Linux Essentials for Cybersecurity
(Pearson-linux-ess-cybersec-complete)
/ ISBN: 978-1-64459-036-2
This course includes
Lessons
TestPrep
LiveLab
Video Lessons (Add-on)
Mentoring (Add-on)
Linux Essentials for Cybersecurity
Gain hands-on expertise on the Linux cybersecurity principles with the Linux Essentials for Cybersecurity course and lab to gain the hands-on expertise required to understand the Linux cybersecurity principles. The lab is cloud-based, device-enabled, and can easily be integrated with an LMS. The Linux training course and lab provide knowledge and skills in managing local storage, group, and user accounts; working on the command line, editing files, developing a storage security policy, and more.
Lessons
-
37+ Lessons
-
216+ Quizzes
-
288+ Flashcards
-
290+ Glossary of terms
TestPrep
-
100+ Pre Assessment Questions
-
101+ Post Assessment Questions
LiveLab
-
70+ LiveLab
Video Tutorials (Add-on)
-
216+ Video tutorials
- Introducing Linux
- Linux Distributions
- Installing Linux
- Summary
- File Management
- Shell Features
- Advanced Commands
- Summary
- Man Pages
- Command Help Options
- The help Command
- The info Command
- The /usr/share/doc Directory
- Internet Resources
- Summary
- The vi Editor
- Additional Editors
- Summary
- The Science of Troubleshooting
- Notifying Users
- Summary
- What Are Groups Used For?
- Managing Groups
- Summary
- The Importance of User Accounts
- Managing Users
- Network-Based User Accounts
- Using su and sudo
- Restricting User Accounts
- Summary
- Introducing Kali Linux
- Security Principles
- Creating a Security Policy
- Securing Accounts
- Security Tools
- Summary
- Standard Permissions
- Default Permissions
- Special Permissions
- Access Control Lists (ACLs)
- Changing Ownership
- File Attributes
- Introduction to SELinux
- Summary
- Filesystem Essentials
- Filesystem Types
- Additional Filesystem Tools
- Mounting Filesystems
- Summary
- Encrypted Filesystems
- Managing autofs
- Logical Volume Manager
- Disk Quotas
- Hard and Soft Links
- Summary
- Samba
- Network File System
- Summary
- Developing the Plan
- Backing Up Data
- Summary
- Using crontab
- Using at
- Summary
- Linux Programming
- Basics of BASH Scripting
- Flow Control Statements
- User Interaction
- Using Command Substitution
- Additional Information
- Summary
- Exploring Scripts that Already Exist on Your System
- Creating Your Own Automation Scripts
- Summary
- Securing crontab and at
- Securing BASH Scripts
- Summary
- Network Terminology
- IPv4 Versus IPv6
- IPv4 Addresses
- Common Protocol Suites
- Network Ports
- Summary
- Ethernet Network Interfaces
- Persistent Network Configurations
- Network Troubleshooting Commands
- Access to Wireless Networks
- Summary
- DNS Servers
- Zone Files
- Securing BIND
- DHCP Server
- Email Servers
- Managing Local Email Delivery
- Remote Email Delivery
- Summary
- Apache Web Server
- Basic Apache Web Server Configuration
- Apache Web Server Security
- Virtual Hosts
- HTTPS
- SSL and Apache
- Proxy Servers
- Summary
- LDAP
- FTP Servers
- Secure Shell
- Summary
- Kernel Parameters
- TCP Wrappers
- Network Time Protocol
- Summary
- Viewing Processes
- Running Processes
- Killing Process
- The nohup Command
- Process Priority
- Summary
- Syslog
- The logrotate Command
- The journalctl Command
- Summary
- Red Hat Packages
- Using the rpm Command
- The yum Command
- Additional Tools
- Summary
- Managing Packages with dpkg
- Managing Packages with APT
- Listing Package Information with APT Commands
- Summary
- Phases of the Boot Process
- GRUB
- Kernel Components
- The init Phase
- Summary
- Ensuring Software Security
- xinetd
- Summary
- Understanding Footprinting
- Common Footprinting Tools
- Kali Linux Utilities
- Summary
- Introduction to Firewalls
- Essentials of the iptables Command
- Using iptables to Filter Incoming Packets
- Using iptables to Filter Outgoing Packets
- Implementing NAT
- Summary
- Introduction to Intrusion Detection Tools
- Intrusion Detection Network Tools
- Intrusion Detection File Tools
- Additional Intrusion Detection Tools
- Summary
- The fail2ban Service
- OpenVPN
- gpg
- Security Alert Services
- Summary
- Resources by Lesson
Hands on Activities (Live Labs)
- Installing Kali Linux
- Installing Ubuntu
- Installing CentOS
- Managing Files using Command Line
- Using Shell Features
- Compressing Files
- Getting Help using man Command
- Getting Help using info Command
- Editing Files using the Vim Editor
- Troubleshooting Linux Issues
- Configuring User Notifications
- Managing Group Accounts
- Managing Group Administrators
- Managing User Accounts
- Securing User Accounts
- Configuring sudo
- Developing an Account Security Policy
- Testing the Security of Accounts
- Managing File Permissions
- Managing Special Permissions
- Enabling Access Control Lists
- Managing File Ownership and Attributes
- Monitoring Security Issues with SELinux
- Creating Partitions and Filesystems
- Mounting Filesystems at Boot
- Managing Swap Devices
- Managing Encrypted Filesystems
- Managing Hard and Soft Links
- Configuring Samba
- Administering NFS
- Backing Up a Filesystem
- Developing a Backup Security Policy
- Managing crontab
- Configuring at Commands
- Bash shell script for system info
- Bash shell script for validating user input
- Script to Perform System Check
- Script That Will Back Up All The Files
- Securing crontab and at
- Creating an Automation Security Policy
- Standard Ports for the Protocols
- Understanding Network Configuration on CentOS
- Understanding Network Configuration on Ubuntu
- Configuring a BIND Server
- Configuring a Postfix Server
- Configuring and Administering an Apache Server
- Configuring a Proxy Server
- Configuring an FTP Server
- Administering an SSH Server
- Administering Kernel Security Parameters
- Securing a System with TCP Wrappers
- Configuring Network Time Protocol
- Creating a Networking Security Policy
- Managing System Processes
- Displaying System Information
- Managing Log Files
- Configuring Log Rotation
- Managing Software Packages with rpm
- Managing Software Packages with yum
- Managing Software Packages with dpkg
- Configuring GRUB Security
- Managing the Startup Process
- Exploring Common Vulnerabilities and Exposure Reports
- Managing and Securing Legacy Services
- Using Probing Tools
- Scanning the Network
- Configuring Linux Firewall using iptable
- Examining an Intrusion Detection Security Policy
- Configuring fail2ban
- Encrypting Files with gpg
Marc Calache
Show more
×