advertisment

advertisment

Linux Essentials for Cybersecurity

29

- Advertisement -

Linux distributions are widely used to support critical applications and manage critical data. But maintaining the security of modern Linux systems is complicated, and many Linux books have inadequate or outdated coverage of security.

The Linux Essentials for Cybersecurity book will help you optimize Linux for basic security even if you don’t have any experience working with Linux. Here you will learn the best way to manage accounts, drivers, services, processes, data, and networks. Then you will learn powerful tools and automated scripting techniques for tracking, penetration testing, threat detection, auditing, software management, etc.

- Advertisement -

Headlines:

Part I: Introducing Linux

Chapter 1: Distributions and Key Components

Chapter 2: Working on the Command Line

Chapter 3: Getting Help

Chapter 4: Editing Files

Chapter 5: When Things Go Wrong

Part II: Use r and Group Accounts

Chapter 6: Managing Group Accounts

Chapter 7: Managing User Accounts

Chapter 8: Develop an Account Security Policy

Part III: File  and Data Storage

Chapter 9: File Permissions

Chapter 10: Manage Local Storage: Essentials

Chapter 11: Manage Local Storage: Advanced Features

Chapter 12: Manage Network Storage

Chapter 13: Develop a Storage Security Policy

Part IV: Automation

Chapter 14: crontabandat

Chapter 15: Scripting

Chapter 16: Common Automation Tasks

Chapter 17: Develop an Automation Security Policy

Part V: Networking

- Advertisement -

Chapter 18: Networking Basics

Chapter 19: Network Configuration

Chapter 20: Network Service Configuration: Essential Services

Chapter 21: Network Service Configuration: Web Services

Chapter 22: Connecting to Remote Systems

Chapter 23: Develop a Network Security Policy

Part VI: Process and Log Administration

Chapter 24: Process Control

Chapter 25: System Logging

Part VII: Software  Management

Chapter 26: Red Hat–Based Software Management

Chapter 27: Debian-Based Software Management

Chapter 28: System Booting

Chapter 29: Develop a Software Management Security Policy

Part VIII: Security Tasks

Chapter 30: Footprinting

Chapter 31: Firewalls

Chapter 32: Intrusion Detection

Chapter 33: Additional Security Tasks

Specifications:

Author: William Rothwell, Denise Kinsey

Publisher: Pearson IT Certification

Year of release: 2018

Number of Pages: 704

Filesize: 39.4 MB

Dowload
80%
Awesome
  • Design

- Advertisement -

- Advertisement -

- Advertisement -

Leave A Reply

Your email address will not be published.