Linux Essentials for Cybersecurity Lab Manual

Author:   William Rothwell
Publisher:   Pearson Education (US)
ISBN:  

9780789760555


Pages:   160
Publication Date:   31 December 2018
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $48.25 Quantity:  
Add to Cart

Share |

Linux Essentials for Cybersecurity Lab Manual


Add your own review!

Overview

Over 75 labs will accompany the textbook developed to be used within the Pearson IT Cybersecurity Curriculum (ITCC). Course 4: Linux Fundamentals for Cybersecurity, which introduces fundamental Linux concepts from proper set-up installation through administration of accounts, devices, services, processes, and functions. This course also covers basic scripting taught to understand tools for Penetration Testing and cybersecurity threat detection.

Full Product Details

Author:   William Rothwell
Publisher:   Pearson Education (US)
Imprint:   Pearson IT Certification
Dimensions:   Width: 20.00cm , Height: 1.00cm , Length: 25.00cm
Weight:   0.361kg
ISBN:  

9780789760555


ISBN 10:   078976055
Pages:   160
Publication Date:   31 December 2018
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

"Part I: Introducing Linux Chapter 1: Distributions and key components Chapter 2: Working on the command line Chapter 3: Getting help Chapter 4: Editing files Chapter 5: When things go wrong Part II: User and group accounts Chapter 6: Managing group accounts Chapter 7: Managing user account Chapter 8: Develop an account security policy Part III: File and data storage Chapter 9: File permissions Chapter 10: Manage local storage: Concepts Chapter 11: Manage local storage: Practical application Chapter 12: Manage network storage Chapter 13: Develop a storage security policy  Part IV: Automation Chapter 14: Crontab and at 14.1 Manage crontab 14.2 Configure at commands Chapter 15: Scripting 15.1 Script project #1 15.2 Script project #2 Chapter 16: Common automation tasks 15.3 Script project #3 15.4 Script project #4 Chapter 17: Develop an automation security policy 17.1 Secure crontab 17.2 Create a automation security policy Part V: Networking Chapter 18: Networking basics 18.1 Explore networking componets Chapter 19: Network configuration 19.1 Configure networking on CentOS 19.2 Configure networking on Ubuntu"" Chapter 20: Network service configuration: Essential services 20.1 Configure a BIND server 20.2 Configure a Postfix server 20.3 Administer procmail and Dovecot Chapter 21: Network service configuration: Web services 21.1 Configure and administer an Apache server 21.2. Configure a proxy server Chapter 22: Connecting to remote systems 22.1 Create an LDAP server 22.2 Configure a FTP server 22.3 Administer a SSH server Chapter 23: Develop an network security policy 23.1 Administer kernel security parameters 23.2 Secure the system with TCP Wrappers 23.3 Configure Network Time Protocol 23.4 Create a networking security policy Part VI: Process and log administration Chapter 24: Process control 24.1 Manage system processes 24.2 Display system information"" Chapter 25: System logging 25.1 Manage log files 25.1 Configure log rotation Part VII: Software management Chapter 26: Red Hat-based software management 26.1 Manage software packages with rpm 26.2 Manage software packages with yum Chapter 27: Debian-based software management 27.1 Manage software packages with dpkg 27.2 Manage software packages with apt Chapter 28: System booting 28.1 Configure GRUB  28.2 Manage the startup process Chapter 29: Develop a software management security policy  29.1 Explore Common Vulerabilities and Exposure reports 29.2 Manage and secure legacy services Part VII: Security tasks Chapter 30: Footprinting 30.1 Use probing tools 30.2 Scan the network Chapter 31: Firewalls 31.1 Create a firewall to protect a system 31.2 Impliment NAT Chapter 32: Intrusion Detection"

Reviews

Author Information

At the impressionable age of 14, William “Bo” Rothwell crossed paths with a TRS-80 Micro Computer System (affectionately known as a “Trash 80”). Soon after the adults responsible for Bo made the mistake of leavin him alone with the TRS-80, he immediately dismantled it and held his first computer class, showing his friends what made this “computer thing” work. Since that experience, Bo’s passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes Linux, Unix, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and president of One Course Source, an IT training organization.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List