Linux Essentials for Cybersecurity Pearson uCertify

Gain hands-on expertise in Linux essentials for cybersecurity with the Linux Essentials for Cybersecurity course and performance-based labs. Performance-based labs simulate real-world, hardware, software and command line interface environments and can be mapped to any text-book, course and training. The complete cert guide provides knowledge and skills in managing local storage, group and user accounts; working on the command line, editing files, and many more.

Here's what you will get

Lessons
Lessons
37+
Quizzes
216+
Flashcards
307+
Glossary of terms
309+
Test prep
Pre-assessment Questions
100+
Post-Assessment Questions
101+
Lab
Performance lab
Learn the real world skills using Live Labs.
70+
Video Tutorials
Video tutorials
216+

Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Video Lessons
Videos
216+
Hours
13:01+

Here's what you will learn

  • Introducing Linux
  • Linux Distributions
  • Installing Linux
  • Summary
  • File Management
  • Shell Features
  • Advanced Commands
  • Summary
  • Man Pages
  • Command Help Options
  • The help Command
  • The info Command
  • The /usr/share/doc Directory
  • Internet Resources
  • Summary
  • The vi Editor
  • Additional Editors
  • Summary
  • The Science of Troubleshooting
  • Notifying Users
  • Summary
  • What Are Groups Used For?
  • Managing Groups
  • Summary
  • The Importance of User Accounts
  • Managing Users
  • Network-Based User Accounts
  • Using su and sudo
  • Restricting User Accounts
  • Summary
  • Introducing Kali Linux
  • Security Principles
  • Creating a Security Policy
  • Securing Accounts
  • Security Tools
  • Summary
  • Standard Permissions
  • Default Permissions
  • Special Permissions
  • Access Control Lists (ACLs)
  • Changing Ownership
  • File Attributes
  • Introduction to SELinux
  • Summary
  • Filesystem Essentials
  • Filesystem Types
  • Additional Filesystem Tools
  • Mounting Filesystems
  • Summary
  • Encrypted Filesystems
  • Managing autofs
  • Logical Volume Manager
  • Disk Quotas
  • Hard and Soft Links
  • Summary
  • Samba
  • Network File System
  • Summary
  • Developing the Plan
  • Backing Up Data
  • Summary
  • Using crontab
  • Using at
  • Summary
  • Linux Programming
  • Basics of BASH Scripting
  • Flow Control Statements
  • User Interaction
  • Using Command Substitution
  • Additional Information
  • Summary
  • Exploring Scripts that Already Exist on Your System
  • Creating Your Own Automation Scripts
  • Summary
  • Securing crontab and at
  • Securing BASH Scripts
  • Summary
  • Network Terminology
  • IPv4 Versus IPv6
  • IPv4 Addresses
  • Common Protocol Suites
  • Network Ports
  • Summary
  • Ethernet Network Interfaces
  • Persistent Network Configurations
  • Network Troubleshooting Commands
  • Access to Wireless Networks
  • Summary
  • DNS Servers
  • Zone Files
  • Securing BIND
  • DHCP Server
  • Email Servers
  • Managing Local Email Delivery
  • Remote Email Delivery
  • Summary
  • Apache Web Server
  • Basic Apache Web Server Configuration
  • Apache Web Server Security
  • Virtual Hosts
  • HTTPS
  • SSL and Apache
  • Proxy Servers
  • Summary
  • LDAP
  • FTP Servers
  • Secure Shell
  • Summary
  • Kernel Parameters
  • TCP Wrappers
  • Network Time Protocol
  • Summary
  • Viewing Processes
  • Running Processes
  • Killing Process
  • The nohup Command
  • Process Priority
  • Summary
  • Syslog
  • The logrotate Command
  • The journalctl Command
  • Summary
  • Red Hat Packages
  • Using the rpm Command
  • The yum Command
  • Additional Tools
  • Summary
  • Managing Packages with dpkg
  • Managing Packages with APT
  • Listing Package Information with APT Commands
  • Summary
  • Phases of the Boot Process
  • GRUB
  • Kernel Components
  • The init Phase
  • Summary
  • Ensuring Software Security
  • xinetd
  • Summary
  • Understanding Footprinting
  • Common Footprinting Tools
  • Kali Linux Utilities
  • Summary
  • Introduction to Firewalls
  • Essentials of the iptables Command
  • Using iptables to Filter Incoming Packets
  • Using iptables to Filter Outgoing Packets
  • Implementing NAT
  • Summary
  • Introduction to Intrusion Detection Tools
  • Intrusion Detection Network Tools
  • Intrusion Detection File Tools
  • Additional Intrusion Detection Tools
  • Summary
  • The fail2ban Service
  • OpenVPN
  • gpg
  • Security Alert Services
  • Summary
  • Lesson 1: Performing Basic Tasks from a shell Environment
  • Lesson 2: Processing and Working with text files
  • Lesson 3: Performing Base File Management Task
  • Lesson 4: Managing Processes
  • Lesson 5: Design Hard Disk Layout
  • Lesson 6: Creating Partitions and Filesystems
  • Lesson 7: Common Filesystem Management Tasks
  • Lesson 8: Managing Permissions
  • Lesson 9: Managing Software
  • Lesson 10: System Architecture
  • Lesson 11: Boot the System
  • Lesson 12: Managing the Boot Sequence
  • Lesson 13: Install a Boot Manager
  • Lesson 14: Managing shared Libraries
  • Lesson 1: Using and Customizing the Shell Environment
  • Lesson 2: Managing Printing
  • Lesson 3: Managing User and Groups Accounts
  • Lesson 4: Configuring Security
  • Lesson 5: Scheduling Jobs
  • Lesson 6: Maintaining System Time
  • Lesson 7: Configuring System Logging
  • Lesson 8: Configuring Networking
  • Lesson 9: Managing MTA Basics
  • Lesson 10: Using SSH
  • Lesson 11: Customizing and Writing Shell Scripts
  • Lesson 12: Accessibility and Internationalization
  • Lesson 13: SQL Data Management
  • Lesson 14: Managing User Interfaces and Desktops

Hands on Activities (Labs)

  • Installing Kali Linux  
  • Installing Ubuntu
  • Installing CentOS
  • Managing Files using Command Line
  • Using Shell Features
  • Compressing Files
  • Getting Help using man Command
  • Getting Help using info Command
  • Editing Files using the Vim Editor
  • Troubleshooting Linux Issues
  • Configuring User Notifications
  • Managing Group Accounts
  • Managing Group Administrators
  • Managing User Accounts
  • Securing User Accounts
  • Configuring sudo
  • Developing an Account Security Policy
  • Testing the Security of Accounts
  • Managing File Permissions
  • Managing Special Permissions
  • Enabling Access Control Lists
  • Managing File Ownership and Attributes
  • Monitoring Security Issues with SELinux
  • Creating Partitions and Filesystems
  • Mounting Filesystems at Boot
  • Managing Swap Devices
  • Managing Encrypted Filesystems
  • Managing Hard and Soft Links
  • Configuring Samba
  • Administering NFS
  • Backing Up a Filesystem
  • Developing a Backup Security Policy
  • Managing crontab
  • Configuring at Commands
  • Bash shell script for system info
  • Bash shell script for validating user input
  • Script to Perform System Check
  • Script That Will Back Up All The Files
  • Securing crontab and at
  • Creating an Automation Security Policy
  • Standard Ports for the Protocols
  • Understanding Network Configuration on CentOS
  • Understanding Network Configuration on Ubuntu
  • Configuring a BIND Server
  • Configuring a Postfix Server
  • Configuring and Administering an Apache Server
  • Configuring a Proxy Server
  • Configuring an FTP Server
  • Administering an SSH Server
  • Administering Kernel Security Parameters
  • Securing a System with TCP Wrappers
  • Configuring Network Time Protocol
  • Creating a Networking Security Policy
  • Managing System Processes
  • Displaying System Information
  • Managing Log Files
  • Configuring Log Rotation
  • Managing Software Packages with rpm 
  • Managing Software Packages with yum
  • Managing Software Packages with dpkg  
  • Configuring GRUB Security
  • Managing the Startup Process
  • Exploring Common Vulnerabilities and Exposure Reports
  • Managing and Securing Legacy Services
  • Using Probing Tools
  • Scanning the Network
  • Configuring Linux Firewall using iptable   
  • Examining an Intrusion Detection Security Policy 
  • Configuring fail2ban
  • Encrypting Files with gpg
Pearson-linux-ess-cybersec-complete Pearson-linux-ess-cybersec-complete
Pearson-linux-ess-cybersec-complete
Linux Essentials for Cybersecurity Pearson uCertify
ISBN : 9781644590362
Rating :
(16)