Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20

Linux Essentials for Cybersecurity Lab Manual

Specificaties
E-book, blz. | Engels
Pearson Education | e druk, 2018
ISBN13: 9780135305188
Rubricering
Juridisch :
Pearson Education e druk, 2018 9780135305188
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Over 75 labs will accompany the textbook developed to be used within the Pearson IT Cybersecurity Curriculum (ITCC). Course 4: Linux Fundamentals for Cybersecurity, which introduces fundamental Linux concepts from proper set-up installation through administration of accounts, devices, services, processes, and functions. This course also covers basic scripting taught to understand tools for Penetration Testing and cybersecurity threat detection.

The full text downloaded to your computer

With eBooks you can: search for key concepts, words and phrases make highlights and notes as you study share your notes with friends

eBooks are downloaded to your computer and accessible either offline through the Bookshelf (available as a free download), available online and also via the iPad and Android apps.

Upon purchase, you will receive via email the code and instructions on how to access this product.

Time limit

The eBooks products do not have an expiry date. You will continue to access your digital ebook products whilst you have your Bookshelf installed.

Specificaties

ISBN13:9780135305188
Taal:Engels
Bindwijze:e-book

Inhoudsopgave

<ul> <li>Part I: Introducing Linux </li> <li>Chapter 1: Distributions and key components </li> <li>Chapter 2: Working on the command line </li> <li>Chapter 3: Getting help </li> <li>Chapter 4: Editing files </li> <li>Chapter 5: When things go wrong </li> <li>Part II: User and group accounts </li> <li>Chapter 6: Managing group accounts </li> <li>Chapter 7: Managing user account </li> <li>Chapter 8: Develop an account security policy </li> <li>Part III: File and data storage </li> <li>Chapter 9: File permissions </li> <li>Chapter 10: Manage local storage: Concepts </li> <li>Chapter 11: Manage local storage: Practical application </li> <li>Chapter 12: Manage network storage </li> <li>Chapter 13: Develop a storage security policy&nbsp; </li> <li>Part IV: Automation </li> <li>Chapter 14: Crontab and at </li> <li>14.1 Manage crontab </li> <li>14.2 Configure at commands </li> <li>Chapter 15: Scripting </li> <li>15.1 Script project #1 </li> <li>15.2 Script project #2 </li> <li>Chapter 16: Common automation tasks </li> <li>15.3 Script project #3 </li> <li>15.4 Script project #4 </li> <li>Chapter 17: Develop an automation security policy </li> <li>17.1 Secure crontab </li> <li>17.2 Create a automation security policy </li> <li><br> </li> <li>Part V: Networking </li> <li>Chapter 18: Networking basics </li> <li>18.1 Explore networking componets </li> <li>Chapter 19: Network configuration </li> <li>19.1 Configure networking on CentOS </li> <li>19.2 Configure networking on Ubuntu" </li> <li>Chapter 20: Network service configuration: Essential services </li> <li>20.1 Configure a BIND server </li> <li>20.2 Configure a Postfix server </li> <li>20.3 Administer procmail and Dovecot </li> <li>Chapter 21: Network service configuration: Web services </li> <li>21.1 Configure and administer an Apache server </li> <li>21.2. Configure a proxy server </li> <li>Chapter 22: Connecting to remote systems </li> <li>22.1 Create an LDAP server </li> <li>22.2 Configure a FTP server </li> <li>22.3 Administer a SSH server </li> <li>Chapter 23: Develop an network security policy </li> <li>23.1 Administer kernel security parameters </li> <li>23.2 Secure the system with TCP Wrappers </li> <li>23.3 Configure Network Time Protocol </li> <li>23.4 Create a networking security policy </li> <li><br> </li> <li>Part VI: Process and log administration </li> <li>Chapter 24: Process control </li> <li>24.1 Manage system processes </li> <li>24.2 Display system information" </li> <li>Chapter 25: System logging </li> <li>25.1 Manage log files </li> <li>25.1 Configure log rotation </li> <li><br> </li> <li>Part VII: Software management </li> <li>Chapter 26: Red Hat-based software management </li> <li>26.1 Manage software packages with rpm </li> <li>26.2 Manage software packages with yum </li> <li>Chapter 27: Debian-based software management </li> <li>27.1 Manage software packages with dpkg </li> <li>27.2 Manage software packages with apt </li> <li>Chapter 28: System booting </li> <li>28.1 Configure GRUB&nbsp; </li> <li>28.2 Manage the startup process </li> <li>Chapter 29: Develop a software management security policy&nbsp; </li> <li>29.1 Explore Common Vulerabilities and Exposure reports </li> <li>29.2 Manage and secure legacy services </li> <li><br> </li> <li>Part VII: Security tasks </li> <li>Chapter 30: Footprinting </li> <li>30.1 Use probing tools </li> <li>30.2 Scan the network </li> <li>Chapter 31: Firewalls </li> <li>31.1 Create a firewall to protect a system </li> <li>31.2 Impliment NAT </li> <li>Chapter 32: Intrusion Detection </li> </ul>

Net verschenen

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Linux Essentials for Cybersecurity Lab Manual