Linux Essentials for Cybersecurity
Upgrade your Linux skills! Secure your digital assets from cyberattacks and hackers.
(Pearson-linux-ess-cybersec-complete) / ISBN : 978-1-64459-036-2About This Course
Linux Essentials for Cybersecurity is a comprehensive online training course that equips you with the knowledge and skills needed to build a career in the high-demand field of cybersecurity. Gain knowledge of the core concepts, tools, and best practices of security in Linux environments. Learn how to manage user accounts, enforce access controls, and implement security policies to safeguard your data when using technology. Get trained on practical cybersecurity challenges with our hands-on exercises that mimic real-world scenarios. By the end of this course, you’ll be able to troubleshoot and resolve security issues with Linux.
Skills You’ll Get
- Expertise with command-line for interacting with the Linux system
- File and directory management using Linux commands
- Package management (apt, yum) for installing, updating, and removing software
- Create user accounts, manage groups, access and permissions
- Manage network interface configuration and connectivity
- Install firewalls to control network traffic
- Implement security policies to protect systems and data
- Identify and resolve security threats using Intrusion Detection System (IDS)
- Automate tasks and improve efficiency with shell scripting
- Understanding of the Linux boot process and its components
Get the support you need. Enroll in our Instructor-Led Course.
Interactive Lessons
37+ Interactive Lessons | 216+ Quizzes | 288+ Flashcards | 290+ Glossary of terms
Gamified TestPrep
100+ Pre Assessment Questions | 101+ Post Assessment Questions |
Hands-On Labs
70+ LiveLab | 70+ Video tutorials | 02:34+ Hours
Video Lessons
216+ Videos | 12:52+ Hours
Introduction
Distributions and Key Components
- Introducing Linux
- Linux Distributions
- Installing Linux
- Summary
Working on the Command Line
- File Management
- Shell Features
- Advanced Commands
- Summary
Getting Help
- Man Pages
- Command Help Options
- The help Command
- The info Command
- The /usr/share/doc Directory
- Internet Resources
- Summary
Editing Files
- The vi Editor
- Additional Editors
- Summary
When Things Go Wrong
- The Science of Troubleshooting
- Notifying Users
- Summary
Managing Group Accounts
- What Are Groups Used For?
- Managing Groups
- Summary
Managing User Accounts
- The Importance of User Accounts
- Managing Users
- Network-Based User Accounts
- Using su and sudo
- Restricting User Accounts
- Summary
Develop an Account Security Policy
- Introducing Kali Linux
- Security Principles
- Creating a Security Policy
- Securing Accounts
- Security Tools
- Summary
File Permissions
- Standard Permissions
- Default Permissions
- Special Permissions
- Access Control Lists (ACLs)
- Changing Ownership
- File Attributes
- Introduction to SELinux
- Summary
Manage Local Storage: Essentials
- Filesystem Essentials
- Filesystem Types
- Additional Filesystem Tools
- Mounting Filesystems
- Summary
Manage Local Storage: Advanced Features
- Encrypted Filesystems
- Managing autofs
- Logical Volume Manager
- Disk Quotas
- Hard and Soft Links
- Summary
Manage Network Storage
- Samba
- Network File System
- Summary
Develop a Storage Security Policy
- Developing the Plan
- Backing Up Data
- Summary
crontab and at
- Using crontab
- Using at
- Summary
Scripting
- Linux Programming
- Basics of BASH Scripting
- Flow Control Statements
- User Interaction
- Using Command Substitution
- Additional Information
- Summary
Common Automation Tasks
- Exploring Scripts that Already Exist on Your System
- Creating Your Own Automation Scripts
- Summary
Develop an Automation Security Policy
- Securing crontab and at
- Securing BASH Scripts
- Summary
Networking Basics
- Network Terminology
- IPv4 Versus IPv6
- IPv4 Addresses
- Common Protocol Suites
- Network Ports
- Summary
Network Configuration
- Ethernet Network Interfaces
- Persistent Network Configurations
- Network Troubleshooting Commands
- Access to Wireless Networks
- Summary
Network Service Configuration: Essential Services
- DNS Servers
- Zone Files
- Securing BIND
- DHCP Server
- Email Servers
- Managing Local Email Delivery
- Remote Email Delivery
- Summary
Network Service Configuration: Web Services
- Apache Web Server
- Basic Apache Web Server Configuration
- Apache Web Server Security
- Virtual Hosts
- HTTPS
- SSL and Apache
- Proxy Servers
- Summary
Connecting to Remote Systems
- LDAP
- FTP Servers
- Secure Shell
- Summary
Develop a Network Security Policy
- Kernel Parameters
- TCP Wrappers
- Network Time Protocol
- Summary
Process Control
- Viewing Processes
- Running Processes
- Killing Process
- The nohup Command
- Process Priority
- Summary
System Logging
- Syslog
- The logrotate Command
- The journalctl Command
- Summary
Red Hat–Based Software Management
- Red Hat Packages
- Using the rpm Command
- The yum Command
- Additional Tools
- Summary
Debian-Based Software Management
- Managing Packages with dpkg
- Managing Packages with APT
- Listing Package Information with APT Commands
- Summary
System Booting
- Phases of the Boot Process
- GRUB
- Kernel Components
- The init Phase
- Summary
Develop a Software Management Security Policy
- Ensuring Software Security
- xinetd
- Summary
Footprinting
- Understanding Footprinting
- Common Footprinting Tools
- Kali Linux Utilities
- Summary
Firewalls
- Introduction to Firewalls
- Essentials of the iptables Command
- Using iptables to Filter Incoming Packets
- Using iptables to Filter Outgoing Packets
- Implementing NAT
- Summary
Intrusion Detection
- Introduction to Intrusion Detection Tools
- Intrusion Detection Network Tools
- Intrusion Detection File Tools
- Additional Intrusion Detection Tools
- Summary
Additional Security Tasks
- The fail2ban Service
- OpenVPN
- gpg
- Security Alert Services
- Summary
Appendix A: Resource Guide
- Resources by Lesson
CompTIA Linux+ LX0-103 and LPIC-1 (Exam 101)
CompTIA Linux+ LX0-103 and LPIC-1 (Exam 102)
Distributions and Key Components
- Installing Kali Linux
- Installing Ubuntu
- Installing CentOS
Working on the Command Line
- Managing Files Using the Command Line
- Using Shell Features
- Compressing Files
Getting Help
- Getting Help Using the man Command
- Getting Help Using the info Command
Editing Files
- Editing Files using the Vim Editor
When Things Go Wrong
- Troubleshooting Linux Issues
- Configuring User Notifications
Managing Group Accounts
- Managing Group Accounts
- Managing Group Administrators
Managing User Accounts
- Managing User Accounts
- Securing User Accounts
- Configuring sudo
Develop an Account Security Policy
- Developing an Account Security Policy
- Testing the Security of Accounts
File Permissions
- Managing File Permissions
- Managing Special Permissions
- Enabling Access Control Lists
- Managing File Ownership and Attributes
- Monitoring Security Issues with SELinux
Manage Local Storage: Essentials
- Creating Partitions and Filesystems
- Mounting Filesystems at Boot
- Managing Swap Devices
Manage Local Storage: Advanced Features
- Managing Encrypted Filesystems
- Managing Hard and Soft Links
Manage Network Storage
- Configuring Samba
- Administering NFS
Develop a Storage Security Policy
- Backing Up a Filesystem
- Developing a Backup Security Policy
crontab and at
- Managing crontab
- Configuring at Commands
Scripting
- Using the Bash Shell Script to Display System Info
- Validating the User Input
Common Automation Tasks
- Performing a System Check
- Using Script that will Back Up All the Files
Develop an Automation Security Policy
- Securing crontab and at
- Creating an Automation of Security Policy
Networking Basics
- Obtaining the Standard Ports for the Protocols
Network Configuration
- Understanding Network Configuration on CentOS
- Understanding Network Configuration on Ubuntu
Network Service Configuration: Essential Services
- Configuring a BIND Server
- Configuring a Postfix Server
Network Service Configuration: Web Services
- Configuring and Administering an Apache Server
- Configuring a Proxy Server
Connecting to Remote Systems
- Configuring an FTP Server
- Administering an SSH Server
Develop a Network Security Policy
- Administering Kernel Security Parameters
- Securing a System with TCP Wrappers
- Examining an Intrusion Detection Security Policy
- Configuring Chrony
Process Control
- Managing System Processes
- Displaying System Information
System Logging
- Managing Log Files
- Configuring Log Rotation
Red Hat–Based Software Management
- Managing Software Packages with rpm
- Managing Software Packages with dnf
Debian-Based Software Management
- Managing Software Packages with dpkg
System Booting
- Managing the Startup Process
- Configuring GRUB Security
Develop a Software Management Security Policy
- Exploring Common Vulnerabilities and Exposure Reports
- Managing and Securing Legacy Services
Footprinting
- Using Probing Tools
- Scanning the Network
Firewalls
- Configuring Linux Firewall using iptable
Intrusion Detection
- Examining an Intrusion Detection Security Policy
Additional Security Tasks
- Configuring fail2ban
- Encrypting Files with gpg
Why Do Learners Love This Course?
Any questions?Check out the FAQs
Here’s everything you need to know about the Linux Essentials for Cybersecurity course.
Contact Us NowIt is a great starting point for those wanting to make a career in cybersecurity or those wanting to build on their existing Linux skills for career advancement. Also, those preparing for advanced certifications like CompTIA Linux+ and LPIC-1 certifications can also benefit greatly from this course.
No, you don’t need prior experience to take this course. However, we recommend you should have some knowledge of Linux command line for better understanding of more advanced topics.
You’ll be exploring a wide range of essential cybersecurity tools including firewalls, intrusion detection systems (IDS), packet analyzers, encryption tools, password managers, security scanners, log analysis tools, and security improvement tools.
Yes, you will be awarded a certificate of completion.
It is a self-paced course that can be completed within 1 year after enrollment.