Linux Essentials for Cybersecurity Pearson uCertify Course and Labs

Gain hands-on expertise on Linux essentials for cybersecurity with Linux Essentials for Cybersecurity course and performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. The complete cert guide provides knowledge and skills in managing local storage, managing group and user accounts, working on the command line, editing files, and many more.

Here's what you will get

Lessons
Lessons
35+
Exercises
124+
Quizzes
94+
Flashcards
311+
Glossary of terms
311+
Test prep
Pre-assessment Questions
100+
Post-Assessment Questions
101+
Lab
Performance lab
70+

Here's what you will learn

  • Introducing Linux
  • Linux Distributions
  • Installing Linux
  • Summary
  • File Management
  • Shell Features
  • Advanced Commands
  • Summary
  • Man Pages
  • Command Help Options
  • The help Command
  • The info Command
  • The /usr/share/doc Directory
  • Internet Resources
  • Summary
  • The vi Editor
  • Additional Editors
  • Summary
  • The Science of Troubleshooting
  • Notifying Users
  • Summary
  • What Are Groups Used For?
  • Managing Groups
  • Summary
  • The Importance of User Accounts
  • Managing Users
  • Network-Based User Accounts
  • Using su and sudo
  • Restricting User Accounts
  • Summary
  • Introducing Kali Linux
  • Security Principles
  • Creating a Security Policy
  • Securing Accounts
  • Security Tools
  • Summary
  • Standard Permissions
  • Default Permissions
  • Special Permissions
  • Access Control Lists (ACLs)
  • Changing Ownership
  • File Attributes
  • Introduction to SELinux
  • Summary
  • Filesystem Essentials
  • Filesystem Types
  • Additional Filesystem Tools
  • Mounting Filesystems
  • Summary
  • Encrypted Filesystems
  • Managing autofs
  • Logical Volume Manager
  • Disk Quotas
  • Hard and Soft Links
  • Summary
  • Samba
  • Network File System
  • Summary
  • Developing the Plan
  • Backing Up Data
  • Summary
  • Using crontab
  • Using at
  • Summary
  • Linux Programming
  • Basics of BASH Scripting
  • Flow Control Statements
  • User Interaction
  • Using Command Substitution
  • Additional Information
  • Summary
  • Exploring Scripts that Already Exist on Your System
  • Creating Your Own Automation Scripts
  • Summary
  • Securing crontab and at
  • Securing BASH Scripts
  • Summary
  • Network Terminology
  • IPv4 Versus IPv6
  • IPv4 Addresses
  • Common Protocol Suites
  • Network Ports
  • Summary
  • Ethernet Network Interfaces
  • Persistent Network Configurations
  • Network Troubleshooting Commands
  • Access to Wireless Networks
  • Summary
  • DNS Servers
  • Zone Files
  • Securing BIND
  • DHCP Server
  • Email Servers
  • Managing Local Email Delivery
  • Remote Email Delivery
  • Summary
  • Apache Web Server
  • Basic Apache Web Server Configuration
  • Apache Web Server Security
  • Virtual Hosts
  • HTTPS
  • SSL and Apache
  • Proxy Servers
  • Summary
  • LDAP
  • FTP Servers
  • Secure Shell
  • Summary
  • Kernel Parameters
  • TCP Wrappers
  • Network Time Protocol
  • Summary
  • Viewing Processes
  • Running Processes
  • Killing Process
  • The nohup Command
  • Process Priority
  • Summary
  • Syslog
  • The logrotate Command
  • The journalctl Command
  • Summary
  • Red Hat Packages
  • Using the rpm Command
  • The yum Command
  • Additional Tools
  • Summary
  • Managing Packages with dpkg
  • Managing Packages with APT
  • Listing Package Information with APT Commands
  • Summary
  • Phases of the Boot Process
  • GRUB
  • Kernel Components
  • The init Phase
  • Summary
  • Ensuring Software Security
  • xinetd
  • Summary
  • Understanding Footprinting
  • Common Footprinting Tools
  • Kali Linux Utilities
  • Summary
  • Introduction to Firewalls
  • Essentials of the iptables Command
  • Using iptables to Filter Incoming Packets
  • Using iptables to Filter Outgoing Packets
  • Implementing NAT
  • Summary
  • Introduction to Intrusion Detection Tools
  • Intrusion Detection Network Tools
  • Intrusion Detection File Tools
  • Additional Intrusion Detection Tools
  • Summary
  • The fail2ban Service
  • OpenVPN
  • gpg
  • Security Alert Services
  • Summary

Hands on Activities (Labs)

  • Installing Kali Linux  
  • Installing Ubuntu
  • Installing CentOS
  • Managing Files using Command Line
  • Using Shell Features
  • Compressing Files
  • Getting Help using man Command
  • Getting Help using info Command
  • Editing Files using the Vim Editor
  • Troubleshooting Linux Issues
  • Configuring User Notifications
  • Managing Group Accounts
  • Managing Group Administrators
  • Managing User Accounts
  • Securing User Accounts
  • Configuring sudo
  • Developing an Account Security Policy
  • Testing the Security of Accounts
  • Managing File Permissions
  • Managing Special Permissions
  • Enabling Access Control Lists
  • Managing File Ownership and Attributes
  • Monitoring Security Issues with SELinux
  • Creating Partitions and Filesystems
  • Mounting Filesystems at Boot
  • Managing Swap Devices
  • Managing Encrypted Filesystems
  • Managing Hard and Soft Links
  • Configuring Samba
  • Administering NFS
  • Backing Up a Filesystem
  • Developing a Backup Security Policy
  • Managing crontab
  • Configuring at Commands
  • Bash shell script for system info
  • Bash shell script for validating user input
  • Script to Perform System Check
  • Script That Will Back Up All The Files
  • Securing crontab and at
  • Creating an Automation Security Policy
  • Standard Ports for the Protocols
  • Understanding Network Configuration on CentOS
  • Understanding Network Configuration on Ubuntu
  • Configuring a BIND Server
  • Configuring a Postfix Server
  • Configuring and Administering an Apache Server
  • Configuring a Proxy Server
  • Configuring an FTP Server
  • Administering an SSH Server
  • Administering Kernel Security Parameters
  • Securing a System with TCP Wrappers
  • Configuring Network Time Protocol
  • Creating a Networking Security Policy
  • Managing System Processes
  • Displaying System Information
  • Managing Log Files
  • Configuring Log Rotation
  • Managing Software Packages with rpm 
  • Managing Software Packages with yum
  • Managing Software Packages with dpkg  
  • Configuring GRUB Security
  • Managing the Startup Process
  • Exploring Common Vulnerabilities and Exposure Reports
  • Managing and Securing Legacy Services
  • Using Probing Tools
  • Scanning the Network
  • Configuring Linux Firewall using iptable   
  • Examining an Intrusion Detection Security Policy 
  • Configuring fail2ban
  • Encrypting Files with gpg
Pearson-linux-ess-cybersec_pro Pearson-linux-ess-cybersec_pro
Pearson-linux-ess-cybersec-complete
Linux Essentials for Cybersecurity Pearson uCertify Course and...
ISBN : 9781644590140
Rating :
(16)