Linux Essentials for Cybersecurity

(Pearson-linux-ess-cybersec-complete)/ISBN:9781644590362

This course includes
Lessons
TestPrep
LiveLab
Video Lessons (Add-on)
Mentoring (Add-on)

Gain hands-on expertise on the Linux cybersecurity principles with the Linux Essentials for Cybersecurity course and lab to gain the hands-on expertise required to understand the Linux cybersecurity principles. The lab is cloud-based, device-enabled, and can easily be integrated with an LMS. The Linux training course and lab provide knowledge and skills in managing local storage, group, and user accounts; working on the command line, editing files, developing a storage security policy, and more.

Lessons

37+ Lessons | 216+ Quizzes | 288+ Flashcards | 290+ Glossary of terms

TestPrep

100+ Pre Assessment Questions | 101+ Post Assessment Questions |

Hand on lab

70+ LiveLab | 00+ Minutes

Video Lessons

216+ Videos | 13:01+ Hours

Here's what you will learn

Download Course Outline

Lessons 1: Introduction

Lessons 2: Distributions and Key Components

  • Introducing Linux
  • Linux Distributions
  • Installing Linux
  • Summary

Lessons 3: Working on the Command Line

  • File Management
  • Shell Features
  • Advanced Commands
  • Summary

Lessons 4: Getting Help

  • Man Pages
  • Command Help Options
  • The help Command
  • The info Command
  • The /usr/share/doc Directory
  • Internet Resources
  • Summary

Lessons 5: Editing Files

  • The vi Editor
  • Additional Editors
  • Summary

Lessons 6: When Things Go Wrong

  • The Science of Troubleshooting
  • Notifying Users
  • Summary

Lessons 7: Managing Group Accounts

  • What Are Groups Used For?
  • Managing Groups
  • Summary

Lessons 8: Managing User Accounts

  • The Importance of User Accounts
  • Managing Users
  • Network-Based User Accounts
  • Using su and sudo
  • Restricting User Accounts
  • Summary

Lessons 9: Develop an Account Security Policy

  • Introducing Kali Linux
  • Security Principles
  • Creating a Security Policy
  • Securing Accounts
  • Security Tools
  • Summary

Lessons 10: File Permissions

  • Standard Permissions
  • Default Permissions
  • Special Permissions
  • Access Control Lists (ACLs)
  • Changing Ownership
  • File Attributes
  • Introduction to SELinux
  • Summary

Lessons 11: Manage Local Storage: Essentials

  • Filesystem Essentials
  • Filesystem Types
  • Additional Filesystem Tools
  • Mounting Filesystems
  • Summary

Lessons 12: Manage Local Storage: Advanced Features

  • Encrypted Filesystems
  • Managing autofs
  • Logical Volume Manager
  • Disk Quotas
  • Hard and Soft Links
  • Summary

Lessons 13: Manage Network Storage

  • Samba
  • Network File System
  • Summary

Lessons 14: Develop a Storage Security Policy

  • Developing the Plan
  • Backing Up Data
  • Summary

Lessons 15: crontab and at

  • Using crontab
  • Using at
  • Summary

Lessons 16: Scripting

  • Linux Programming
  • Basics of BASH Scripting
  • Flow Control Statements
  • User Interaction
  • Using Command Substitution
  • Additional Information
  • Summary

Lessons 17: Common Automation Tasks

  • Exploring Scripts that Already Exist on Your System
  • Creating Your Own Automation Scripts
  • Summary

Lessons 18: Develop an Automation Security Policy

  • Securing crontab and at
  • Securing BASH Scripts
  • Summary

Lessons 19: Networking Basics

  • Network Terminology
  • IPv4 Versus IPv6
  • IPv4 Addresses
  • Common Protocol Suites
  • Network Ports
  • Summary

Lessons 20: Network Configuration

  • Ethernet Network Interfaces
  • Persistent Network Configurations
  • Network Troubleshooting Commands
  • Access to Wireless Networks
  • Summary

Lessons 21: Network Service Configuration: Essential Services

  • DNS Servers
  • Zone Files
  • Securing BIND
  • DHCP Server
  • Email Servers
  • Managing Local Email Delivery
  • Remote Email Delivery
  • Summary

Lessons 22: Network Service Configuration: Web Services

  • Apache Web Server
  • Basic Apache Web Server Configuration
  • Apache Web Server Security
  • Virtual Hosts
  • HTTPS
  • SSL and Apache
  • Proxy Servers
  • Summary

Lessons 23: Connecting to Remote Systems

  • LDAP
  • FTP Servers
  • Secure Shell
  • Summary

Lessons 24: Develop a Network Security Policy

  • Kernel Parameters
  • TCP Wrappers
  • Network Time Protocol
  • Summary

Lessons 25: Process Control

  • Viewing Processes
  • Running Processes
  • Killing Process
  • The nohup Command
  • Process Priority
  • Summary

Lessons 26: System Logging

  • Syslog
  • The logrotate Command
  • The journalctl Command
  • Summary

Lessons 27: Red Hat–Based Software Management

  • Red Hat Packages
  • Using the rpm Command
  • The yum Command
  • Additional Tools
  • Summary

Lessons 28: Debian-Based Software Management

  • Managing Packages with dpkg
  • Managing Packages with APT
  • Listing Package Information with APT Commands
  • Summary

Lessons 29: System Booting

  • Phases of the Boot Process
  • GRUB
  • Kernel Components
  • The init Phase
  • Summary

Lessons 30: Develop a Software Management Security Policy

  • Ensuring Software Security
  • xinetd
  • Summary

Lessons 31: Footprinting

  • Understanding Footprinting
  • Common Footprinting Tools
  • Kali Linux Utilities
  • Summary

Lessons 32: Firewalls

  • Introduction to Firewalls
  • Essentials of the iptables Command
  • Using iptables to Filter Incoming Packets
  • Using iptables to Filter Outgoing Packets
  • Implementing NAT
  • Summary

Lessons 33: Intrusion Detection

  • Introduction to Intrusion Detection Tools
  • Intrusion Detection Network Tools
  • Intrusion Detection File Tools
  • Additional Intrusion Detection Tools
  • Summary

Lessons 34: Additional Security Tasks

  • The fail2ban Service
  • OpenVPN
  • gpg
  • Security Alert Services
  • Summary

Appendix A: Resource Guide

  • Resources by Lesson

Lessons 36: CompTIA Linux+ LX0-103 and LPIC-1 (Exam 101)

Lessons 37: CompTIA Linux+ LX0-103 and LPIC-1 (Exam 102)

Hands-on LAB Activities

Distributions and Key Components

  • Installing Kali Linux  
  • Installing Ubuntu
  • Installing CentOS

Working on the Command Line

  • Managing Files using Command Line
  • Using Shell Features
  • Compressing Files

Getting Help

  • Getting Help using man Command
  • Getting Help using info Command

Editing Files

  • Editing Files using the Vim Editor

When Things Go Wrong

  • Troubleshooting Linux Issues
  • Configuring User Notifications

Managing Group Accounts

  • Managing Group Accounts
  • Managing Group Administrators

Managing User Accounts

  • Managing User Accounts
  • Securing User Accounts
  • Configuring sudo

Develop an Account Security Policy

  • Developing an Account Security Policy
  • Testing the Security of Accounts

File Permissions

  • Managing File Permissions
  • Managing Special Permissions
  • Enabling Access Control Lists
  • Managing File Ownership and Attributes
  • Monitoring Security Issues with SELinux

Manage Local Storage: Essentials

  • Creating Partitions and Filesystems
  • Mounting Filesystems at Boot
  • Managing Swap Devices

Manage Local Storage: Advanced Features

  • Managing Encrypted Filesystems
  • Managing Hard and Soft Links

Manage Network Storage

  • Configuring Samba
  • Administering NFS

Develop a Storage Security Policy

  • Backing Up a Filesystem
  • Developing a Backup Security Policy

crontab and at

  • Managing crontab
  • Configuring at Commands

Scripting

  • Bash shell script for system info
  • Bash shell script for validating user input

Common Automation Tasks

  • Script to Perform System Check
  • Script That Will Back Up All The Files

Develop an Automation Security Policy

  • Securing crontab and at
  • Creating an Automation Security Policy

Networking Basics

  • Standard Ports for the Protocols

Network Configuration

  • Understanding Network Configuration on CentOS
  • Understanding Network Configuration on Ubuntu

Network Service Configuration: Essential Services

  • Configuring a BIND Server
  • Configuring a Postfix Server

Network Service Configuration: Web Services

  • Configuring and Administering an Apache Server
  • Configuring a Proxy Server

Connecting to Remote Systems

  • Configuring an FTP Server
  • Administering an SSH Server

Develop a Network Security Policy

  • Administering Kernel Security Parameters
  • Securing a System with TCP Wrappers
  • Configuring Network Time Protocol
  • Creating a Networking Security Policy

Process Control

  • Managing System Processes
  • Displaying System Information

System Logging

  • Managing Log Files
  • Configuring Log Rotation

Red Hat–Based Software Management

  • Managing Software Packages with rpm 
  • Managing Software Packages with yum

Debian-Based Software Management

  • Managing Software Packages with dpkg  

System Booting

  • Configuring GRUB Security
  • Managing the Startup Process

Develop a Software Management Security Policy

  • Exploring Common Vulnerabilities and Exposure Reports
  • Managing and Securing Legacy Services

Footprinting

  • Using Probing Tools
  • Scanning the Network

Firewalls

  • Configuring Linux Firewall using iptable   

Intrusion Detection

  • Examining an Intrusion Detection Security Policy 

Additional Security Tasks

  • Configuring fail2ban
  • Encrypting Files with gpg

Customer Review

The uCertify Linux Essentials for Cybersecurity course is well organized, clear and with exercises to test your understanding. I just wanted to share this very complete course for any students or professionals interested in studying Linux for Cybersecurity.