Premium Features

Previous Buy now to get complete version Next
  • Home
uCertify Logo
  • login
  • Signup
    • Help & Support
    • Accessibility
    • Testimonials
  • Hello GuestLogin or Signup
  • Feedback & Support
    • Support
    • Keyboard Shortcuts
    • Send Feedback
Scroll to top button

Linux Essentials for Cybersecurity

(Pearson-linux-ess-cybersec-complete) / ISBN: 978-1-64459-036-2
This course includes
Lessons
TestPrep
LiveLab
Video Lessons (Add-on)
Mentoring (Add-on)
Pearson-linux-ess-cybersec-complete : Linux Essentials for Cybersecurity
1 Review
Try this course No credit card required
Are you an instructor? Teach using uCertify products
Request a free evaluation copy

Linux Essentials for Cybersecurity

Gain hands-on expertise on the Linux cybersecurity principles with the Linux Essentials for Cybersecurity course and lab to gain the hands-on expertise required to understand the Linux cybersecurity principles. The lab is cloud-based, device-enabled, and can easily be integrated with an LMS. The Linux training course and lab provide knowledge and skills in managing local storage, group, and user accounts; working on the command line, editing files, developing a storage security policy, and more.
Here's what you will get

Lessons
  • 37+ Lessons
  • 216+ Quizzes
  • 288+ Flashcards
  • 290+ Glossary of terms
TestPrep
  • 100+ Pre Assessment Questions
  • 101+ Post Assessment Questions
LiveLab
  • 70+ LiveLab
Video Tutorials (Add-on)
  • 216+ Video tutorials
Here's what you will learn
Download Course Outline
Lesson 1: Introduction
Lesson 2: Distributions and Key Components
  • Introducing Linux
  • Linux Distributions
  • Installing Linux
  • Summary
Lesson 3: Working on the Command Line
  • File Management
  • Shell Features
  • Advanced Commands
  • Summary
Lesson 4: Getting Help
  • Man Pages
  • Command Help Options
  • The help Command
  • The info Command
  • The /usr/share/doc Directory
  • Internet Resources
  • Summary
Lesson 5: Editing Files
  • The vi Editor
  • Additional Editors
  • Summary
Lesson 6: When Things Go Wrong
  • The Science of Troubleshooting
  • Notifying Users
  • Summary
Lesson 7: Managing Group Accounts
  • What Are Groups Used For?
  • Managing Groups
  • Summary
Lesson 8: Managing User Accounts
  • The Importance of User Accounts
  • Managing Users
  • Network-Based User Accounts
  • Using su and sudo
  • Restricting User Accounts
  • Summary
Lesson 9: Develop an Account Security Policy
  • Introducing Kali Linux
  • Security Principles
  • Creating a Security Policy
  • Securing Accounts
  • Security Tools
  • Summary
Lesson 10: File Permissions
  • Standard Permissions
  • Default Permissions
  • Special Permissions
  • Access Control Lists (ACLs)
  • Changing Ownership
  • File Attributes
  • Introduction to SELinux
  • Summary
Lesson 11: Manage Local Storage: Essentials
  • Filesystem Essentials
  • Filesystem Types
  • Additional Filesystem Tools
  • Mounting Filesystems
  • Summary
Lesson 12: Manage Local Storage: Advanced Features
  • Encrypted Filesystems
  • Managing autofs
  • Logical Volume Manager
  • Disk Quotas
  • Hard and Soft Links
  • Summary
Lesson 13: Manage Network Storage
  • Samba
  • Network File System
  • Summary
Lesson 14: Develop a Storage Security Policy
  • Developing the Plan
  • Backing Up Data
  • Summary
Lesson 15: crontab and at
  • Using crontab
  • Using at
  • Summary
Lesson 16: Scripting
  • Linux Programming
  • Basics of BASH Scripting
  • Flow Control Statements
  • User Interaction
  • Using Command Substitution
  • Additional Information
  • Summary
Lesson 17: Common Automation Tasks
  • Exploring Scripts that Already Exist on Your System
  • Creating Your Own Automation Scripts
  • Summary
Lesson 18: Develop an Automation Security Policy
  • Securing crontab and at
  • Securing BASH Scripts
  • Summary
Lesson 19: Networking Basics
  • Network Terminology
  • IPv4 Versus IPv6
  • IPv4 Addresses
  • Common Protocol Suites
  • Network Ports
  • Summary
Lesson 20: Network Configuration
  • Ethernet Network Interfaces
  • Persistent Network Configurations
  • Network Troubleshooting Commands
  • Access to Wireless Networks
  • Summary
Lesson 21: Network Service Configuration: Essential Services
  • DNS Servers
  • Zone Files
  • Securing BIND
  • DHCP Server
  • Email Servers
  • Managing Local Email Delivery
  • Remote Email Delivery
  • Summary
Lesson 22: Network Service Configuration: Web Services
  • Apache Web Server
  • Basic Apache Web Server Configuration
  • Apache Web Server Security
  • Virtual Hosts
  • HTTPS
  • SSL and Apache
  • Proxy Servers
  • Summary
Lesson 23: Connecting to Remote Systems
  • LDAP
  • FTP Servers
  • Secure Shell
  • Summary
Lesson 24: Develop a Network Security Policy
  • Kernel Parameters
  • TCP Wrappers
  • Network Time Protocol
  • Summary
Lesson 25: Process Control
  • Viewing Processes
  • Running Processes
  • Killing Process
  • The nohup Command
  • Process Priority
  • Summary
Lesson 26: System Logging
  • Syslog
  • The logrotate Command
  • The journalctl Command
  • Summary
Lesson 27: Red Hat–Based Software Management
  • Red Hat Packages
  • Using the rpm Command
  • The yum Command
  • Additional Tools
  • Summary
Lesson 28: Debian-Based Software Management
  • Managing Packages with dpkg
  • Managing Packages with APT
  • Listing Package Information with APT Commands
  • Summary
Lesson 29: System Booting
  • Phases of the Boot Process
  • GRUB
  • Kernel Components
  • The init Phase
  • Summary
Lesson 30: Develop a Software Management Security Policy
  • Ensuring Software Security
  • xinetd
  • Summary
Lesson 31: Footprinting
  • Understanding Footprinting
  • Common Footprinting Tools
  • Kali Linux Utilities
  • Summary
Lesson 32: Firewalls
  • Introduction to Firewalls
  • Essentials of the iptables Command
  • Using iptables to Filter Incoming Packets
  • Using iptables to Filter Outgoing Packets
  • Implementing NAT
  • Summary
Lesson 33: Intrusion Detection
  • Introduction to Intrusion Detection Tools
  • Intrusion Detection Network Tools
  • Intrusion Detection File Tools
  • Additional Intrusion Detection Tools
  • Summary
Lesson 34: Additional Security Tasks
  • The fail2ban Service
  • OpenVPN
  • gpg
  • Security Alert Services
  • Summary
Appendix A: Resource Guide
  • Resources by Lesson
Lesson 36: CompTIA Linux+ LX0-103 and LPIC-1 (Exam 101)
Lesson 37: CompTIA Linux+ LX0-103 and LPIC-1 (Exam 102)

Hands on Activities (Live Labs)

Distributions and Key Components

  • Installing Kali Linux  
  • Installing Ubuntu
  • Installing CentOS

Working on the Command Line

  • Managing Files using Command Line
  • Using Shell Features
  • Compressing Files

Getting Help

  • Getting Help using man Command
  • Getting Help using info Command

Editing Files

  • Editing Files using the Vim Editor

When Things Go Wrong

  • Troubleshooting Linux Issues
  • Configuring User Notifications

Managing Group Accounts

  • Managing Group Accounts
  • Managing Group Administrators

Managing User Accounts

  • Managing User Accounts
  • Securing User Accounts
  • Configuring sudo

Develop an Account Security Policy

  • Developing an Account Security Policy
  • Testing the Security of Accounts

File Permissions

  • Managing File Permissions
  • Managing Special Permissions
  • Enabling Access Control Lists
  • Managing File Ownership and Attributes
  • Monitoring Security Issues with SELinux

Manage Local Storage: Essentials

  • Creating Partitions and Filesystems
  • Mounting Filesystems at Boot
  • Managing Swap Devices

Manage Local Storage: Advanced Features

  • Managing Encrypted Filesystems
  • Managing Hard and Soft Links

Manage Network Storage

  • Configuring Samba
  • Administering NFS

Develop a Storage Security Policy

  • Backing Up a Filesystem
  • Developing a Backup Security Policy

crontab and at

  • Managing crontab
  • Configuring at Commands

Scripting

  • Bash shell script for system info
  • Bash shell script for validating user input

Common Automation Tasks

  • Script to Perform System Check
  • Script That Will Back Up All The Files

Develop an Automation Security Policy

  • Securing crontab and at
  • Creating an Automation Security Policy

Networking Basics

  • Standard Ports for the Protocols

Network Configuration

  • Understanding Network Configuration on CentOS
  • Understanding Network Configuration on Ubuntu

Network Service Configuration: Essential Services

  • Configuring a BIND Server
  • Configuring a Postfix Server

Network Service Configuration: Web Services

  • Configuring and Administering an Apache Server
  • Configuring a Proxy Server

Connecting to Remote Systems

  • Configuring an FTP Server
  • Administering an SSH Server

Develop a Network Security Policy

  • Administering Kernel Security Parameters
  • Securing a System with TCP Wrappers
  • Configuring Network Time Protocol
  • Creating a Networking Security Policy

Process Control

  • Managing System Processes
  • Displaying System Information

System Logging

  • Managing Log Files
  • Configuring Log Rotation

Red Hat–Based Software Management

  • Managing Software Packages with rpm 
  • Managing Software Packages with yum

Debian-Based Software Management

  • Managing Software Packages with dpkg  

System Booting

  • Configuring GRUB Security
  • Managing the Startup Process

Develop a Software Management Security Policy

  • Exploring Common Vulnerabilities and Exposure Reports
  • Managing and Securing Legacy Services

Footprinting

  • Using Probing Tools
  • Scanning the Network

Firewalls

  • Configuring Linux Firewall using iptable   

Intrusion Detection

  • Examining an Intrusion Detection Security Policy 

Additional Security Tasks

  • Configuring fail2ban
  • Encrypting Files with gpg
Customer Testimonials
Marc Calache
The uCertify Linux Essentials for Cybersecurity course is well organized, clear and with exercises to test your understanding. I just wanted to share this very complete course for any students or professionals interested in studying Linux for Cybersecurity.

Show more

×
uc logo for app downloadDownload our uCertify App [lms_setting_placeholder: This filed is used to set the LMS settings.

Share with your friends and colleagues

We use cookies to enhance your experience. By continuing to visit this site you agree to our use of cookies. More information
Accept