Linux distributions are widely used by technical professionals to support mission-critical applications and manage crucial data. But safeguarding Linux systems can be complex, and many guides to Linux usage and certification provide only superficial coverage of security. Linux Essentials for Cybersecurity is the solution. Part of the new Pearson IT Cybersecurity Curriculum (ITCC), it introduces Linux with the primary goal of enforcing and troubleshooting security. Leading Linux certification and security experts William “Bo” Rothwell and Denise Pheils, PhD offer a layered approach to security that helps readers protect their Linux systems even if one or more layers are penetrated. Rothwell and Pheils show how to install Linux to achieve optimal security right from the outset, even if you have no experience with Linux at all. Next the authors present best practices for the secure day-to-day administration of accounts, devices, services, processes, data, networks, and more. To increase readers’ sophistication in defending Linux systems, the authors also walk through the use of powerful tools and automated scripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more. Finally, to help readers earn certification and demonstrate their abilities, the authors cover many key topics found on the CompTIA Linux+ and LPIC-1 certification exams.
This guide’s features include:
- Logical organisation designed for easy understanding, effective classroom use, and rapid on-the-job-training
- Strong emphasis on modern real-world security troubleshooting techniques throughout -- not just in separate sections
- Real-world examples and step-by-step activities that permit hands-on practice without expensive equipment
- Key terms, chapter objectives, review questions, and more
Table of Contents:
- Introduction
- Part I: Introducing Linux
- 1. Distributions and Key Components
- 2. Working on the Command Line
- 3. Getting Help
- 4. Editing Files
- 5. When Things Go Wrong
- Part II: User and Group Accounts
- 6. Managing Group Accounts
- 7. Managing User Accounts
- 8. Developing an Account Security Policy
- Part III: File and Data Storage
- 9. File Permissions
- 10. Managing Local Storage
- 11. Managing Network Storage
- 12. Developing a Storage Security Policy
- Part IV: Automation
- 13. Crontab and at
- 14. Scripting
- 15. Common Automation Tasks
- 16. Developing an Automation Security Policy
- Part V: Networking
- 17. Networking Basics
- 18. Network Configuration
- 19. Network Service Configuration
- 20. Connecting to Remote Systems
- 21. Developing a Network Security Policy
- Part VI: Process and Log Administration
- 22. Process Control
- 23. System Logging
- 24. Developing a Process and Log Security Policy
- Part VII: Software Management
- 25. Red Hat-based Software Management
- 26. Debian-based Software Management
- 27. Additional Management Tools
- 28. System Booting
- 29. Developing a Software Management Security Policy
- Part VIII: Security Tasks
- 30. Footprinting
- 31. Firewalls
- 32. Intrusion Detection Systems
- 33. Additional Security Tasks
- Appendix A. Resource Guide
- Glossary
About the Author :
William “Bo” Rothwell At the impressionable age of 14, William “Bo” Rothwell crossed paths with a TRS-80 Micro Computer System (affectionately known as a “Trash 80”). Soon after the adults responsible for Bo made the mistake of leaving him alone with the TRS-80, he immediately dismantled it and held his first computer class, showing his friends what made this “computer thing” work.
Since this experience, Bo’s passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes Linux, Unix, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and president of One Course Source, an IT training organization.
Denise Kinsey, Ph.D, CISSP, CISCO Dr. Denise Kinsey served as a Unix administrator (HP-UX) in the late 1990s and realized the power and flexibility of the operating system. This appreciation led to her home installation of different flavors of Linux and creation of several academic courses in Linux. With a strong background in cybersecurity, she works to share and implement best practices with her customers and students. Dr. Kinsey is an assistant professor at the University of Houston.