Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt

Linux Essentials for Cybersecurity

Gain hands-on expertise on the Linux cybersecurity principles with the Linux Essentials for Cybersecurity course and lab to gain the hands-on expertise required to understand the Linux cybersecurity principles. The lab is cloud-based, device-enabled, and can easily be integrated with an LMS. The Linux training course and lab provide knowledge and skills in managing local storage, group, and user accounts; working on the command line, editing files, developing a storage security policy, and more.

Submit form to obtain discount

Test Prep
100+ Pre Assessment Questions | 101+ Post Assessment Questions |
Features
70+ LiveLab | 70+ Video tutorials | 02:34+ Hours
216+ Videos | 12:52+ Hours

Why choose TOPTALENT?

Outline

Lessons 1:
Introduction

Lessons 2:
Distributions and Key Components

  • Introducing Linux
  • Linux Distributions
  • Installing Linux
  • Summary

Lessons 3:
Working on the Command Line

  • File Management
  • Shell Features
  • Advanced Commands
  • Summary

Lessons 4:
Getting Help

  • Man Pages
  • Command Help Options
  • The help Command
  • The info Command
  • The /usr/share/doc Directory
  • Internet Resources
  • Summary

Lessons 5:
Editing Files

  • The vi Editor
  • Additional Editors
  • Summary

Lessons 6:
When Things Go Wrong

  • The Science of Troubleshooting
  • Notifying Users
  • Summary

Lessons 7:
Managing Group Accounts

  • What Are Groups Used For?
  • Managing Groups
  • Summary

Lessons 8:
Managing User Accounts

  • The Importance of User Accounts
  • Managing Users
  • Network-Based User Accounts
  • Using su and sudo
  • Restricting User Accounts
  • Summary

Lessons 9:
Develop an Account Security Policy

  • Introducing Kali Linux
  • Security Principles
  • Creating a Security Policy
  • Securing Accounts
  • Security Tools
  • Summary

Lessons 10:
File Permissions

  • Standard Permissions
  • Default Permissions
  • Special Permissions
  • Access Control Lists (ACLs)
  • Changing Ownership
  • File Attributes
  • Introduction to SELinux
  • Summary

Lessons 11:
Manage Local Storage: Essentials

  • Filesystem Essentials
  • Filesystem Types
  • Additional Filesystem Tools
  • Mounting Filesystems
  • Summary

Lessons 12:
Manage Local Storage: Advanced Features

  • Encrypted Filesystems
  • Managing autofs
  • Logical Volume Manager
  • Disk Quotas
  • Hard and Soft Links
  • Summary

Lessons 13:
Manage Network Storage

  • Samba
  • Network File System
  • Summary

Lessons 14:
Develop a Storage Security Policy

  • Developing the Plan
  • Backing Up Data
  • Summary

Lessons 15:
crontab and at

  • Using crontab
  • Using at
  • Summary

Lessons 16:
Scripting

  • Linux Programming
  • Basics of BASH Scripting
  • Flow Control Statements
  • User Interaction
  • Using Command Substitution
  • Additional Information
  • Summary

Lessons 17:
Common Automation Tasks

  • Exploring Scripts that Already Exist on Your System
  • Creating Your Own Automation Scripts
  • Summary

Lessons 18:
Develop an Automation Security Policy

  • Securing crontab and at
  • Securing BASH Scripts
  • Summary

Lessons 19:
Networking Basics

  • Network Terminology
  • IPv4 Versus IPv6
  • IPv4 Addresses
  • Common Protocol Suites
  • Network Ports
  • Summary

Lessons 20:
Network Configuration

  • Ethernet Network Interfaces
  • Persistent Network Configurations
  • Network Troubleshooting Commands
  • Access to Wireless Networks
  • Summary

Lessons 21:
Network Service Configuration: Essential Services

  • DNS Servers
  • Zone Files
  • Securing BIND
  • DHCP Server
  • Email Servers
  • Managing Local Email Delivery
  • Remote Email Delivery
  • Summary

Lessons 22:
Network Service Configuration: Web Services

  • Apache Web Server
  • Basic Apache Web Server Configuration
  • Apache Web Server Security
  • Virtual Hosts
  • HTTPS
  • SSL and Apache
  • Proxy Servers
  • Summary

Lessons 23:
Connecting to Remote Systems

  • LDAP
  • FTP Servers
  • Secure Shell
  • Summary

Lessons 24:
Develop a Network Security Policy

  • Kernel Parameters
  • TCP Wrappers
  • Network Time Protocol
  • Summary

Lessons 25:
Process Control

  • Viewing Processes
  • Running Processes
  • Killing Process
  • The nohup Command
  • Process Priority
  • Summary

Lessons 26:
System Logging

  • Syslog
  • The logrotate Command
  • The journalctl Command
  • Summary

Lessons 27:
Red Hat–Based Software Management

  • Red Hat Packages
  • Using the rpm Command
  • The yum Command
  • Additional Tools
  • Summary

Lessons 28:
Debian-Based Software Management

  • Managing Packages with dpkg
  • Managing Packages with APT
  • Listing Package Information with APT Commands
  • Summary

Lessons 29:
System Booting

  • Phases of the Boot Process
  • GRUB
  • Kernel Components
  • The init Phase
  • Summary

Lessons 30:
Develop a Software Management Security Policy

  • Ensuring Software Security
  • xinetd
  • Summary

Lessons 31:
Footprinting

  • Understanding Footprinting
  • Common Footprinting Tools
  • Kali Linux Utilities
  • Summary

Lessons 32:
Firewalls

  • Introduction to Firewalls
  • Essentials of the iptables Command
  • Using iptables to Filter Incoming Packets
  • Using iptables to Filter Outgoing Packets
  • Implementing NAT
  • Summary

Lessons 33:
Intrusion Detection

  • Introduction to Intrusion Detection Tools
  • Intrusion Detection Network Tools
  • Intrusion Detection File Tools
  • Additional Intrusion Detection Tools
  • Summary

Lessons 34:
Additional Security Tasks

  • The fail2ban Service
  • OpenVPN
  • gpg
  • Security Alert Services
  • Summary

Appendix A: Resource Guide

  • Resources by Lesson

Lessons 36:
CompTIA Linux+ LX0-103 and LPIC-1 (Exam 101)

Lessons 37:
CompTIA Linux+ LX0-103 and LPIC-1 (Exam 102)