Linux Essentials for Cybersecurity Lab Manual

E-book Engels 2018 9780135305195
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This lab manual accompanies the textbook Linux Essentials for Cybersecurity, which teaches people how to use Linux systems and ensures that the Linux systems they work on are as secure as possible.

To really become a Linux cybersecurity expert, you need practice.

In this book, there are three different types of labs to practice your skills: Labs in which you are presented with a short problem that requires only a single operation to complete. Labs that are more complex but in which we provide you with a guide to perform each step, one at a time. Scenario labs in which you are asked to solve a problem entirely on your own. These labs are designed to pose a greater challenge.

No matter the type, these labs are designed to be performed on live Linux systems to give you hands-on practice and develop critical thinking and complex problem-solving skills.
    

Specificaties

ISBN13:9780135305195
Taal:Engels
Bindwijze:e-book

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<div> Introduction xiv <br>Part I Introducing Linux <br>&nbsp;&nbsp;&nbsp; Chapter 1 Distributions and Key Components 2 <br>&nbsp;&nbsp;&nbsp; Lab 1.1 Installing CentOS 3 <br>&nbsp;&nbsp;&nbsp; Lab 1.2 Installing Ubuntu 4 <br>&nbsp;&nbsp;&nbsp; Lab 1.3 Installing Kali 6 <br>Chapter 2 Working on the Command Line 8 <br>&nbsp;&nbsp;&nbsp; Lab 2.1 Manage Files 9 <br>&nbsp;&nbsp;&nbsp; Lab 2.2 Using Shell Features 10 <br>&nbsp;&nbsp;&nbsp; Lab 2.3 Compressing Files 11 <br>Chapter 3 Getting Help 14 <br>&nbsp;&nbsp;&nbsp; Lab 3.1 Getting Help with man 15 <br>&nbsp;&nbsp;&nbsp; Lab 3.2 Getting Help with info 16 <br>Chapter 4 Editing Files 18 <br>&nbsp;&nbsp;&nbsp; Lab 4.1 Editing Files with the vim Editor 19 <br>Chapter 5 When Things Go Wrong 22 <br>&nbsp;&nbsp;&nbsp; Lab 5.1 Troubleshooting Linux Issues 23 <br>&nbsp;&nbsp;&nbsp; Lab 5.2 Configuring User Notifications 24 <br>Part II User and Group Accounts <br>Chapter 6 Managing Group Accounts 26 <br>&nbsp;&nbsp;&nbsp; Lab 6.1 Managing Group Accounts 27 <br>&nbsp;&nbsp;&nbsp; Lab 6.2 Managing Group Administrators 28 <br>Chapter 7 Managing User Accounts 30 <br>&nbsp;&nbsp;&nbsp; Lab 7.1 Managing User Accounts 31 <br>&nbsp;&nbsp;&nbsp; Lab 7.2 Securing User Accounts 31 <br>&nbsp;&nbsp;&nbsp; Lab 7.3 Configuring sudo 33 <br>Chapter 8 Develop an Account Security Policy 34 <br>&nbsp;&nbsp;&nbsp; Lab 8.1 Testing the Security of Accounts 35 <br>&nbsp;&nbsp;&nbsp; Lab 8.2 Developing an Account Security Policy 36 <br>Part III File and Data Storage <br>Chapter 9 File Permissions 38 <br>&nbsp;&nbsp;&nbsp; Lab 9.1 Managing File Permissions 39 <br>&nbsp;&nbsp;&nbsp; Lab 9.2 Managing Special Permissions 40 <br>&nbsp;&nbsp;&nbsp; Lab 9.3 Enabling Access Control Lists 41 <br>&nbsp;&nbsp;&nbsp; Lab 9.4 Managing File Ownership and Attributes 41 <br>&nbsp;&nbsp;&nbsp; Lab 9.5 Monitoring Security Issues with SELinux 42 <br>Chapter 10 Manage Local Storage: Essentials 44 <br>&nbsp;&nbsp;&nbsp; Lab 10.1 Creating Partitions and Filesystems 45 <br>&nbsp;&nbsp;&nbsp; Lab 10.2 Mounting Filesystems at Boot 48 <br>&nbsp;&nbsp;&nbsp; Lab 10.3 Managing Swap Devices 49 <br>Chapter 11 Manage Local Storage: Advanced Features 50 <br>&nbsp;&nbsp;&nbsp; Lab 11.1 Managing Encrypted Filesystems 51 <br>&nbsp;&nbsp;&nbsp; Lab 11.2 Configuring Logical Volumes 51 <br>&nbsp;&nbsp;&nbsp; Lab 11.3 Administering Disk Quotas 51 <br>&nbsp;&nbsp;&nbsp; Lab 11.4 Managing Hard and Soft Links 51 <br>Chapter 12 Manage Network Storage 54 <br>&nbsp;&nbsp;&nbsp; Lab 12.1 Configuring Samba 55 <br>&nbsp;&nbsp;&nbsp; Lab 12.2 Administering NFS 57 <br>&nbsp;&nbsp;&nbsp; Lab 12.3 Managing iSCSI 57 <br>Chapter 13 Develop a Storage Security Policy 60 <br>&nbsp;&nbsp;&nbsp; Lab 13.1 Backing Up a Filesystem 61 <br>&nbsp;&nbsp;&nbsp; Lab 13.2 Developing a Backup Security Policy 62 <br>Part IV Automation <br>Chapter 14 Crontab and At 64 <br>&nbsp;&nbsp;&nbsp; Lab 14.1 Managing crontab 65 <br>&nbsp;&nbsp;&nbsp; Lab 14.2 Configuring at Commands 66 <br>Chapter 15 Scripting 68 <br>&nbsp;&nbsp;&nbsp; Lab 15.1 Script Project #1 69 <br>&nbsp;&nbsp;&nbsp; Lab 15.2 Script Project #2 70 <br>Chapter 16 Common Automation Tasks 72 <br>&nbsp;&nbsp;&nbsp; Lab 16.1 Script Project #3 73 <br>&nbsp;&nbsp;&nbsp; Lab 16.2 Script Project #4 74 <br>Chapter 17 Develop an Automation Security Policy 76 <br>&nbsp;&nbsp;&nbsp; Lab 17.1 Securing crontab and at 77 <br>&nbsp;&nbsp;&nbsp; Lab 17.2 Creating an Automation Security Policy 78 <br>Part V Networking <br>Chapter 18 Networking Basics 80 <br>&nbsp;&nbsp;&nbsp; Lab 18.1 Exploring Networking Components 81 <br>Chapter 19 Network Configuration 84 <br>&nbsp;&nbsp;&nbsp; Lab 19.1 Understanding Network Configuration on CentOS 85 <br>&nbsp;&nbsp;&nbsp; Lab 19.2 Understanding Network Configuration on Ubuntu 86 <br>Chapter 20 Network Service Configuration: Essential Services 88 <br>&nbsp;&nbsp;&nbsp; Lab 20.1 Configuring a BIND Server 89 <br>&nbsp;&nbsp;&nbsp; Lab 20.2 Configuring a Postfix Server 90 <br>Chapter 21 Network Service Configuration: Web Services 92 <br>&nbsp;&nbsp;&nbsp; Lab 21.1 Configuring and Administering an Apache Server 93 <br>&nbsp;&nbsp;&nbsp; Lab 21.2 Configuring a Proxy Server 94 <br>Chapter 22 Connecting to Remote Systems 96 <br>&nbsp;&nbsp;&nbsp; Lab 22.1 Configuring an FTP Server 97 <br>&nbsp;&nbsp;&nbsp; Lab 22.2 Administering an SSH Server 98 <br>Chapter 23 Develop a Network Security Policy 100 <br>&nbsp;&nbsp;&nbsp; Lab 23.1 Administering Kernel Security Parameters 101 <br>&nbsp;&nbsp;&nbsp; Lab 23.2 Securing a System with TCP Wrappers 101 <br>&nbsp;&nbsp;&nbsp; Lab 23.3 Configuring Network Time Protocol 102 <br>&nbsp;&nbsp;&nbsp; Lab 23.4 Creating a Networking Security Policy 103 <br>Part VI Process and Log Administration <br>Chapter 24 Process Control 104 <br>&nbsp;&nbsp;&nbsp; Lab 24.1 Managing System Processes 105 <br>&nbsp;&nbsp;&nbsp; Lab 24.2 Displaying System Information 106 <br>Chapter 25 System Logging 108 <br>&nbsp;&nbsp;&nbsp; Lab 25.1 Managing Log Files 109 <br>&nbsp;&nbsp;&nbsp; Lab 25.2 Configuring Log Rotation 110 <br>Part VII Software Management <br>Chapter 26 Red Hat-Based Software Management 112 <br>&nbsp;&nbsp;&nbsp; Lab 26.1 Managing Software Packages with rpm 113 <br>&nbsp;&nbsp;&nbsp; Lab 26.2 Managing Software Packages with yum 113 <br>Chapter 27 Debian-Based Software Management 116 <br>&nbsp;&nbsp;&nbsp; Lab 27.1 Managing Software Packages with dpkg 117 <br>&nbsp;&nbsp;&nbsp; Lab 27.2 Managing Software Packages with apt 117 <br>Chapter 28 System Booting 118 <br>&nbsp;&nbsp;&nbsp; Lab 28.1 Configuring GRUB Security 119 <br>&nbsp;&nbsp;&nbsp; Lab 28.2 Managing the Startup Process 120 <br>Chapter 29 Develop a Software Management Security Policy 122 <br>&nbsp;&nbsp;&nbsp; Lab 29.1 Exploring Common Vulnerabilities and Exposure Reports 123 <br>&nbsp;&nbsp;&nbsp; Lab 29.2 Managing and Securing Legacy Services 124 <br>Part VIII Security Tasks <br>Chapter 30 Footprinting 126 <br>&nbsp;&nbsp;&nbsp; Lab 30.1 Using Probing Tools 127 <br>&nbsp;&nbsp;&nbsp; Lab 30.2 Scanning the Network 127 <br>Chapter 31 Firewalls 130 <br>&nbsp;&nbsp;&nbsp; Lab 31.1 Creating a Firewall to Protect a System 131 <br>Chapter 32 Intrusion Detection 132 <br>&nbsp;&nbsp;&nbsp; Lab 32.1 Creating an Intrusion Detection Security Plan 133 <br>Chapter 33 Additional Security Tasks 134 <br>&nbsp;&nbsp;&nbsp; Lab 33.1 Configuring fail2ban 135 <br>&nbsp;&nbsp;&nbsp; Lab 33.2 Encrypting Files with gpg 136 <br>9780789760555, TOC, 9/6/2018 <br> </div>

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Linux Essentials for Cybersecurity Lab Manual