Linux Essentials for Cybersecurity

Author:   William Rothwell ,  Denise Kinsey
Publisher:   Pearson Education (US)
ISBN:  

9780789759351


Pages:   704
Publication Date:   21 November 2018
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $111.95 Quantity:  
Add to Cart

Share |

Linux Essentials for Cybersecurity


Add your own review!

Overview

Linux distributions are widely used by technical professionals to support mission-critical applications and manage crucial data. But safeguarding Linux systems can be complex, and many guides to Linux usage and certification provide only superficial coverage of security. Linux Essentials for Cybersecurity is the solution. Part of the new Pearson IT Cybersecurity Curriculum (ITCC), it introduces Linux with the primary goal of enforcing and troubleshooting security. Leading Linux certification and security experts William “Bo” Rothwell and Denise Pheils, PhD offer a layered approach to security that helps readers protect their Linux systems even if one or more layers are penetrated. Rothwell and Pheils show how to install Linux to achieve optimal security right from the outset, even if you have no experience with Linux at all. Next the authors present best practices for the secure day-to-day administration of accounts, devices, services, processes, data, networks, and more. To increase readers’ sophistication in defending Linux systems, the authors also walk through the use of powerful tools and automated scripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more. Finally, to help readers earn certification and demonstrate their abilities, the authors cover many key topics found on the CompTIA Linux+ and LPIC-1 certification exams. This guide’s features include: Logical organisation designed for easy understanding, effective classroom use, and rapid on-the-job-training Strong emphasis on modern real-world security troubleshooting techniques throughout -- not just in separate sections Real-world examples and step-by-step activities that permit hands-on practice without expensive equipment Key terms, chapter objectives, review questions, and more

Full Product Details

Author:   William Rothwell ,  Denise Kinsey
Publisher:   Pearson Education (US)
Imprint:   Pearson IT Certification
Dimensions:   Width: 25.00cm , Height: 4.40cm , Length: 20.20cm
Weight:   1.460kg
ISBN:  

9780789759351


ISBN 10:   0789759357
Pages:   704
Publication Date:   21 November 2018
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Introduction Part I: Introducing Linux 1. Distributions and Key Components 2. Working on the Command Line 3. Getting Help 4. Editing Files 5. When Things Go Wrong Part II: User and Group Accounts 6. Managing Group Accounts 7. Managing User Accounts 8. Developing an Account Security Policy Part III: File and Data Storage 9. File Permissions 10. Managing Local Storage 11. Managing Network Storage 12. Developing a Storage Security Policy Part IV: Automation 13. Crontab and at 14. Scripting 15. Common Automation Tasks 16. Developing an Automation Security Policy Part V: Networking 17. Networking Basics 18. Network Configuration 19. Network Service Configuration 20. Connecting to Remote Systems 21. Developing a Network Security Policy Part VI: Process and Log Administration 22. Process Control 23. System Logging 24. Developing a Process and Log Security Policy Part VII: Software Management 25. Red Hat-based Software Management 26. Debian-based Software Management 27. Additional Management Tools 28. System Booting 29. Developing a Software Management Security Policy Part VIII: Security Tasks 30. Footprinting 31. Firewalls 32. Intrusion Detection Systems 33. Additional Security Tasks Appendix A. Resource Guide Glossary

Reviews

Author Information

William “Bo” Rothwell At the impressionable age of 14, William “Bo” Rothwell crossed paths with a TRS-80 Micro Computer System (affectionately known as a “Trash 80”). Soon after the adults responsible for Bo made the mistake of leaving him alone with the TRS-80, he immediately dismantled it and held his first computer class, showing his friends what made this “computer thing” work. Since this experience, Bo’s passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes Linux, Unix, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and president of One Course Source, an IT training organization. Denise Kinsey, Ph.D, CISSP, CISCO Dr. Denise Kinsey served as a Unix administrator (HP-UX) in the late 1990s and realized the power and flexibility of the operating system. This appreciation led to her home installation of different flavors of Linux and creation of several academic courses in Linux. With a strong background in cybersecurity, she works to share and implement best practices with her customers and students. Dr. Kinsey is an assistant professor at the University of Houston.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List