Linux Essentials for Cybersecurity Pearson uCertify Course

Linux Essentials for Cybersecurity course aims at providing skills that a Linux professional should have. The course takes typical ground-up approach with a methodology of keeping an eye on security. Throughout the course, there are references to security issues and a strong emphasis is placed on creating security policies. The course also provides knowledge and skills in managing local storage, managing group and user accounts, working on the command line, editing files, and more.

Here's what you will get

Lessons
Lessons
35+
Exercises
121+
Quizzes
94+
Flashcards
309+
Glossary of terms
309+
Test prep
Pre-assessment Questions
100+
Post-Assessment Questions
102+

Here's what you will learn

  • Introducing Linux
  • Linux Distributions
  • Installing Linux
  • Summary
  • File Management
  • Shell Features
  • Advanced Commands
  • Summary
  • Man Pages
  • Command Help Options
  • The help Command
  • The info Command
  • The /usr/share/doc Directory
  • Internet Resources
  • Summary
  • The vi Editor
  • Additional Editors
  • Summary
  • The Science of Troubleshooting
  • Notifying Users
  • Summary
  • What Are Groups Used For?
  • Managing Groups
  • Summary
  • The Importance of User Accounts
  • Managing Users
  • Network-Based User Accounts
  • Using su and sudo
  • Restricting User Accounts
  • Summary
  • Introducing Kali Linux
  • Security Principles
  • Creating a Security Policy
  • Securing Accounts
  • Security Tools
  • Summary
  • Standard Permissions
  • Default Permissions
  • Special Permissions
  • Access Control Lists (ACLs)
  • Changing Ownership
  • File Attributes
  • Introduction to SELinux
  • Summary
  • Filesystem Essentials
  • Filesystem Types
  • Additional Filesystem Tools
  • Mounting Filesystems
  • Summary
  • Encrypted Filesystems
  • Managing autofs
  • Logical Volume Manager
  • Disk Quotas
  • Hard and Soft Links
  • Summary
  • Samba
  • Network File System
  • Summary
  • Developing the Plan
  • Backing Up Data
  • Summary
  • Using crontab
  • Using at
  • Summary
  • Linux Programming
  • Basics of BASH Scripting
  • Flow Control Statements
  • User Interaction
  • Using Command Substitution
  • Additional Information
  • Summary
  • Exploring Scripts that Already Exist on Your System
  • Creating Your Own Automation Scripts
  • Summary
  • Securing crontab and at
  • Securing BASH Scripts
  • Summary
  • Network Terminology
  • IPv4 Versus IPv6
  • IPv4 Addresses
  • Common Protocol Suites
  • Network Ports
  • Summary
  • Ethernet Network Interfaces
  • Persistent Network Configurations
  • Network Troubleshooting Commands
  • Access to Wireless Networks
  • Summary
  • DNS Servers
  • Zone Files
  • Securing BIND
  • DHCP Server
  • Email Servers
  • Managing Local Email Delivery
  • Remote Email Delivery
  • Summary
  • Apache Web Server
  • Basic Apache Web Server Configuration
  • Apache Web Server Security
  • Virtual Hosts
  • HTTPS
  • SSL and Apache
  • Proxy Servers
  • Summary
  • LDAP
  • FTP Servers
  • Secure Shell
  • Summary
  • Kernel Parameters
  • TCP Wrappers
  • Network Time Protocol
  • Summary
  • Viewing Processes
  • Running Processes
  • Killing Process
  • The nohup Command
  • Process Priority
  • Summary
  • Syslog
  • The logrotate Command
  • The journalctl Command
  • Summary
  • Red Hat Packages
  • Using the rpm Command
  • The yum Command
  • Additional Tools
  • Summary
  • Managing Packages with dpkg
  • Managing Packages with APT
  • Listing Package Information with APT Commands
  • Summary
  • Phases of the Boot Process
  • GRUB
  • Kernel Components
  • The init Phase
  • Summary
  • Ensuring Software Security
  • xinetd
  • Summary
  • Understanding Footprinting
  • Common Footprinting Tools
  • Kali Linux Utilities
  • Summary
  • Introduction to Firewalls
  • Essentials of the iptables Command
  • Using iptables to Filter Incoming Packets
  • Using iptables to Filter Outgoing Packets
  • Implementing NAT
  • Summary
  • Introduction to Intrusion Detection Tools
  • Intrusion Detection Network Tools
  • Intrusion Detection File Tools
  • Additional Intrusion Detection Tools
  • Summary
  • The fail2ban Service
  • OpenVPN
  • gpg
  • Security Alert Services
  • Summary
Pearson-linux-ess-cybersec_pro Pearson-linux-ess-cybersec_pro
Pearson-linux-ess-cybersec
Linux Essentials for Cybersecurity Pearson uCertify Course
ISBN : 9781644590324
Rating :
(16)