SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Register your product to gain access to bonus material or receive a coupon.
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
PDF The popular standard, used most often with the free Acrobat® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
This lab manual accompanies the textbook Linux Essentials for Cybersecurity, which teaches people how to use Linux systems and ensures that the Linux systems they work on are as secure as possible.
To really become a Linux cybersecurity expert, you need practice.
In this book, there are three different types of labs to practice your skills:
No matter the type, these labs are designed to be performed on live Linux systems to give you hands-on practice and develop critical thinking and complex problem-solving skills.
Introduction xiv
Part I Introducing Linux
Chapter 1 Distributions and Key Components 2
Lab 1.1 Installing CentOS 3
Lab 1.2 Installing Ubuntu 4
Lab 1.3 Installing Kali 6
Chapter 2 Working on the Command Line 8
Lab 2.1 Manage Files 9
Lab 2.2 Using Shell Features 10
Lab 2.3 Compressing Files 11
Chapter 3 Getting Help 14
Lab 3.1 Getting Help with man 15
Lab 3.2 Getting Help with info 16
Chapter 4 Editing Files 18
Lab 4.1 Editing Files with the vim Editor 19
Chapter 5 When Things Go Wrong 22
Lab 5.1 Troubleshooting Linux Issues 23
Lab 5.2 Configuring User Notifications 24
Part II User and Group Accounts
Chapter 6 Managing Group Accounts 26
Lab 6.1 Managing Group Accounts 27
Lab 6.2 Managing Group Administrators 28
Chapter 7 Managing User Accounts 30
Lab 7.1 Managing User Accounts 31
Lab 7.2 Securing User Accounts 31
Lab 7.3 Configuring sudo 33
Chapter 8 Develop an Account Security Policy 34
Lab 8.1 Testing the Security of Accounts 35
Lab 8.2 Developing an Account Security Policy 36
Part III File and Data Storage
Chapter 9 File Permissions 38
Lab 9.1 Managing File Permissions 39
Lab 9.2 Managing Special Permissions 40
Lab 9.3 Enabling Access Control Lists 41
Lab 9.4 Managing File Ownership and Attributes 41
Lab 9.5 Monitoring Security Issues with SELinux 42
Chapter 10 Manage Local Storage: Essentials 44
Lab 10.1 Creating Partitions and Filesystems 45
Lab 10.2 Mounting Filesystems at Boot 48
Lab 10.3 Managing Swap Devices 49
Chapter 11 Manage Local Storage: Advanced Features 50
Lab 11.1 Managing Encrypted Filesystems 51
Lab 11.2 Configuring Logical Volumes 51
Lab 11.3 Administering Disk Quotas 51
Lab 11.4 Managing Hard and Soft Links 51
Chapter 12 Manage Network Storage 54
Lab 12.1 Configuring Samba 55
Lab 12.2 Administering NFS 57
Lab 12.3 Managing iSCSI 57
Chapter 13 Develop a Storage Security Policy 60
Lab 13.1 Backing Up a Filesystem 61
Lab 13.2 Developing a Backup Security Policy 62
Part IV Automation
Chapter 14 Crontab and At 64
Lab 14.1 Managing crontab 65
Lab 14.2 Configuring at Commands 66
Chapter 15 Scripting 68
Lab 15.1 Script Project #1 69
Lab 15.2 Script Project #2 70
Chapter 16 Common Automation Tasks 72
Lab 16.1 Script Project #3 73
Lab 16.2 Script Project #4 74
Chapter 17 Develop an Automation Security Policy 76
Lab 17.1 Securing crontab and at 77
Lab 17.2 Creating an Automation Security Policy 78
Part V Networking
Chapter 18 Networking Basics 80
Lab 18.1 Exploring Networking Components 81
Chapter 19 Network Configuration 84
Lab 19.1 Understanding Network Configuration on CentOS 85
Lab 19.2 Understanding Network Configuration on Ubuntu 86
Chapter 20 Network Service Configuration: Essential Services 88
Lab 20.1 Configuring a BIND Server 89
Lab 20.2 Configuring a Postfix Server 90
Chapter 21 Network Service Configuration: Web Services 92
Lab 21.1 Configuring and Administering an Apache Server 93
Lab 21.2 Configuring a Proxy Server 94
Chapter 22 Connecting to Remote Systems 96
Lab 22.1 Configuring an FTP Server 97
Lab 22.2 Administering an SSH Server 98
Chapter 23 Develop a Network Security Policy 100
Lab 23.1 Administering Kernel Security Parameters 101
Lab 23.2 Securing a System with TCP Wrappers 101
Lab 23.3 Configuring Network Time Protocol 102
Lab 23.4 Creating a Networking Security Policy 103
Part VI Process and Log Administration
Chapter 24 Process Control 104
Lab 24.1 Managing System Processes 105
Lab 24.2 Displaying System Information 106
Chapter 25 System Logging 108
Lab 25.1 Managing Log Files 109
Lab 25.2 Configuring Log Rotation 110
Part VII Software Management
Chapter 26 Red Hat-Based Software Management 112
Lab 26.1 Managing Software Packages with rpm 113
Lab 26.2 Managing Software Packages with yum 113
Chapter 27 Debian-Based Software Management 116
Lab 27.1 Managing Software Packages with dpkg 117
Lab 27.2 Managing Software Packages with apt 117
Chapter 28 System Booting 118
Lab 28.1 Configuring GRUB Security 119
Lab 28.2 Managing the Startup Process 120
Chapter 29 Develop a Software Management Security Policy 122
Lab 29.1 Exploring Common Vulnerabilities and Exposure Reports 123
Lab 29.2 Managing and Securing Legacy Services 124
Part VIII Security Tasks
Chapter 30 Footprinting 126
Lab 30.1 Using Probing Tools 127
Lab 30.2 Scanning the Network 127
Chapter 31 Firewalls 130
Lab 31.1 Creating a Firewall to Protect a System 131
Chapter 32 Intrusion Detection 132
Lab 32.1 Creating an Intrusion Detection Security Plan 133
Chapter 33 Additional Security Tasks 134
Lab 33.1 Configuring fail2ban 135
Lab 33.2 Encrypting Files with gpg 136
9780789760555, TOC, 9/6/2018