
Linux Essentials for Cybersecurity Lab Manual
William Rothwell
Résumé
To really become a Linux cybersecurity expert, you need practice.
In this book, there are three different types of labs to practice your skills:
- Labs in which you are presented with a short problem that requires only a single operation to complete.
- Labs that are more complex but in which we provide you with a guide to perform each step, one at a time.
- Scenario labs in which you are asked to solve a problem entirely on your own. These labs are designed to pose a greater challenge.
- Part I: Introducing Linux
- Chapter 1: Distributions and key components
- Chapter 2: Working on the command line
- Chapter 3: Getting help
- Chapter 4: Editing files
- Chapter 5: When things go wrong
- Part II: User and group accounts
- Chapter 6: Managing group accounts
- Chapter 7: Managing user account
- Chapter 8: Develop an account security policy
- Part III: File and data storage
- Chapter 9: File permissions
- Chapter 10: Manage local storage: Concepts
- Chapter 11: Manage local storage: Practical application
- Chapter 12: Manage network storage
- Chapter 13: Develop a storage security policy
- Part IV: Automation
- Chapter 14: Crontab and at
- 14.1 Manage crontab
- 14.2 Configure at commands
- Chapter 15: Scripting
- 15.1 Script project #1
- 15.2 Script project #2
- Chapter 16: Common automation tasks
- 15.3 Script project #3
- 15.4 Script project #4
- Chapter 17: Develop an automation security policy
- 17.1 Secure crontab
- 17.2 Create a automation security policy
-
- Part V: Networking
- Chapter 18: Networking basics
- 18.1 Explore networking componets
- Chapter 19: Network configuration
- 19.1 Configure networking on CentOS
- 19.2 Configure networking on Ubuntu"
- Chapter 20: Network service configuration: Essential services
- 20.1 Configure a BIND server
- 20.2 Configure a Postfix server
- 20.3 Administer procmail and Dovecot
- Chapter 21: Network service configuration: Web services
- 21.1 Configure and administer an Apache server
- 21.2. Configure a proxy server
- Chapter 22: Connecting to remote systems
- 22.1 Create an LDAP server
- 22.2 Configure a FTP server
- 22.3 Administer a SSH server
- Chapter 23: Develop an network security policy
- 23.1 Administer kernel security parameters
- 23.2 Secure the system with TCP Wrappers
- 23.3 Configure Network Time Protocol
- 23.4 Create a networking security policy
-
- Part VI: Process and log administration
- Chapter 24: Process control
- 24.1 Manage system processes
- 24.2 Display system information"
- Chapter 25: System logging
- 25.1 Manage log files
- 25.1 Configure log rotation
-
- Part VII: Software management
- Chapter 26: Red Hat-based software management
- 26.1 Manage software packages with rpm
- 26.2 Manage software packages with yum
- Chapter 27: Debian-based software management
- 27.1 Manage software packages with dpkg
- 27.2 Manage software packages with apt
- Chapter 28: System booting
- 28.1 Configure GRUB
- 28.2 Manage the startup process
- Chapter 29: Develop a software management security policy
- 29.1 Explore Common Vulerabilities and Exposure reports
- 29.2 Manage and secure legacy services
-
- Part VII: Security tasks
- Chapter 30: Footprinting
- 30.1 Use probing tools
- 30.2 Scan the network
- Chapter 31: Firewalls
- 31.1 Create a firewall to protect a system
- 31.2 Impliment NAT
- Chapter 32: Intrusion Detection
- 32.1 Scan the system to determine if it has been compromised
- 32.2 Use IDS Tools
- Chapter 33: Additional security tasks
- 33.1 Configure fail2ban
- 33.2 Impliment a VPN
- 33.3 Encrypt files with gpg
Since that experience, Bo's passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes Linux, Unix, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and president of One Course Source, an IT training organization.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Pearson education |
Auteur(s) | William Rothwell |
Parution | 30/09/2018 |
Nb. de pages | 160 |
EAN13 | 9780789760555 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse