Linux Essentials for Cybersecurity, 1st edition

Published by Pearson IT Certification (July 30, 2018) © 2019

  • William Rothwell Lead instructor and courseware developer
  • Denise Kinsey
Products list
  • Available for purchase from all major ebook resellers, including InformIT.com
Products list

Details

  • A print text
  • Free shipping
  • Also available for purchase as an ebook from all major ebook resellers, including InformIT.com
Products list

Access Details

  • Access courses online from any computer (PC or Mac) or tablet (Android or iOS)
  • Native app available for mobile use; use online, or download and work offline; data syncs automatically 
  • Purchase print or digital codes from your college bookstore, or printed access code cards here

Features

  • Interactive learning elements throughout, including exercises, quizzes, flashcards, and video tutorials

Linux distributions are widely used to support mission-critical applications and manage crucial data. But safeguarding modern Linux systems is complex, and many Linux texts have inadequate or outdated security coverage.


Linux Essentials for Cybersecurity is a complete solution. Leading Linux certification and security experts William “Bo” Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of enforcing and troubleshooting security. Their practical approach will help students learn how to protect systems, even if one or more layers are penetrated.

First, they’ll learn how to install Linux to achieve optimal security upfront, even if they have no Linux experience. Next, they’ll master best practices for securely administering accounts, devices, services, processes, data, and networks. Then, they’ll master powerful tools and automated scripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more.

  • Introduction
  • Part I: Introducing Linux
  • 1. Distributions and Key Components
  • 2. Working on the Command Line
  • 3. Getting Help
  • 4. Editing Files
  • 5. When Things Go Wrong
  • Part II: User and Group Accounts
  • 6. Managing Group Accounts
  • 7. Managing User Accounts
  • 8. Developing an Account Security Policy
  • Part III: File and Data Storage
  • 9. File Permissions
  • 10. Managing Local Storage
  • 11. Managing Network Storage
  • 12. Developing a Storage Security Policy
  • Part IV: Automation
  • 13. Crontab and at
  • 14. Scripting
  • 15. Common Automation Tasks
  • 16. Developing an Automation Security Policy
  • Part V: Networking
  • 17. Networking Basics
  • 18. Network Configuration
  • 19. Network Service Configuration
  • 20. Connecting to Remote Systems
  • 21. Developing a Network Security Policy
  • Part VI: Process and Log Administration
  • 22. Process Control
  • 23. System Logging
  • 24. Developing a Process and Log Security Policy
  • Part VII: Software Management
  • 25. Red Hat-based Software Management
  • 26. Debian-based Software Management
  • 27. Additional Management Tools
  • 28. System Booting
  • 29. Developing a Software Management Security Policy
  • Part VIII: Security Tasks
  • 30. Footprinting
  • 31. Firewalls
  • 32. Intrusion Detection Systems
  • 33. Additional Security Tasks
  • Appendix A. Resource Guide
  • Glossary

Need help? Get in touch