Linux Essentials for Cybersecurity Pearson uCertify

(Pearson-linux-ess-cybersec-lab) / ISBN : 978-1-64459-033-1
This course includes
Hands-On Labs
Get A Free Trial

About This Course

Learn the skills required for Linux professionals with Linux Essentials for Cybersecurity live-labs. Live-labs are simulators that provide a virtual environment for users to explore and learn. Linux Essentials for Cybersecurity labs are based on a typical ground-up approach with a unique methodology of always keeping an eye on security. Throughout the labs, users will find references to security issues and a strong emphasis is placed on creating security policies. The labs are designed for the users who want use Linux systems in a better way and ensure that the Linux systems that they work on are as secure as possible.

Skills You’ll Get

Why Enroll in This Course?

<

Hands-On Labs

70+ LiveLab | 00+ Minutes

2

Distributions and Key Components

  • Installing Kali Linux
  • Installing Ubuntu
  • Installing CentOS
3

Working on the Command Line

  • Managing Files Using the Command Line
  • Using Shell Features
  • Compressing Files
4

Getting Help

  • Getting Help Using the man Command
  • Getting Help Using the info Command
5

Editing Files

  • Editing Files using the Vim Editor
6

When Things Go Wrong

  • Troubleshooting Linux Issues
  • Configuring User Notifications
7

Managing Group Accounts

  • Managing Group Accounts
  • Managing Group Administrators
8

Managing User Accounts

  • Managing User Accounts
  • Securing User Accounts
  • Configuring sudo
9

Develop an Account Security Policy

  • Developing an Account Security Policy
  • Testing the Security of Accounts
10

File Permissions

  • Managing File Permissions
  • Managing Special Permissions
  • Enabling Access Control Lists
  • Managing File Ownership and Attributes
  • Monitoring Security Issues with SELinux
11

Manage Local Storage: Essentials

  • Creating Partitions and Filesystems
  • Mounting Filesystems at Boot
  • Managing Swap Devices
12

Manage Local Storage: Advanced Features

  • Managing Encrypted Filesystems
  • Managing Hard and Soft Links
13

Manage Network Storage

  • Configuring Samba
  • Administering NFS
14

Develop a Storage Security Policy

  • Backing Up a Filesystem
  • Developing a Backup Security Policy
15

crontab and at

  • Managing crontab
  • Configuring at Commands
16

Scripting

  • Using the Bash Shell Script to Display System Info
  • Validating the User Input
17

Common Automation Tasks

  • Performing a System Check
  • Using Script that will Back Up All the Files
18

Develop an Automation Security Policy

  • Securing crontab and at
  • Creating an Automation of Security Policy
19

Networking Basics

  • Obtaining the Standard Ports for the Protocols
20

Network Configuration

  • Understanding Network Configuration on CentOS
  • Understanding Network Configuration on Ubuntu
21

Network Service Configuration: Essential Services

  • Configuring a BIND Server
  • Configuring a Postfix Server
22

Network Service Configuration: Web Services

  • Configuring and Administering an Apache Server
  • Configuring a Proxy Server
23

Connecting to Remote Systems

  • Configuring an FTP Server
  • Administering an SSH Server
24

Develop a Network Security Policy

  • Administering Kernel Security Parameters
  • Securing a System with TCP Wrappers
  • Configuring Network Time Protocol
  • Creating a Networking Security Policy
25

Process Control

  • Managing System Processes
  • Displaying System Information
26

System Logging

  • Managing Log Files
  • Configuring Log Rotation
27

Red Hat–Based Software Management

  • Managing Software Packages with rpm
  • Managing Software Packages with yum
28

Debian-Based Software Management

  • Managing Software Packages with dpkg
29

System Booting

  • Configuring GRUB Security
  • Managing the Startup Process
30

Develop a Software Management Security Policy

  • Exploring Common Vulnerabilities and Exposure Reports
  • Managing and Securing Legacy Services
31

Footprinting

  • Using Probing Tools
  • Scanning the Network
32

Firewalls

  • Configuring Linux Firewall using iptable
33

Intrusion Detection

  • Examining an Intrusion Detection Security Policy
34

Additional Security Tasks

  • Configuring fail2ban
  • Encrypting Files with gpg

Linux Essentials for Cybersecurity Pearson uCertify

$ 79.99

Buy Now
scroll to top