Linux Essentials for Cybersecurity
Linux distributions are widely used to support critical applications and manage critical data. But maintaining the security of modern Linux systems is complicated, and many Linux books have inadequate or outdated coverage of security.
The Linux Essentials for Cybersecurity book will help you optimize Linux for basic security even if you don’t have any experience working with Linux. Here you will learn the best way to manage accounts, drivers, services, processes, data, and networks. Then you will learn powerful tools and automated scripting techniques for tracking, penetration testing, threat detection, auditing, software management, etc.
Headlines:
Part I: Introducing Linux
Chapter 1: Distributions and Key Components
Chapter 2: Working on the Command Line
Chapter 3: Getting Help
Chapter 4: Editing Files
Chapter 5: When Things Go Wrong
Part II: Use r and Group Accounts
Chapter 6: Managing Group Accounts
Chapter 7: Managing User Accounts
Chapter 8: Develop an Account Security Policy
Part III: File and Data Storage
Chapter 9: File Permissions
Chapter 10: Manage Local Storage: Essentials
Chapter 11: Manage Local Storage: Advanced Features
Chapter 12: Manage Network Storage
Chapter 13: Develop a Storage Security Policy
Part IV: Automation
Chapter 14: crontabandat
Chapter 15: Scripting
Chapter 16: Common Automation Tasks
Chapter 17: Develop an Automation Security Policy
Part V: Networking
Chapter 18: Networking Basics
Chapter 19: Network Configuration
Chapter 20: Network Service Configuration: Essential Services
Chapter 21: Network Service Configuration: Web Services
Chapter 22: Connecting to Remote Systems
Chapter 23: Develop a Network Security Policy
Part VI: Process and Log Administration
Chapter 24: Process Control
Chapter 25: System Logging
Part VII: Software Management
Chapter 26: Red Hat–Based Software Management
Chapter 27: Debian-Based Software Management
Chapter 28: System Booting
Chapter 29: Develop a Software Management Security Policy
Part VIII: Security Tasks
Chapter 30: Footprinting
Chapter 31: Firewalls
Chapter 32: Intrusion Detection
Chapter 33: Additional Security Tasks
Specifications:
Author: William Rothwell, Denise Kinsey
Publisher: Pearson IT Certification
Year of release: 2018
Number of Pages: 704
Filesize: 39.4 MB
- Design