𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Linux Essentials for Cybersecurity (for True EPUB)

✍ Scribed by William β€œBo” Rothwell; Denise Kinsey


Publisher
Pearson Education
Year
2019
Tongue
English
Leaves
690
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA–IN ONE BOOK

From the basics to advanced techniques: no Linux security experience necessary
Realistic examples & step-by-step activities: practice hands-on without costly equipment
The perfect introduction to Linux-based security for all students and IT professionals

Linux distributions are widely used to support mission-critical applications and manage crucial data. But safeguarding modern Linux systems is complex, and many Linux books have inadequate or outdated security coverage.

Linux Essentials for Cybersecurity is your complete solution. Leading Linux certification and security experts William β€œBo” Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of enforcing and troubleshooting security. Their practical approach will help you protect systems, even if one or more layers are penetrated.

First, you’ll learn how to install Linux to achieve optimal security upfront, even if you have no Linux experience. Next, you’ll master best practices for securely administering accounts, devices, services, processes, data, and networks. Then, you’ll master powerful tools and automated scripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more.

To help you earn certification and demonstrate skills, this guide covers many key topics on CompTIA Linux+ and LPIC-1 exams. Everything is organized clearly and logically for easy understanding, effective classroom use, and rapid on-the-job training.

LEARN HOW TO

Review Linux operating system components from the standpoint of security
Master key commands, tools, and skills for securing Linux systems
Troubleshoot common Linux security problems, one step at a time
Protect user and group accounts with Pluggable Authentication
Modules (PAM), SELinux, passwords, and policies
Safeguard files and directories with permissions and attributes
Create, manage, and protect storage devices: both local and networked
Automate system security 24/7 by writing and scheduling scripts
Maintain network services, encrypt network connections, and secure network-accessible processes
Examine which processes are running–and which may represent a threat
Use system logs to pinpoint potential vulnerabilities
Keep Linux up-to-date with Red Hat or Debian software management tools
Modify boot processes to harden security
Master advanced techniques for gathering system information

✦ Table of Contents


Introduction
Part I: Introducing Linux
Chapter 1: Distributions and Key Components
Chapter 2: Working on the Command Line
Chapter 3: Getting Help
Chapter 4: Editing Files
Chapter 5: When Things Go Wrong
Part II: User and Group Accounts
Chapter 6: Managing Group Accounts
Chapter 7: Managing User Accounts
Chapter 8: Develop an Account Security Policy
Part III: File and Data Storage
Chapter 9: File Permissions
Chapter 10: Manage Local Storage: Essentials
Chapter 11: Manage Local Storage: Advanced Features
Chapter 12: Manage Network Storage
Chapter 13: Develop a Storage Security Policy
Part IV: Automation
Chapter 14: crontab and at
Chapter 15: Scripting
Chapter 16: Common Automation Tasks
Chapter 17: Develop an Automation Security Policy
Part V: Networking
Chapter 18: Networking Basics
Chapter 19: Network Configuration
Chapter 20: Network Service Configuration: Essential Services
Chapter 21: Network Service Configuration: Web Services
Chapter 22: Connecting to Remote Systems
Chapter 23: Develop a Network Security Policy
Part VI: Process and Log Administration
Chapter 24: Process Control
Chapter 25: System Logging
Part VII: Software Management
Chapter 26: Red Hat–Based Software Management
Chapter 27: Debian-Based Software Management
Chapter 28: System Booting
Chapter 29: Develop a Software Management Security Policy
Part VIII: Security Tasks
Chapter 30: Footprinting
Chapter 31: Firewalls
Chapter 32: Intrusion Detection
Chapter 33: Additional Security Tasks
Appendix A: Answers to Review Questions
Appendix B: Resource Guide
Glossary
Index


πŸ“œ SIMILAR VOLUMES


Linux Essentials for Cybersecurity
✍ William Rothwell; Denise Kinsey πŸ“‚ Library πŸ“… 2018 πŸ› Pearson It Certification 🌐 English

Linux distributions are widely used by technical professionals to support mission-critical applications and manage crucial data. But safeguarding Linux systems can be complex, and many guides to Linux usage and certification provide only superficial coverage of security. Linux Essentials for Cyberse

Linux Essentials for Cybersecurity
✍ William Rothwell; Denise Kinsey πŸ“‚ Library πŸ“… 2018 πŸ› Pearson Education 🌐 English

ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA–IN ONE BOOK From the basics to advanced techniques: no Linux security experience necessary Realistic examples & step-by-step activities: practice hands-on without costly equipment The perfect introduction to Li

Linux Essentials for Cybersecurity
✍ Rothwell, William J πŸ“‚ Library πŸ“… 2018 πŸ› Pearson It Certification 🌐 English

<b>ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA-IN ONE BOOK</b><b><br /></b><i>From the basics to advanced techniques: no Linux security experience necessary<br />Realistic examples &amp; step-by-step activities: practice hands-on without costly equipment<br />The p

Framework for SCADA Cybersecurity ePub
✍ Richard Clark πŸ“‚ Library πŸ“… 2015 πŸ› InduSoft 🌐 English

This eBook will provide Critical Infrastructure customers and academic students an understanding of the NIST Cybersecurity Critical Infrastructure Framework and how to apply the framework to new and existing SCADA applications and implementations. Purpose: Provide Critical Infrastructure customers

Software Requirements Essentials: Core P
✍ Karl Wiegers; Candase Hokanson πŸ“‚ Library πŸ“… 2023 πŸ› Addison-Wesley/Pearson Education 🌐 English

20 Best Practices for Developing and Managing Requirements on Any Project. Software Requirements Essentials presents 20 core practices for successful requirements planning, elicitation, analysis, specification, validation, and management. Leading requirements experts Karl Wiegers and Candase Hoka