Linux Essentials for Cybersecurity
- Length: 704 pages
- Edition: 1
- Language: English
- Publisher: Pearson IT Certification
- Publication Date: 2018-07-20
- ISBN-10: 0789759357
- ISBN-13: 9780789759351
- Sales Rank: #1437825 (See Top 100 Books)
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA-IN ONE BOOK
- From the basics to advanced techniques: no Linux security experience necessary
- Realistic examples & step-by-step activities: practice hands-on without costly equipment
- The perfect introduction to Linux-based security for all students and IT professionals
Linux distributions are widely used to support mission-critical applications and manage crucial data. But safeguarding modern Linux systems is complex, and many Linux books have inadequate or outdated security coverage.
Linux Essentials for Cybersecurity is your complete solution. Leading Linux certification and security experts William “Bo” Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of enforcing and troubleshooting security. Their practical approach will help you protect systems, even if one or more layers are penetrated.
First, you’ll learn how to install Linux to achieve optimal security upfront, even if you have no Linux experience. Next, you’ll master best practices for securely administering accounts, devices, services, processes, data, and networks. Then, you’ll master powerful tools and automated scripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more.
To help you earn certification and demonstrate skills, this guide covers many key topics on CompTIA Linux+ and LPIC-1 exams. Everything is organized clearly and logically for easy understanding, effective classroom use, and rapid on-the-job training.
LEARN HOW TO:
Review Linux operating system components from the standpoint of security Master key commands, tools, and skills for securing Linux systems Troubleshoot common Linux security problems, one step at a time Protect user and group accounts with Pluggable Authentication Modules (PAM), SELinux, passwords, and policies Safeguard files and directories with permissions and attributes Create, manage, and protect storage devices: both local and networked Automate system security 24/7 by writing and scheduling scripts Maintain network services, encrypt network connections, and secure network-accessible processes Examine which processes are running-and which may represent a threat Use system logs to pinpoint potential vulnerabilities Keep Linux up-to-date with Red Hat or Debian software management tools Modify boot processes to harden security Master advanced techniques for gathering system information
Cover About This E-Book Title Page Copyright Page Contents at a Glance Table of Contents About the Authors Dedications Acknowledgments About the Technical Reviewers We Want to Hear from You! Reader Services Introduction Who Should Read This Book? How This Book Is Organized Part I: Introducing Linux Chapter 1 Distributions and Key Components Introducing Linux Linux Distributions Installing Linux Summary Chapter 2 Working on the Command Line File Management Shell Features Advanced Commands Summary Chapter 3 Getting Help Man Pages Command Help Options The help Command The info Command The /usr/share/doc Directory Internet Resources Summary Chapter 4 Editing Files The vi Editor Additional Editors Summary Chapter 5 When Things Go Wrong The Science of Troubleshooting Notifying Users Summary Part II: User and Group Accounts Chapter 6 Managing Group Accounts What Are Groups Used For? Managing Groups Summary Chapter 7 Managing User Accounts The Importance of User Accounts Managing Users Network-Based User Accounts Using su and sudo Restricting User Accounts Summary Chapter 8 Develop an Account Security Policy Introducing Kali Linux Security Principles Creating a Security Policy Securing Accounts Security Tools Summary Part III: File and Data Storage Chapter 9 File Permissions Standard Permissions Default Permissions Special Permissions Access Control Lists (ACLs) Changing Ownership File Attributes Introduction to SELinux Summary Chapter 10 Manage Local Storage: Essentials Filesystem Essentials Filesystem Types Additional Filesystem Tools Mounting Filesystems Summary Chapter 11 Manage Local Storage: Advanced Features Encrypted Filesystems Managing autofs Logical Volume Manager Disk Quotas Hard and Soft Links Summary Chapter 12 Manage Network Storage Samba Network File System Summary Chapter 13 Develop a Storage Security Policy Developing the Plan Backing Up Data Summary Part IV: Automation Chapter 14 crontab and at Using crontab Using at Summary Chapter 15 Scripting Linux Programming Basics of BASH Scripting Flow Control Statements User Interaction Using Command Substitution Additional Information Summary Chapter 16 Common Automation Tasks Exploring Scripts that Already Exist on Your System Creating Your Own Automation Scripts Summary Chapter 17 Develop an Automation Security Policy Securing crontab and at Securing BASH Scripts Summary Part V: Networking Chapter 18 Networking Basics Network Terminology IPv4 Versus IPv6 IPv4 Addresses Common Protocol Suites Network Ports Summary Chapter 19 Network Configuration Ethernet Network Interfaces Persistent Network Configurations Network Troubleshooting Commands Access to Wireless Networks Summary Chapter 20 Network Service Configuration: Essential Services DNS Servers Zone Files Securing BIND DHCP Server Email Servers Managing Local Email Delivery Remote Email Delivery Summary Chapter 21 Network Service Configuration: Web Services Apache Web Server Basic Apache Web Server Configuration Apache Web Server Security Virtual Hosts HTTPS SSL and Apache Proxy Servers Summary Chapter 22 Connecting to Remote Systems LDAP FTP Servers Secure Shell Summary Chapter 23 Develop a Network Security Policy Kernel Parameters TCP Wrappers Network Time Protocol Summary Part VI: Process and Log Administration Chapter 24 Process Control Viewing Processes Running Processes Killing Processes The nohup Command Process Priority Summary Chapter 25 System Logging Syslog The logrotate Command The journalctl Command Summary Part VII: Software Management Chapter 26 Red Hat–Based Software Management Red Hat Packages Using the rpm Command The yum Command Additional Tools Summary Chapter 27 Debian-Based Software Management Managing Packages with dpkg Managing Packages with APT Listing Package Information with APT Commands Summary Chapter 28 System Booting Phases of the Boot Process GRUB Kernel Components The init Phase Summary Chapter 29 Develop a Software Management Security Policy Ensuring Software Security xinetd Summary Part VIII: Security Tasks Chapter 30 Footprinting Understanding Footprinting Common Footprinting Tools Kali Linux Utilities Summary Chapter 31 Firewalls Introduction to Firewalls Essentials of the iptables Command Using iptables to Filter Incoming Packets Using iptables to Filter Outgoing Packets Implementing NAT Summary Chapter 32 Intrusion Detection Introduction to Intrusion Detection Tools Intrusion Detection Network Tools Intrusion Detection File Tools Additional Intrusion Detection Tools Summary Chapter 33 Additional Security Tasks The fail2ban Service OpenVPN gpg Security Alert Services Summary Appendix A Answers to Review Questions Appendix B Resource Guide Glossary Index Code Snippets
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.