Linux Essentials for Cybersecurity Pearson uCertify
(Pearson-linux-ess-cybersec-lab) / ISBN : 978-1-64459-033-1
Lab
About This Course
Learn the skills required for Linux professionals with Linux Essentials for Cybersecurity live-labs. Live-labs are simulators that provide a virtual environment for users to explore and learn. Linux Essentials for Cybersecurity labs are based on a typical ground-up approach with a unique methodology of always keeping an eye on security. Throughout the labs, users will find references to security issues and a strong emphasis is placed on creating security policies. The labs are designed for the users who want use Linux systems in a better way and ensure that the Linux systems that they work on are as secure as possible.
Skills You’ll Get
Hands-On Labs
70+ LiveLab | 00+ Minutes
1
Distributions and Key Components
- Installing Kali Linux
- Installing Ubuntu
- Installing CentOS
2
Working on the Command Line
- Managing Files Using the Command Line
- Using Shell Features
- Compressing Files
3
Getting Help
- Getting Help Using the man Command
- Getting Help Using the info Command
4
Editing Files
- Editing Files using the Vim Editor
5
When Things Go Wrong
- Troubleshooting Linux Issues
- Configuring User Notifications
6
Managing Group Accounts
- Managing Group Accounts
- Managing Group Administrators
7
Managing User Accounts
- Managing User Accounts
- Securing User Accounts
- Configuring sudo
8
Develop an Account Security Policy
- Developing an Account Security Policy
- Testing the Security of Accounts
9
File Permissions
- Managing File Permissions
- Managing Special Permissions
- Enabling Access Control Lists
- Managing File Ownership and Attributes
- Monitoring Security Issues with SELinux
10
Manage Local Storage: Essentials
- Creating Partitions and Filesystems
- Mounting Filesystems at Boot
- Managing Swap Devices
11
Manage Local Storage: Advanced Features
- Managing Encrypted Filesystems
- Managing Hard and Soft Links
12
Manage Network Storage
- Configuring Samba
- Administering NFS
13
Develop a Storage Security Policy
- Backing Up a Filesystem
- Developing a Backup Security Policy
14
crontab and at
- Managing crontab
- Configuring at Commands
15
Scripting
- Using the Bash Shell Script to Display System Info
- Validating the User Input
16
Common Automation Tasks
- Performing a System Check
- Using Script that will Back Up All the Files
17
Develop an Automation Security Policy
- Securing crontab and at
- Creating an Automation of Security Policy
18
Networking Basics
- Obtaining the Standard Ports for the Protocols
19
Network Configuration
- Understanding Network Configuration on CentOS
- Understanding Network Configuration on Ubuntu
20
Network Service Configuration: Essential Services
- Configuring a BIND Server
- Configuring a Postfix Server
21
Network Service Configuration: Web Services
- Configuring and Administering an Apache Server
- Configuring a Proxy Server
22
Connecting to Remote Systems
- Configuring an FTP Server
- Administering an SSH Server
23
Develop a Network Security Policy
- Administering Kernel Security Parameters
- Securing a System with TCP Wrappers
- Configuring Network Time Protocol
- Creating a Networking Security Policy
24
Process Control
- Managing System Processes
- Displaying System Information
25
System Logging
- Managing Log Files
- Configuring Log Rotation
26
Red Hat–Based Software Management
- Managing Software Packages with rpm
- Managing Software Packages with yum
27
Debian-Based Software Management
- Managing Software Packages with dpkg
28
System Booting
- Configuring GRUB Security
- Managing the Startup Process
29
Develop a Software Management Security Policy
- Exploring Common Vulnerabilities and Exposure Reports
- Managing and Securing Legacy Services
30
Footprinting
- Using Probing Tools
- Scanning the Network
31
Firewalls
- Configuring Linux Firewall using iptable
32
Intrusion Detection
- Examining an Intrusion Detection Security Policy
33
Additional Security Tasks
- Configuring fail2ban
- Encrypting Files with gpg