CHF64.90
Download steht sofort bereit
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA-IN ONE BOOK
From the basics to advanced techniques: no Linux security experience necessary Realistic examples & step-by-step activities: practice hands-on without costly equipment The perfect introduction to Linux-based security for all students and IT professionals
Linux distributions are widely used to support mission-critical applications and manage crucial data. But safeguarding modern Linux systems is complex, and many Linux books have inadequate or outdated security coverage.
Linux Essentials for Cybersecurity is your complete solution. Leading Linux certification and security experts William "Bo" Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of enforcing and troubleshooting security. Their practical approach will help you protect systems, even if one or more layers are penetrated.
First, you'll learn how to install Linux to achieve optimal security upfront, even if you have no Linux experience. Next, you'll master best practices for securely administering accounts, devices, services, processes, data, and networks. Then, you'll master powerful tools and automated scripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more.
To help you earn certification and demonstrate skills, this guide covers many key topics on CompTIA Linux+ and LPIC-1 exams. Everything is organized clearly and logically for easy understanding, effective classroom use, and rapid on-the-job training.
LEARN HOW TO:
Autorentext
William "Bo" Rothwell At the impressionable age of 14, William "Bo" Rothwell crossed paths with a TRS-80 Micro Computer System (affectionately known as a "Trash 80"). Soon after the adults responsible for Bo made the mistake of leaving him alone with the TRS-80, he immediately dismantled it and held his first computer class, showing his friends what made this "computer thing" work.
Since this experience, Bo's passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes Linux, Unix, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and president of One Course Source, an IT training organization.
Denise Kinsey, Ph.D, CISSP, CISCO Dr. Denise Kinsey served as a Unix administrator (HP-UX) in the late 1990s and realized the power and flexibility of the operating system. This appreciation led to her home installation of different flavors of Linux and creation of several academic courses in Linux. With a strong background in cybersecurity, she works to share and implement best practices with her customers and students. Dr. Kinsey is an assistant professor at the University of Houston.
Inhalt
Introduction xxix Part I: Introducing Linux 2 Chapter 1 Distributions and Key Components 4 Introducing Linux 4 Linux Distributions 5 Shells 6 GUI Software 7 Installing Linux 7 Which Distro? 8 Native or Virtual Machine? 9 Installing a Distro 10 Summary 12 Key Terms 12 Review Questions 12 Chapter 2 Working on the Command Line 14 File Management 14 The Linux Filesystem 14 Command Execution 16 The pwd Command 16 The cd Command 16 The ls Command 17 File Globbing 18 The file Command 19 The less Command 19 The head Command 19 The tail Command 20 The mdkir Command 20 The cp Command 20 The mv Command 21 The rm Command 21 The rmdir Command 22 The touch Command 22 Shell Features 22 Shell Variables 22 Initialization Files 27 Alias 28 Command History 29 Redirecting Input and Output 30 Advanced Commands 33 The find Command 33 Regular Expressions 35 The grep Command 36 The sed Command 37 Compression Commands 38 Summary 40 Key Terms 40 Review Questions 41 Chapter 3 Getting Help 42 Man Pages 42 Man Page Components 42 Man Page Sections 43 Man Page Locations 46 Command Help Options 46 The help Command 46 The info Command 47 The /usr/share/doc Directory 48 Internet Resources 49 Summary 50 Key terms 50 Review Questions 51 Chapter 4 Editing Files 52 The vi Editor 52 What Is vim? 53 Essential vi Commands 54 Use Basic vi Modes 54 Entering the Insert Mode 55 Movement Commands 56 Repeater Modifiers 57 Undoing 57 Copying, Deleting, and Pasting 58 Finding Text 59 Find and Replace 60 Saving and Quitting 61 Expand Your vi Knowledge 62 Additional Editors 63 Emacs 63 gedit and kwrite 65 nano and joe 65 lime and bluefish 65 Summary 66 Key Terms 66 Review Questions 66 Chapter 5 When Things Go Wrong 68 The Science of Troubleshooting 68 Step 1: Gathering Information 69 Step 2: Determine the Likely Cause 70 Step 3: Document Your Plan of Attack (POA) 71 Step 4: Perform the Actions 71 Steps 5 and 6: Is the Problem Solved? 71 Step 7: Are There Other Problems? 71 Step 8: Store the Documentation 72 Step 9: Prevent Future Problems 72 Notifying Users 72 Pre- and Post-login Messages 72 Broadcasting Messages 77 Summary 79 Review Questions 79 Part II: User and Group Accounts 80 Chapter 6 Managing Group Accounts 82 What Are Groups Used For? 82 Primary versus Secondary Groups 82 The /etc/group File 84 Special Groups 85 User Private Groups 86 The /etc/gshadow File 88 Managing Groups 90 Creating Groups 90 Modifying Groups 91 Deleting Groups 91 Adding Users to Groups 92 Group Administrators 93 Summary 93 Key Terms 93 Review Questions 94 Chapter 7 Managing User Accounts 96 The Importance of User Accounts 96 User Account Information 96 The /etc/passwd File 97 Special Users 98 The /etc/shadow File 99 Managing Users 102 Creating Users 102 Modifying Users 105 Managing GECOS 105 Deleting Users 107 Restricted Shell Accounts 107 Network-Based User Accounts 108 Using su and sudo 108 Restricting User Accounts 111 Summary 116 Key Terms 116 Review Questions 117 Chapter 8 Develop an Account Security Policy 118 Introducing Kali Linux 118 Security Principles 119 Creating a Security Policy 120 Securing Accounts 120 Physical Security 120 Educating Users 121 Account Security 121 Security Tools 124 The john and Johnny Tools 124 The hydra tool 125 Summary 126 Review Questions 126 Part III File and Data Storage 128 Chapter 9 File Permissions 130 Standard Permissions 130 Viewing Permissions 130 Files Versus Directories 131 Changing Permissions 131 Default Permissions 132 Special Permissions 134 SUID 134 SGID 136 Sticky Bit 138 Access Control Lists (ACLs) 139 The mask Value 141 Default ACLs 141 Changing Ownership 143 chown 143 chgrp 144 File Attributes 145 Introduction to SELinux 146 Users Create Security Holes 146 Daemon Processes Create Security Holes 146 SELinux Essentials 147 Summary 149 Key Terms 150 Review Questions 150 Chapter 10 Manage Local Storage: Essentials 152 Filesystem Essentials 152 Partitions 152 Filesystems 153 Why So Many Partitions/Filesystems? 154 Which Partitions/Filesystems Should Be Created? 155 Filesystem Types 155 Managing Partitions 156 Ext-Based Filesystem Tools 161 Xfs-B…