Servers for Hackers
Secure Firewall Setup
8:24
Servers for Hackers
Secure SSH Setup
6:05
Servers for Hackers
Secure User Setup
6:07
Servers for Hackers
Getting Started - PHP App and Permissions
11:57
Servers for Hackers
Getting Started - PHP, FPM, and Nginx Config
11:09
Servers for Hackers
Getting Started - Nginx
16:02
Servers for Hackers
Getting Started - Linux Permissions
9:59
Servers for Hackers
Getting Started - Hosting Web Apps
6:16
Servers for Hackers
Getting Started - Getting Around Your Server
9:57
Servers for Hackers
Getting Started - Local SSH Configuration
2:47
Servers for Hackers
Servers for Hackers Live Stream
Servers for Hackers
MySQL Backup Intro
1:10
Servers for Hackers
Mapping Headers in Nginx
10:50
Servers for Hackers
The Workflow
9:16
Servers for Hackers
Dev Workflow Intro
5:12
Servers for Hackers
Adding a NodeJS Service
5:51
Servers for Hackers
Variables in Docker Compose
4:58
Servers for Hackers
The Working Directory
2:02
Servers for Hackers
Our App Service
8:08
Servers for Hackers
Compose and Volumes
2:35
Servers for Hackers
Docker Compose Services
6:54
Servers for Hackers
Docker Compose Intro
3:58
Servers for Hackers
Docker Volumes
4:14
Servers for Hackers
Connecting Containers
6:18
Servers for Hackers
Docker Networks
6:13
Servers for Hackers
Entrypoint vs Cmd
4:39
Servers for Hackers
Docker Logs
4:45
Servers for Hackers
Configuring PHP-FPM
3:58
Servers for Hackers
Running Multiple Processes
5:08
Servers for Hackers
Serving Web Files
7:08
Servers for Hackers
Using Dockerfiles
9:08
Servers for Hackers
Docker Images
6:31
Servers for Hackers
Images vs Containers
3:26
Servers for Hackers
Course Intro
1:19
Servers for Hackers
LEMP with PHP-7.1 - Setting Up MySQL
10:13
Servers for Hackers
LEMP with PHP-7.1 - Setting up Nginx, PHP, and Laravel
13:24
Servers for Hackers
LEMP with PHP-7.1 - PHP-FPM Configuration
8:56
Servers for Hackers
LEMP with PHP-7.1 - A Laravel Forge-Like Setup
9:23
Servers for Hackers
LEMP with PHP-7.1 - Managing PHP Modules
5:29
Servers for Hackers
LEMP with PHP-7.1 - Using Redis
2:24
Servers for Hackers
Nginx Load Balancing - Network Security
8:17
Servers for Hackers
Nginx Load Balancing - Application Prep
6:48
Servers for Hackers
Nginx Load Balancing - Load Balancer Setup
4:21
Servers for Hackers
Nginx Load Balancing - Persistence & State
14:07
Servers for Hackers
Nginx Load Balancing - Server Setup
8:39
Servers for Hackers
Nginx Load Balancing - SSL Setup
8:42
Servers for Hackers
Docker in Development - A Development Workflow
8:50
Servers for Hackers
Docker in Development - When localhost isn't the Local Host
3:15
Servers for Hackers
Docker in Development - Docker Volumes
7:36
Servers for Hackers
Docker in Development - The Docker Compose File
4:02
Servers for Hackers
Docker in Development - Using Docker Networks and Volumes Manually
6:40
Servers for Hackers
Docker in Development - Building an Nginx Container
7:21
Servers for Hackers
Docker in Development - Docker Networks
4:17
Servers for Hackers
Docker in Development - Docker Hub and Images
3:22
Servers for Hackers
Docker in Development - Docker and File Permissions
5:16
Servers for Hackers
Docker in Development - Building a PHP Image
3:52
Servers for Hackers
Docker in Development - Up & Running Quickstart
5:56
Servers for Hackers
Getting Started - Logging In
5:46
Servers for Hackers
Getting Started - Users and SSH Security
8:37
Servers for Hackers
Getting Started - Flavors of Linux
4:51
Servers for Hackers
Getting Started - What we'll cover
1:14
Servers for Hackers
Securing Details with Ansible Vault
14:21
Servers for Hackers
Installing Ansible & Basic Usage
13:04
Servers for Hackers
Creating Ansible Roles
24:40
Servers for Hackers
Explaining Ansible Playbooks
9:20
Servers for Hackers
Set Up a Blue Ocean Pipeline with Github
9:08
Servers for Hackers
Github Authentication & Authorization
7:34
Servers for Hackers
Installing Jenkins
9:15
Servers for Hackers
Covering a Simpler Jenkinsfile
11:48
Servers for Hackers
What We’ll Cover with Jenkins
1:47
Servers for Hackers
Finish Getting CI Working in Jenkins
9:59
Servers for Hackers
Process Monitoring with Upstart
12:48
Servers for Hackers
Process Monitoring with Supervisord
11:49
Servers for Hackers
Process Monitoring with Systemd
10:31
Servers for Hackers
06 Backup and Restore MySQL with mysqldump
8:58
Servers for Hackers
01 Installing MySQL (with Debconf)
6:22
Servers for Hackers
04 Configuring MySQL Replication
16:32
Servers for Hackers
03 Application Servers and MySQL
8:49
Servers for Hackers
02 Connecting to MySQL via SSH
4:18
Servers for Hackers
05 MySQL User Security
11:02