Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Linux Essentials for Cybersecurity Lab Manual
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Linux Essentials for Cybersecurity Lab Manual

Linux Essentials for Cybersecurity Lab Manual

William Rothwell

160 pages, parution le 30/09/2018

Résumé

This lab manual accompanies the textbook Linux Essentials for Cybersecurity , which teaches people how to use Linux systems and ensures that the Linux systems they work on are as secure as possible.
To really become a Linux cybersecurity expert, you need practice.
In this book, there are three different types of labs to practice your skills:
  • Labs in which you are presented with a short problem that requires only a single operation to complete.
  • Labs that are more complex but in which we provide you with a guide to perform each step, one at a time.
  • Scenario labs in which you are asked to solve a problem entirely on your own. These labs are designed to pose a greater challenge.
No matter the type, these labs are designed to be performed on live Linux systems to give you hands-on practice and develop critical thinking and complex problem-solving skills.
  • Part I: Introducing Linux
  • Chapter 1: Distributions and key components
  • Chapter 2: Working on the command line
  • Chapter 3: Getting help
  • Chapter 4: Editing files
  • Chapter 5: When things go wrong
  • Part II: User and group accounts
  • Chapter 6: Managing group accounts
  • Chapter 7: Managing user account
  • Chapter 8: Develop an account security policy
  • Part III: File and data storage
  • Chapter 9: File permissions
  • Chapter 10: Manage local storage: Concepts
  • Chapter 11: Manage local storage: Practical application
  • Chapter 12: Manage network storage
  • Chapter 13: Develop a storage security policy
  • Part IV: Automation
  • Chapter 14: Crontab and at
  • 14.1 Manage crontab
  • 14.2 Configure at commands
  • Chapter 15: Scripting
  • 15.1 Script project #1
  • 15.2 Script project #2
  • Chapter 16: Common automation tasks
  • 15.3 Script project #3
  • 15.4 Script project #4
  • Chapter 17: Develop an automation security policy
  • 17.1 Secure crontab
  • 17.2 Create a automation security policy

  • Part V: Networking
  • Chapter 18: Networking basics
  • 18.1 Explore networking componets
  • Chapter 19: Network configuration
  • 19.1 Configure networking on CentOS
  • 19.2 Configure networking on Ubuntu"
  • Chapter 20: Network service configuration: Essential services
  • 20.1 Configure a BIND server
  • 20.2 Configure a Postfix server
  • 20.3 Administer procmail and Dovecot
  • Chapter 21: Network service configuration: Web services
  • 21.1 Configure and administer an Apache server
  • 21.2. Configure a proxy server
  • Chapter 22: Connecting to remote systems
  • 22.1 Create an LDAP server
  • 22.2 Configure a FTP server
  • 22.3 Administer a SSH server
  • Chapter 23: Develop an network security policy
  • 23.1 Administer kernel security parameters
  • 23.2 Secure the system with TCP Wrappers
  • 23.3 Configure Network Time Protocol
  • 23.4 Create a networking security policy

  • Part VI: Process and log administration
  • Chapter 24: Process control
  • 24.1 Manage system processes
  • 24.2 Display system information"
  • Chapter 25: System logging
  • 25.1 Manage log files
  • 25.1 Configure log rotation

  • Part VII: Software management
  • Chapter 26: Red Hat-based software management
  • 26.1 Manage software packages with rpm
  • 26.2 Manage software packages with yum
  • Chapter 27: Debian-based software management
  • 27.1 Manage software packages with dpkg
  • 27.2 Manage software packages with apt
  • Chapter 28: System booting
  • 28.1 Configure GRUB
  • 28.2 Manage the startup process
  • Chapter 29: Develop a software management security policy
  • 29.1 Explore Common Vulerabilities and Exposure reports
  • 29.2 Manage and secure legacy services

  • Part VII: Security tasks
  • Chapter 30: Footprinting
  • 30.1 Use probing tools
  • 30.2 Scan the network
  • Chapter 31: Firewalls
  • 31.1 Create a firewall to protect a system
  • 31.2 Impliment NAT
  • Chapter 32: Intrusion Detection
  • 32.1 Scan the system to determine if it has been compromised
  • 32.2 Use IDS Tools
  • Chapter 33: Additional security tasks
  • 33.1 Configure fail2ban
  • 33.2 Impliment a VPN
  • 33.3 Encrypt files with gpg
At the impressionable age of 14, William "Bo" Rothwell crossed paths with a TRS-80 Micro Computer System (affectionately known as a "Trash 80"). Soon after the adults responsible for Bo made the mistake of leavin him alone with the TRS-80, he immediately dismantled it and held his first computer class, showing his friends what made this "computer thing" work.
Since that experience, Bo's passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes Linux, Unix, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and president of One Course Source, an IT training organization.

Caractéristiques techniques

  PAPIER
Éditeur(s) Pearson education
Auteur(s) William Rothwell
Parution 30/09/2018
Nb. de pages 160
EAN13 9780789760555

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription