Linux Essentials for Cybersecurity

: 6 Months
: Self Paced, AI Tutor
: Beginner , Intermediate
: Available Immediately

R6200,00R7300,00

Guaranteed Safe Checkout

Gain hands-on expertise on the Linux cybersecurity principles with the Linux Essentials for Cybersecurity course and lab to gain the hands-on expertise required to understand the Linux cybersecurity principles. The lab is cloud-based, device-enabled, and can easily be integrated with an LMS. The Linux training course and lab provide knowledge and skills in managing local storage, group, and user accounts; working on the command line, editing files, developing a storage security policy, and more.

Lessons

37+ Lessons | 216+ Quizzes | 288+ Flashcards | 290+ Glossary of terms

TestPrep

100+ Pre Assessment Questions | 101+ Post Assessment Questions |

Hand on lab

70+ LiveLab | 70+ Video tutorials | 02:34+ Hours

Video Lessons

216+ Videos | 12:52+ Hours

Lessons 1: Introduction

Lessons 2: Distributions and Key Components

  • Introducing Linux
  • Linux Distributions
  • Installing Linux
  • Summary

Lessons 3: Working on the Command Line

  • File Management
  • Shell Features
  • Advanced Commands
  • Summary

Lessons 4: Getting Help

  • Man Pages
  • Command Help Options
  • The help Command
  • The info Command
  • The /usr/share/doc Directory
  • Internet Resources
  • Summary

Lessons 5: Editing Files

  • The vi Editor
  • Additional Editors
  • Summary

Lessons 6: When Things Go Wrong

  • The Science of Troubleshooting
  • Notifying Users
  • Summary

Lessons 7: Managing Group Accounts

  • What Are Groups Used For?
  • Managing Groups
  • Summary

Lessons 8: Managing User Accounts

  • The Importance of User Accounts
  • Managing Users
  • Network-Based User Accounts
  • Using su and sudo
  • Restricting User Accounts
  • Summary

Lessons 9: Develop an Account Security Policy

  • Introducing Kali Linux
  • Security Principles
  • Creating a Security Policy
  • Securing Accounts
  • Security Tools
  • Summary

Lessons 10: File Permissions

  • Standard Permissions
  • Default Permissions
  • Special Permissions
  • Access Control Lists (ACLs)
  • Changing Ownership
  • File Attributes
  • Introduction to SELinux
  • Summary

Lessons 11: Manage Local Storage: Essentials

  • Filesystem Essentials
  • Filesystem Types
  • Additional Filesystem Tools
  • Mounting Filesystems
  • Summary

Lessons 12: Manage Local Storage: Advanced Features

  • Encrypted Filesystems
  • Managing autofs
  • Logical Volume Manager
  • Disk Quotas
  • Hard and Soft Links
  • Summary

Lessons 13: Manage Network Storage

  • Samba
  • Network File System
  • Summary

Lessons 14: Develop a Storage Security Policy

  • Developing the Plan
  • Backing Up Data
  • Summary

Lessons 15: crontab and at

  • Using crontab
  • Using at
  • Summary

Lessons 16: Scripting

  • Linux Programming
  • Basics of BASH Scripting
  • Flow Control Statements
  • User Interaction
  • Using Command Substitution
  • Additional Information
  • Summary

Lessons 17: Common Automation Tasks

  • Exploring Scripts that Already Exist on Your System
  • Creating Your Own Automation Scripts
  • Summary

Lessons 18: Develop an Automation Security Policy

  • Securing crontab and at
  • Securing BASH Scripts
  • Summary

Lessons 19: Networking Basics

  • Network Terminology
  • IPv4 Versus IPv6
  • IPv4 Addresses
  • Common Protocol Suites
  • Network Ports
  • Summary

Lessons 20: Network Configuration

  • Ethernet Network Interfaces
  • Persistent Network Configurations
  • Network Troubleshooting Commands
  • Access to Wireless Networks
  • Summary

Lessons 21: Network Service Configuration: Essential Services

  • DNS Servers
  • Zone Files
  • Securing BIND
  • DHCP Server
  • Email Servers
  • Managing Local Email Delivery
  • Remote Email Delivery
  • Summary

Lessons 22: Network Service Configuration: Web Services

  • Apache Web Server
  • Basic Apache Web Server Configuration
  • Apache Web Server Security
  • Virtual Hosts
  • HTTPS
  • SSL and Apache
  • Proxy Servers
  • Summary

Lessons 23: Connecting to Remote Systems

  • LDAP
  • FTP Servers
  • Secure Shell
  • Summary

Lessons 24: Develop a Network Security Policy

  • Kernel Parameters
  • TCP Wrappers
  • Network Time Protocol
  • Summary

Lessons 25: Process Control

  • Viewing Processes
  • Running Processes
  • Killing Process
  • The nohup Command
  • Process Priority
  • Summary

Lessons 26: System Logging

  • Syslog
  • The logrotate Command
  • The journalctl Command
  • Summary

Lessons 27: Red Hat–Based Software Management

  • Red Hat Packages
  • Using the rpm Command
  • The yum Command
  • Additional Tools
  • Summary

Lessons 28: Debian-Based Software Management

  • Managing Packages with dpkg
  • Managing Packages with APT
  • Listing Package Information with APT Commands
  • Summary

Lessons 29: System Booting

  • Phases of the Boot Process
  • GRUB
  • Kernel Components
  • The init Phase
  • Summary

Lessons 30: Develop a Software Management Security Policy

  • Ensuring Software Security
  • xinetd
  • Summary

Lessons 31: Footprinting

  • Understanding Footprinting
  • Common Footprinting Tools
  • Kali Linux Utilities
  • Summary

Lessons 32: Firewalls

  • Introduction to Firewalls
  • Essentials of the iptables Command
  • Using iptables to Filter Incoming Packets
  • Using iptables to Filter Outgoing Packets
  • Implementing NAT
  • Summary

Lessons 33: Intrusion Detection

  • Introduction to Intrusion Detection Tools
  • Intrusion Detection Network Tools
  • Intrusion Detection File Tools
  • Additional Intrusion Detection Tools
  • Summary

Lessons 34: Additional Security Tasks

  • The fail2ban Service
  • OpenVPN
  • gpg
  • Security Alert Services
  • Summary

Appendix A: Resource Guide

  • Resources by Lesson

Lessons 36: CompTIA Linux+ LX0-103 and LPIC-1 (Exam 101)

Lessons 37: CompTIA Linux+ LX0-103 and LPIC-1 (Exam 102)

Training Method

Self Paced, AI Tutor

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Shopping Cart
Learningit.today