenkins
9:59
Process Monitoring with Upstart
Servers for Hackers
Process Monitoring with Upstart
12:48
Process Monitoring with Supervisord
Servers for Hackers
Process Monitoring with Supervisord
11:49
Process Monitoring with Systemd
Servers for Hackers
Process Monitoring with Systemd
10:31
06 Backup and Restore MySQL with mysqldump
Servers for Hackers
06 Backup and Restore MySQL with mysqldump
8:58
01 Installing MySQL (with Debconf)
Servers for Hackers
01 Installing MySQL (with Debconf)
6:22
04 Configuring MySQL Replication
Servers for Hackers
04 Configuring MySQL Replication
16:32
03 Application Servers and MySQL
Servers for Hackers
03 Application Servers and MySQL
8:49
02 Connecting to MySQL via SSH
Servers for Hackers
02 Connecting to MySQL via SSH
4:18
05 MySQL User Security
Servers for Hackers
05 MySQL User Security
11:02