Home > Store

Linux Essentials for Cybersecurity Lab Manual

Linux Essentials for Cybersecurity Lab Manual

eBook (Watermarked)

  • Your Price: $20.40
  • List Price: $24.00
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available in other formats.

Register your product to gain access to bonus material or receive a coupon.

Description

  • Copyright 2019
  • Dimensions: 8" x 10"
  • Pages: 300
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-530520-9
  • ISBN-13: 978-0-13-530520-1

This lab manual accompanies the textbook Linux Essentials for Cybersecurity, which teaches people how to use Linux systems and ensures that the Linux systems they work on are as secure as possible.


To really become a Linux cybersecurity expert, you need practice.


In this book, there are three different types of labs to practice your skills:

  • Labs in which you are presented with a short problem that requires only a single operation to complete.
  • Labs that are more complex but in which we provide you with a guide to perform each step, one at a time.
  • Scenario labs in which you are asked to solve a problem entirely on your own. These labs are designed to pose a greater challenge.

No matter the type, these labs are designed to be performed on live Linux systems to give you hands-on practice and develop critical thinking and complex problem-solving skills.
    

Sample Content

Table of Contents

Introduction xiv
Part I Introducing Linux
    Chapter 1 Distributions and Key Components 2
    Lab 1.1 Installing CentOS 3
    Lab 1.2 Installing Ubuntu 4
    Lab 1.3 Installing Kali 6
Chapter 2 Working on the Command Line 8
    Lab 2.1 Manage Files 9
    Lab 2.2 Using Shell Features 10
    Lab 2.3 Compressing Files 11
Chapter 3 Getting Help 14
    Lab 3.1 Getting Help with man 15
    Lab 3.2 Getting Help with info 16
Chapter 4 Editing Files 18
    Lab 4.1 Editing Files with the vim Editor 19
Chapter 5 When Things Go Wrong 22
    Lab 5.1 Troubleshooting Linux Issues 23
    Lab 5.2 Configuring User Notifications 24
Part II User and Group Accounts
Chapter 6 Managing Group Accounts 26
    Lab 6.1 Managing Group Accounts 27
    Lab 6.2 Managing Group Administrators 28
Chapter 7 Managing User Accounts 30
    Lab 7.1 Managing User Accounts 31
    Lab 7.2 Securing User Accounts 31
    Lab 7.3 Configuring sudo 33
Chapter 8 Develop an Account Security Policy 34
    Lab 8.1 Testing the Security of Accounts 35
    Lab 8.2 Developing an Account Security Policy 36
Part III File and Data Storage
Chapter 9 File Permissions 38
    Lab 9.1 Managing File Permissions 39
    Lab 9.2 Managing Special Permissions 40
    Lab 9.3 Enabling Access Control Lists 41
    Lab 9.4 Managing File Ownership and Attributes 41
    Lab 9.5 Monitoring Security Issues with SELinux 42
Chapter 10 Manage Local Storage: Essentials 44
    Lab 10.1 Creating Partitions and Filesystems 45
    Lab 10.2 Mounting Filesystems at Boot 48
    Lab 10.3 Managing Swap Devices 49
Chapter 11 Manage Local Storage: Advanced Features 50
    Lab 11.1 Managing Encrypted Filesystems 51
    Lab 11.2 Configuring Logical Volumes 51
    Lab 11.3 Administering Disk Quotas 51
    Lab 11.4 Managing Hard and Soft Links 51
Chapter 12 Manage Network Storage 54
    Lab 12.1 Configuring Samba 55
    Lab 12.2 Administering NFS 57
    Lab 12.3 Managing iSCSI 57
Chapter 13 Develop a Storage Security Policy 60
    Lab 13.1 Backing Up a Filesystem 61
    Lab 13.2 Developing a Backup Security Policy 62
Part IV Automation
Chapter 14 Crontab and At 64
    Lab 14.1 Managing crontab 65
    Lab 14.2 Configuring at Commands 66
Chapter 15 Scripting 68
    Lab 15.1 Script Project #1 69
    Lab 15.2 Script Project #2 70
Chapter 16 Common Automation Tasks 72
    Lab 16.1 Script Project #3 73
    Lab 16.2 Script Project #4 74
Chapter 17 Develop an Automation Security Policy 76
    Lab 17.1 Securing crontab and at 77
    Lab 17.2 Creating an Automation Security Policy 78
Part V Networking
Chapter 18 Networking Basics 80
    Lab 18.1 Exploring Networking Components 81
Chapter 19 Network Configuration 84
    Lab 19.1 Understanding Network Configuration on CentOS 85
    Lab 19.2 Understanding Network Configuration on Ubuntu 86
Chapter 20 Network Service Configuration: Essential Services 88
    Lab 20.1 Configuring a BIND Server 89
    Lab 20.2 Configuring a Postfix Server 90
Chapter 21 Network Service Configuration: Web Services 92
    Lab 21.1 Configuring and Administering an Apache Server 93
    Lab 21.2 Configuring a Proxy Server 94
Chapter 22 Connecting to Remote Systems 96
    Lab 22.1 Configuring an FTP Server 97
    Lab 22.2 Administering an SSH Server 98
Chapter 23 Develop a Network Security Policy 100
    Lab 23.1 Administering Kernel Security Parameters 101
    Lab 23.2 Securing a System with TCP Wrappers 101
    Lab 23.3 Configuring Network Time Protocol 102
    Lab 23.4 Creating a Networking Security Policy 103
Part VI Process and Log Administration
Chapter 24 Process Control 104
    Lab 24.1 Managing System Processes 105
    Lab 24.2 Displaying System Information 106
Chapter 25 System Logging 108
    Lab 25.1 Managing Log Files 109
    Lab 25.2 Configuring Log Rotation 110
Part VII Software Management
Chapter 26 Red Hat-Based Software Management 112
    Lab 26.1 Managing Software Packages with rpm 113
    Lab 26.2 Managing Software Packages with yum 113
Chapter 27 Debian-Based Software Management 116
    Lab 27.1 Managing Software Packages with dpkg 117
    Lab 27.2 Managing Software Packages with apt 117
Chapter 28 System Booting 118
    Lab 28.1 Configuring GRUB Security 119
    Lab 28.2 Managing the Startup Process 120
Chapter 29 Develop a Software Management Security Policy 122
    Lab 29.1 Exploring Common Vulnerabilities and Exposure Reports 123
    Lab 29.2 Managing and Securing Legacy Services 124
Part VIII Security Tasks
Chapter 30 Footprinting 126
    Lab 30.1 Using Probing Tools 127
    Lab 30.2 Scanning the Network 127
Chapter 31 Firewalls 130
    Lab 31.1 Creating a Firewall to Protect a System 131
Chapter 32 Intrusion Detection 132
    Lab 32.1 Creating an Intrusion Detection Security Plan 133
Chapter 33 Additional Security Tasks 134
    Lab 33.1 Configuring fail2ban 135
    Lab 33.2 Encrypting Files with gpg 136
9780789760555, TOC, 9/6/2018

Updates

Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership