Linux Essentials for Cybersecurity Pearson uCertify
(Pearson-linux-ess-cybersec) / ISBN : 978-1-64459-032-4
About This Course
Skills You’ll Get
Interactive Lessons
37+ Interactive Lessons | 216+ Quizzes | 309+ Flashcards | 309+ Glossary of terms
Gamified TestPrep
100+ Pre Assessment Questions | 102+ Post Assessment Questions |
Video Lessons
216+ Videos | 13:01+ Hours
Introduction
Distributions and Key Components
- Introducing Linux
- Linux Distributions
- Installing Linux
- Summary
Working on the Command Line
- File Management
- Shell Features
- Advanced Commands
- Summary
Getting Help
- Man Pages
- Command Help Options
- The help Command
- The info Command
- The /usr/share/doc Directory
- Internet Resources
- Summary
Editing Files
- The vi Editor
- Additional Editors
- Summary
When Things Go Wrong
- The Science of Troubleshooting
- Notifying Users
- Summary
Managing Group Accounts
- What Are Groups Used For?
- Managing Groups
- Summary
Managing User Accounts
- The Importance of User Accounts
- Managing Users
- Network-Based User Accounts
- Using su and sudo
- Restricting User Accounts
- Summary
Develop an Account Security Policy
- Introducing Kali Linux
- Security Principles
- Creating a Security Policy
- Securing Accounts
- Security Tools
- Summary
File Permissions
- Standard Permissions
- Default Permissions
- Special Permissions
- Access Control Lists (ACLs)
- Changing Ownership
- File Attributes
- Introduction to SELinux
- Summary
Manage Local Storage: Essentials
- Filesystem Essentials
- Filesystem Types
- Additional Filesystem Tools
- Mounting Filesystems
- Summary
Manage Local Storage: Advanced Features
- Encrypted Filesystems
- Managing autofs
- Logical Volume Manager
- Disk Quotas
- Hard and Soft Links
- Summary
Manage Network Storage
- Samba
- Network File System
- Summary
Develop a Storage Security Policy
- Developing the Plan
- Backing Up Data
- Summary
crontab and at
- Using crontab
- Using at
- Summary
Scripting
- Linux Programming
- Basics of BASH Scripting
- Flow Control Statements
- User Interaction
- Using Command Substitution
- Additional Information
- Summary
Common Automation Tasks
- Exploring Scripts that Already Exist on Your System
- Creating Your Own Automation Scripts
- Summary
Develop an Automation Security Policy
- Securing crontab and at
- Securing BASH Scripts
- Summary
Networking Basics
- Network Terminology
- IPv4 Versus IPv6
- IPv4 Addresses
- Common Protocol Suites
- Network Ports
- Summary
Network Configuration
- Ethernet Network Interfaces
- Persistent Network Configurations
- Network Troubleshooting Commands
- Access to Wireless Networks
- Summary
Network Service Configuration: Essential Services
- DNS Servers
- Zone Files
- Securing BIND
- DHCP Server
- Email Servers
- Managing Local Email Delivery
- Remote Email Delivery
- Summary
Network Service Configuration: Web Services
- Apache Web Server
- Basic Apache Web Server Configuration
- Apache Web Server Security
- Virtual Hosts
- HTTPS
- SSL and Apache
- Proxy Servers
- Summary
Connecting to Remote Systems
- LDAP
- FTP Servers
- Secure Shell
- Summary
Develop a Network Security Policy
- Kernel Parameters
- TCP Wrappers
- Network Time Protocol
- Summary
Process Control
- Viewing Processes
- Running Processes
- Killing Process
- The nohup Command
- Process Priority
- Summary
System Logging
- Syslog
- The logrotate Command
- The journalctl Command
- Summary
Red Hat–Based Software Management
- Red Hat Packages
- Using the rpm Command
- The yum Command
- Additional Tools
- Summary
Debian-Based Software Management
- Managing Packages with dpkg
- Managing Packages with APT
- Listing Package Information with APT Commands
- Summary
System Booting
- Phases of the Boot Process
- GRUB
- Kernel Components
- The init Phase
- Summary
Develop a Software Management Security Policy
- Ensuring Software Security
- xinetd
- Summary
Footprinting
- Understanding Footprinting
- Common Footprinting Tools
- Kali Linux Utilities
- Summary
Firewalls
- Introduction to Firewalls
- Essentials of the iptables Command
- Using iptables to Filter Incoming Packets
- Using iptables to Filter Outgoing Packets
- Implementing NAT
- Summary
Intrusion Detection
- Introduction to Intrusion Detection Tools
- Intrusion Detection Network Tools
- Intrusion Detection File Tools
- Additional Intrusion Detection Tools
- Summary
Additional Security Tasks
- The fail2ban Service
- OpenVPN
- gpg
- Security Alert Services
- Summary
Appendix A: Resource Guide
- Resources by Lesson