ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS,
APPLICATIONS, AND DATA-IN ONE BOOK From the basics to advanced
techniques: no Linux security experience necessary Realistic
examples & step-by-step activities: practice hands-on without
costly equipment The perfect introduction to Linux-based security
for all students and IT professionals Linux distributions are
widely used to support mission-critical applications and manage
crucial data. But safeguarding modern Linux systems is complex, and
many Linux books have inadequate or outdated security coverage.
Linux Essentials for Cybersecurity is your complete solution.
Leading Linux certification and security experts William "Bo"
Rothwell and Dr. Denise Kinsey introduce Linux with the primary
goal of enforcing and troubleshooting security. Their practical
approach will help you protect systems, even if one or more layers
are penetrated. First, you'll learn how to install Linux to achieve
optimal security upfront, even if you have no Linux experience.
Next, you'll master best practices for securely administering
accounts, devices, services, processes, data, and networks. Then,
you'll master powerful tools and automated scripting techniques for
footprinting, penetration testing, threat detection, logging,
auditing, software management, and more. To help you earn
certification and demonstrate skills, this guide covers many key
topics on CompTIA Linux+ and LPIC-1 exams. Everything is organized
clearly and logically for easy understanding, effective classroom
use, and rapid on-the-job training. LEARN HOW TO: Review Linux
operating system components from the standpoint of security Master
key commands, tools, and skills for securing Linux systems
Troubleshoot common Linux security problems, one step at a time
Protect user and group accounts with Pluggable Authentication
Modules (PAM), SELinux, passwords, and policies Safeguard files and
directories with permissions and attributes Create, manage, and
protect storage devices: both local and networked Automate system
security 24/7 by writing and scheduling scripts Maintain network
services, encrypt network connections, and secure
network-accessible processes Examine which processes are
running-and which may represent a threat Use system logs to
pinpoint potential vulnerabilities Keep Linux up-to-date with Red
Hat or Debian software management tools Modify boot processes to
harden security Master advanced techniques for gathering system
information
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!