Linux Essentials for Cybersecurity Pearson uCertify
(Pearson-linux-ess-cybersec) / ISBN : 978-1-64459-032-4
About This Course
Linux Essentials for Cybersecurity course aims at providing skills that a Linux professional should have. The course takes typical ground-up approach with a methodology of keeping an eye on security. Throughout the course, there are references to security issues and a strong emphasis is placed on creating security policies. The course also provides knowledge and skills in managing local storage, managing group and user accounts, working on the command line, editing files, and more.
Skills You’ll Get
Interactive Lessons
37+ Interactive Lessons | 216+ Quizzes | 309+ Flashcards | 309+ Glossary of terms
Gamified TestPrep
100+ Pre Assessment Questions | 102+ Post Assessment Questions |
Video Lessons
216+ Videos | 13:01+ Hours
Introduction
Distributions and Key Components
- Introducing Linux
- Linux Distributions
- Installing Linux
- Summary
Working on the Command Line
- File Management
- Shell Features
- Advanced Commands
- Summary
Getting Help
- Man Pages
- Command Help Options
- The help Command
- The info Command
- The /usr/share/doc Directory
- Internet Resources
- Summary
Editing Files
- The vi Editor
- Additional Editors
- Summary
When Things Go Wrong
- The Science of Troubleshooting
- Notifying Users
- Summary
Managing Group Accounts
- What Are Groups Used For?
- Managing Groups
- Summary
Managing User Accounts
- The Importance of User Accounts
- Managing Users
- Network-Based User Accounts
- Using su and sudo
- Restricting User Accounts
- Summary
Develop an Account Security Policy
- Introducing Kali Linux
- Security Principles
- Creating a Security Policy
- Securing Accounts
- Security Tools
- Summary
File Permissions
- Standard Permissions
- Default Permissions
- Special Permissions
- Access Control Lists (ACLs)
- Changing Ownership
- File Attributes
- Introduction to SELinux
- Summary
Manage Local Storage: Essentials
- Filesystem Essentials
- Filesystem Types
- Additional Filesystem Tools
- Mounting Filesystems
- Summary
Manage Local Storage: Advanced Features
- Encrypted Filesystems
- Managing autofs
- Logical Volume Manager
- Disk Quotas
- Hard and Soft Links
- Summary
Manage Network Storage
- Samba
- Network File System
- Summary
Develop a Storage Security Policy
- Developing the Plan
- Backing Up Data
- Summary
crontab and at
- Using crontab
- Using at
- Summary
Scripting
- Linux Programming
- Basics of BASH Scripting
- Flow Control Statements
- User Interaction
- Using Command Substitution
- Additional Information
- Summary
Common Automation Tasks
- Exploring Scripts that Already Exist on Your System
- Creating Your Own Automation Scripts
- Summary
Develop an Automation Security Policy
- Securing crontab and at
- Securing BASH Scripts
- Summary
Networking Basics
- Network Terminology
- IPv4 Versus IPv6
- IPv4 Addresses
- Common Protocol Suites
- Network Ports
- Summary
Network Configuration
- Ethernet Network Interfaces
- Persistent Network Configurations
- Network Troubleshooting Commands
- Access to Wireless Networks
- Summary
Network Service Configuration: Essential Services
- DNS Servers
- Zone Files
- Securing BIND
- DHCP Server
- Email Servers
- Managing Local Email Delivery
- Remote Email Delivery
- Summary
Network Service Configuration: Web Services
- Apache Web Server
- Basic Apache Web Server Configuration
- Apache Web Server Security
- Virtual Hosts
- HTTPS
- SSL and Apache
- Proxy Servers
- Summary
Connecting to Remote Systems
- LDAP
- FTP Servers
- Secure Shell
- Summary
Develop a Network Security Policy
- Kernel Parameters
- TCP Wrappers
- Network Time Protocol
- Summary
Process Control
- Viewing Processes
- Running Processes
- Killing Process
- The nohup Command
- Process Priority
- Summary
System Logging
- Syslog
- The logrotate Command
- The journalctl Command
- Summary
Red Hat–Based Software Management
- Red Hat Packages
- Using the rpm Command
- The yum Command
- Additional Tools
- Summary
Debian-Based Software Management
- Managing Packages with dpkg
- Managing Packages with APT
- Listing Package Information with APT Commands
- Summary
System Booting
- Phases of the Boot Process
- GRUB
- Kernel Components
- The init Phase
- Summary
Develop a Software Management Security Policy
- Ensuring Software Security
- xinetd
- Summary
Footprinting
- Understanding Footprinting
- Common Footprinting Tools
- Kali Linux Utilities
- Summary
Firewalls
- Introduction to Firewalls
- Essentials of the iptables Command
- Using iptables to Filter Incoming Packets
- Using iptables to Filter Outgoing Packets
- Implementing NAT
- Summary
Intrusion Detection
- Introduction to Intrusion Detection Tools
- Intrusion Detection Network Tools
- Intrusion Detection File Tools
- Additional Intrusion Detection Tools
- Summary
Additional Security Tasks
- The fail2ban Service
- OpenVPN
- gpg
- Security Alert Services
- Summary
Appendix A: Resource Guide
- Resources by Lesson