Table of Contents for
Linux Essentials for Cybersecurity, First Edition

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Linux Essentials for Cybersecurity, First Edition by William Rothwell Published by Pearson IT Certification, 2018
  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Contents at a Glance
  5. Table of Contents
  6. About the Author
  7. Dedication
  8. Acknowledgments
  9. About the Technical Reviewers
  10. We Want to Hear from You!
  11. Reader Services
  12. Introduction
  13. Part I: Introducing Linux
  14. Chapter 1: Distributions and Key Components
  15. Chapter 2: Working on the Command Line
  16. Chapter 3: Getting Help
  17. Chapter 4: Editing Files
  18. Chapter 5: When Things Go Wrong
  19. Part II: User and Group Accounts
  20. Chapter 6: Managing Group Accounts
  21. Chapter 7: Managing User Accounts
  22. Chapter 8: Develop an Account Security Policy
  23. Part III: File and Data Storage
  24. Chapter 9: File Permissions
  25. Chapter 10: Manage Local Storage: Essentials
  26. Chapter 11: Manage Local Storage: Advanced Features
  27. Chapter 12: Manage Network Storage
  28. Chapter 13: Develop a Storage Security Policy
  29. Part IV: Automation
  30. Chapter 14: Crontab and At
  31. Chapter 15: Scripting
  32. Chapter 16: Common Automation Tasks
  33. Chapter 17: Develop an Automation Security Policy
  34. Part V: Networking
  35. Chapter 18: Networking Basics
  36. Chapter 19: Network Configuration
  37. Chapter 20: Network Service Configuration: Essential Services
  38. Chapter 21: Network Service Configuration: Web Services
  39. Chapter 22: Connecting to Remote Systems
  40. Chapter 23: Develop a Network Security Policy
  41. Part VI: Process and Log Administration
  42. Chapter 24: Process Control
  43. Chapter 25: System Logging
  44. Part VII: Software Management
  45. Chapter 26: Red Hat–Based Software Management
  46. Chapter 27: Debian-Based Software Management
  47. Chapter 28: System Booting
  48. Chapter 29: Develop a Software Management Security Policy
  49. Part VIII: Security Tasks
  50. Chapter 30: Footprinting
  51. Chapter 31: Firewalls
  52. Chapter 32: Intrusion Detection
  53. Chapter 33: Additional Security Tasks
  54. Appendix A: Answers to Review Questions
  55. Appendix B: Resource Guide
  56. Glossary

Table of Contents

About the Author

Dedication

Acknowledgments

About the Technical Reviewers

We Want to Hear from You!

Reader Services

Introduction

Who Should Read This Book?

How This Book Is Organized

Part I: Introducing Linux

Chapter 1: Distributions and Key Components

Introducing Linux

Linux Distributions

Installing Linux

Summary

Chapter 2: Working on the Command Line

File Management

Shell Features

Advanced Commands

Summary

Chapter 3: Getting Help

Man Pages

Command Help Options

The help Command

The info Command

The /usr/share/doc Directory

Internet Resources

Summary

Chapter 4: Editing Files

The vi Editor

Additional Editors

Summary

Chapter 5: When Things Go Wrong

The Science of Troubleshooting

Notifying Users

Summary

Part II: User and Group Accounts

Chapter 6: Managing Group Accounts

What Are Groups Used For?

Managing Groups

Summary

Chapter 7: Managing User Accounts

The Importance of User Accounts

The /etc/shadow File

Managing Users

Network-Based User Accounts

Using su and sudo

Restricting User Accounts

Summary

Chapter 8: Develop an Account Security Policy

Introducing Kali Linux

Security Principles

Creating a Security Policy

Securing Accounts

Security Tools

Summary

Part III: File and Data Storage

Chapter 9: File Permissions

Default Permissions

Special Permissions

Access Control Lists (ACLs)

Changing Ownership

File Attributes

Introduction to SELinux

Summary

Chapter 10: Manage Local Storage: Essentials

Filesystem Essentials

Filesystems Types

Additional Filesystem Tools

Mounting Filesystems

Summary

Chapter 11: Manage Local Storage: Advanced Features

Encrypted Filesystems

Managing autofs

Logical Volume Manager

Disk Quotas

Hard and Soft Links

Summary

Chapter 12: Manage Network Storage

Samba

Network File System

Summary

Chapter 13: Develop a Storage Security Policy

Developing the Plan

Backing Up Data

Summary

Part IV: Automation

Chapter 14: Crontab and At

Using crontab

Using at

Summary

Chapter 15: Scripting

Linux Programming

Basics of BASH Scripting

Flow Control Statements

User Interaction

Using Command Substitution

Additional Information

Summary

Chapter 16: Common Automation Tasks

Exploring Scripts that Already Exist on Your System

Creating Your Own Automation Scripts

Summary

Chapter 17: Develop an Automation Security Policy

Securing crontab and at

Securing BASH Scripts

Summary

Part V: Networking

Chapter 18: Networking Basics

Network Terminology

IPv4 Versus IPv6

IPv4 Addresses

Common Protocol Suites

Network Ports

Summary

Chapter 19: Network Configuration

Ethernet Network Interfaces

Persistent Network Configurations

Network Troubleshooting Commands

Access to Wireless Networks

Summary

Chapter 20: Network Service Configuration: Essential Services

DNS Servers

Zone Files

DHCP Server

Email Servers

Managing Local Email Delivery

Remote Email Delivery

Summary

Chapter 21: Network Service Configuration: Web Services

Apache Web Server

Basic Apache Web Server Configuration

Apache Web Server Security

Virtual Hosts

HTTPS

SSL and Apache

Proxy Servers

Client Configuration

Summary

Chapter 22: Connecting to Remote Systems

LDAP

FTP Servers

Secure Shell

Summary

Chapter 23: Develop a Network Security Policy

Kernel Parameters

TCP Wrappers

Network Time Protocol

Summary

Part VI: Process and Log Administration

Chapter 24: Process Control

Viewing Processes

Running Processes

Killing Processes

The nohup Command

Process Priority

Summary

Chapter 25: System Logging

Syslog

The logrotate Command

The journalctl Command

Summary

Part VII: Software Management

Chapter 26: Red Hat–Based Software Management

Red Hat Packages

Using the rpm Command

The yum Command

Additional Tools

Summary

Chapter 27: Debian-Based Software Management

Managing Packages with dpkg

Managing Packages with APT

Listing Package Information with APT Commands

Summary

Chapter 28: System Booting

Phases of the Boot Process

GRUB

Kernel Components

The init Phase

Summary

Chapter 29: Develop a Software Management Security Policy

Ensuring Software Security

xinetd

Summary

Part VIII: Security Tasks

Chapter 30: Footprinting

Understanding Footprinting

Common Footprinting Tools

Kali Linux Utilities

Summary

Chapter 31: Firewalls

Introduction to Firewalls

Essentials of the iptables Command

Using iptables to Filter Incoming Packets

Using iptables to Filter Outgoing Packets

Implementing NAT

Summary

Chapter 32: Intrusion Detection

Introduction to Intrusion Detection Tools

Intrusion Detection Network Tools

Intrusion Detection File Tools

Additional Intrusion Detection Tools

Summary

Chapter 33: Additional Security Tasks

The fail2ban Service

OpenVPN

gpg

Security Alert Services

Summary

Appendix A: Answers to Review Questions

Appendix B: Resource Guide

Glossary