Linux Essentials for Cybersecurity Pearson uCertify Course

Here's what you will get

Lessons
Lessons
35+
Exercises
121+
Quizzes
94+
Flashcards
309+
Glossary of terms
309+
Test prep
Pre-assessment Questions
100+
Post-Assessment Questions
102+

Here's what you will learn

  • Introducing Linux
  • Linux Distributions
  • Installing Linux
  • Summary
  • File Management
  • Shell Features
  • Advanced Commands
  • Summary
  • Man Pages
  • Command Help Options
  • The help Command
  • The info Command
  • The /usr/share/doc Directory
  • Internet Resources
  • Summary
  • The vi Editor
  • Additional Editors
  • Summary
  • The Science of Troubleshooting
  • Notifying Users
  • Summary
  • What Are Groups Used For?
  • Managing Groups
  • Summary
  • The Importance of User Accounts
  • Managing Users
  • Network-Based User Accounts
  • Using su and sudo
  • Restricting User Accounts
  • Summary
  • Introducing Kali Linux
  • Security Principles
  • Creating a Security Policy
  • Securing Accounts
  • Security Tools
  • Summary
  • Standard Permissions
  • Default Permissions
  • Special Permissions
  • Access Control Lists (ACLs)
  • Changing Ownership
  • File Attributes
  • Introduction to SELinux
  • Summary
  • Filesystem Essentials
  • Filesystem Types
  • Additional Filesystem Tools
  • Mounting Filesystems
  • Summary
  • Encrypted Filesystems
  • Managing autofs
  • Logical Volume Manager
  • Disk Quotas
  • Hard and Soft Links
  • Summary
  • Samba
  • Network File System
  • Summary
  • Developing the Plan
  • Backing Up Data
  • Summary
  • Using crontab
  • Using at
  • Summary
  • Linux Programming
  • Basics of BASH Scripting
  • Flow Control Statements
  • User Interaction
  • Using Command Substitution
  • Additional Information
  • Summary
  • Exploring Scripts that Already Exist on Your System
  • Creating Your Own Automation Scripts
  • Summary
  • Securing crontab and at
  • Securing BASH Scripts
  • Summary
  • Network Terminology
  • IPv4 Versus IPv6
  • IPv4 Addresses
  • Common Protocol Suites
  • Network Ports
  • Summary
  • Ethernet Network Interfaces
  • Persistent Network Configurations
  • Network Troubleshooting Commands
  • Access to Wireless Networks
  • Summary
  • DNS Servers
  • Zone Files
  • Securing BIND
  • DHCP Server
  • Email Servers
  • Managing Local Email Delivery
  • Remote Email Delivery
  • Summary
  • Apache Web Server
  • Basic Apache Web Server Configuration
  • Apache Web Server Security
  • Virtual Hosts
  • HTTPS
  • SSL and Apache
  • Proxy Servers
  • Summary
  • LDAP
  • FTP Servers
  • Secure Shell
  • Summary
  • Kernel Parameters
  • TCP Wrappers
  • Network Time Protocol
  • Summary
  • Viewing Processes
  • Running Processes
  • Killing Process
  • The nohup Command
  • Process Priority
  • Summary
  • Syslog
  • The logrotate Command
  • The journalctl Command
  • Summary
  • Red Hat Packages
  • Using the rpm Command
  • The yum Command
  • Additional Tools
  • Summary
  • Managing Packages with dpkg
  • Managing Packages with APT
  • Listing Package Information with APT Commands
  • Summary
  • Phases of the Boot Process
  • GRUB
  • Kernel Components
  • The init Phase
  • Summary
  • Ensuring Software Security
  • xinetd
  • Summary
  • Understanding Footprinting
  • Common Footprinting Tools
  • Kali Linux Utilities
  • Summary
  • Introduction to Firewalls
  • Essentials of the iptables Command
  • Using iptables to Filter Incoming Packets
  • Using iptables to Filter Outgoing Packets
  • Implementing NAT
  • Summary
  • Introduction to Intrusion Detection Tools
  • Intrusion Detection Network Tools
  • Intrusion Detection File Tools
  • Additional Intrusion Detection Tools
  • Summary
  • The fail2ban Service
  • OpenVPN
  • gpg
  • Security Alert Services
  • Summary
Pearson-linux-ess-cybersec_pro Pearson-linux-ess-cybersec_pro
Pearson-linux-ess-cybersec
Linux Essentials for Cybersecurity Pearson uCertify Course
Rating :
(16)