Linux Essentials for Cybersecurity Pearson uCertify
(Pearson-linux-ess-cybersec-lab) / ISBN : 978-1-64459-033-1
About This Course
Learn the skills required for Linux professionals with Linux Essentials for Cybersecurity live-labs. Live-labs are simulators that provide a virtual environment for users to explore and learn. Linux Essentials for Cybersecurity labs are based on a typical ground-up approach with a unique methodology of always keeping an eye on security. Throughout the labs, users will find references to security issues and a strong emphasis is placed on creating security policies. The labs are designed for the users who want use Linux systems in a better way and ensure that the Linux systems that they work on are as secure as possible.
Skills You’ll Get
Hands-On Labs
70+ LiveLab | 00+ Minutes
Distributions and Key Components
- Installing Kali Linux
- Installing Ubuntu
- Installing CentOS
Working on the Command Line
- Managing Files Using the Command Line
- Using Shell Features
- Compressing Files
Getting Help
- Getting Help Using the man Command
- Getting Help Using the info Command
Editing Files
- Editing Files using the Vim Editor
When Things Go Wrong
- Troubleshooting Linux Issues
- Configuring User Notifications
Managing Group Accounts
- Managing Group Accounts
- Managing Group Administrators
Managing User Accounts
- Managing User Accounts
- Securing User Accounts
- Configuring sudo
Develop an Account Security Policy
- Developing an Account Security Policy
- Testing the Security of Accounts
File Permissions
- Managing File Permissions
- Managing Special Permissions
- Enabling Access Control Lists
- Managing File Ownership and Attributes
- Monitoring Security Issues with SELinux
Manage Local Storage: Essentials
- Creating Partitions and Filesystems
- Mounting Filesystems at Boot
- Managing Swap Devices
Manage Local Storage: Advanced Features
- Managing Encrypted Filesystems
- Managing Hard and Soft Links
Manage Network Storage
- Configuring Samba
- Administering NFS
Develop a Storage Security Policy
- Backing Up a Filesystem
- Developing a Backup Security Policy
crontab and at
- Managing crontab
- Configuring at Commands
Scripting
- Using the Bash Shell Script to Display System Info
- Validating the User Input
Common Automation Tasks
- Performing a System Check
- Using Script that will Back Up All the Files
Develop an Automation Security Policy
- Securing crontab and at
- Creating an Automation of Security Policy
Networking Basics
- Obtaining the Standard Ports for the Protocols
Network Configuration
- Understanding Network Configuration on CentOS
- Understanding Network Configuration on Ubuntu
Network Service Configuration: Essential Services
- Configuring a BIND Server
- Configuring a Postfix Server
Network Service Configuration: Web Services
- Configuring and Administering an Apache Server
- Configuring a Proxy Server
Connecting to Remote Systems
- Configuring an FTP Server
- Administering an SSH Server
Develop a Network Security Policy
- Administering Kernel Security Parameters
- Securing a System with TCP Wrappers
- Configuring Network Time Protocol
- Creating a Networking Security Policy
Process Control
- Managing System Processes
- Displaying System Information
System Logging
- Managing Log Files
- Configuring Log Rotation
Red Hat–Based Software Management
- Managing Software Packages with rpm
- Managing Software Packages with yum
Debian-Based Software Management
- Managing Software Packages with dpkg
System Booting
- Configuring GRUB Security
- Managing the Startup Process
Develop a Software Management Security Policy
- Exploring Common Vulnerabilities and Exposure Reports
- Managing and Securing Legacy Services
Footprinting
- Using Probing Tools
- Scanning the Network
Firewalls
- Configuring Linux Firewall using iptable
Intrusion Detection
- Examining an Intrusion Detection Security Policy
Additional Security Tasks
- Configuring fail2ban
- Encrypting Files with gpg