• 0 Vote(s) - 0 Average


Linux Essentials For Cybersecurity
1
[Image: Linux-Essentials-for-Cybersecurity.jpg]

Copyright 2019
Price: $64.00
Pages: 704
Edition: 1st
By: William Rothwell, Denise Kinsey
Published: Jul 26, 2018 by Pearson IT Certification
ISBN-10: 0-13-485302-4
ISBN-13: 978-0-13-485302-4

ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA–IN ONE BOOK

From the basics to advanced techniques: no Linux security experience necessary
Realistic examples & step-by-step activities: practice hands-on without costly equipment
The perfect introduction to Linux-based security for all students and IT professionals

Linux distributions are widely used to support mission-critical applications and manage crucial data. But safeguarding modern Linux systems is complex, and many Linux books have inadequate or outdated security coverage.

Linux Essentials for Cybersecurity is your complete solution. Leading Linux certification and security experts William “Bo” Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of enforcing and troubleshooting security. Their practical approach will help you protect systems, even if one or more layers are penetrated.

First, you’ll learn how to install Linux to achieve optimal security upfront, even if you have no Linux experience. Next, you’ll master best practices for securely administering accounts, devices, services, processes, data, and networks. Then, you’ll master powerful tools and automated scripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more.

To help you earn certification and demonstrate skills, this guide covers many key topics on CompTIA Linux+ and LPIC-1 exams. Everything is organized clearly and logically for easy understanding, effective classroom use, and rapid on-the-job training.

LEARN HOW TO:

Review Linux operating system components from the standpoint of security
Master key commands, tools, and skills for securing Linux systems
Troubleshoot common Linux security problems, one step at a time
Protect user and group accounts with Pluggable Authentication
Modules (PAM), SELinux, passwords, and policies
Safeguard files and directories with permissions and attributes
Create, manage, and protect storage devices: both local and networked
Automate system security 24/7 by writing and scheduling scripts
Maintain network services, encrypt network connections, and secure network-accessible processes
Examine which processes are running–and which may represent a threat
Use system logs to pinpoint potential vulnerabilities
Keep Linux up-to-date with Red Hat or Debian software management tools
Modify boot processes to harden security
Master advanced techniques for gathering system information
Download


Hidden Content
You must register or login to view this content.



You Can Earn Points by posting  New thread = 5 Points.
Make Sure to read General posting rules and Forum Rules before posting to avoid getting banned

Optional: You can also Purchase Points and have all content unlocked.


This post was last modified: 12-30-2018, 07:21 AM by NIMOCCIE.

Reply





Forum Jump:


Users browsing this thread:
1 Guest(s)


Copyright © ITStudyGroup.org 2015-2019

ITStudyGroup.org is not sponsored by, endorsed by or affiliated with Cisco Systems, Inc. Cisco®, Cisco Systems®, CCDA™, CCNA™, CCDP™, CCNP™, CCIE™ the Cisco Systems logo and the CCIE logo are trademarks or registered trademarks of Cisco Systems, Inc. All other trademarks, including those of Microsoft, CompTIA, VMware, Juniper ISC(2), and CWNP are trademarks of their respective owners.