Free Shipping Threshold: Only $50!
Linux Essentials for Cybersecurity - Pearson IT Cybersecurity Curriculum (ITCC) | Learn Linux Security for IT Professionals & Ethical Hackers
$41.69
$75.8
Safe 45%
Linux Essentials for Cybersecurity - Pearson IT Cybersecurity Curriculum (ITCC) | Learn Linux Security for IT Professionals & Ethical Hackers Linux Essentials for Cybersecurity - Pearson IT Cybersecurity Curriculum (ITCC) | Learn Linux Security for IT Professionals & Ethical Hackers
Linux Essentials for Cybersecurity - Pearson IT Cybersecurity Curriculum (ITCC) | Learn Linux Security for IT Professionals & Ethical Hackers
Linux Essentials for Cybersecurity - Pearson IT Cybersecurity Curriculum (ITCC) | Learn Linux Security for IT Professionals & Ethical Hackers
Linux Essentials for Cybersecurity - Pearson IT Cybersecurity Curriculum (ITCC) | Learn Linux Security for IT Professionals & Ethical Hackers
$41.69
$75.8
45% Off
Quantity:
Delivery & Return: Free shipping on all orders over $50
Estimated Delivery: 10-15 days international
26 people viewing this product right now!
SKU: 67829792
Guranteed safe checkout
amex
paypal
discover
mastercard
visa
apple pay
shop
Description
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA–IN ONE BOOKFrom the basics to advanced techniques: no Linux security experience necessaryRealistic examples & step-by-step activities: practice hands-on without costly equipmentThe perfect introduction to Linux-based security for all students and IT professionalsLinux distributions are widely used to support mission-critical applications and manage crucial data. But safeguarding modern Linux systems is complex, and many Linux books have inadequate or outdated security coverage.Linux Essentials for Cybersecurity is your complete solution. Leading Linux certification and security experts William “Bo” Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of enforcing and troubleshooting security. Their practical approach will help you protect systems, even if one or more layers are penetrated.First, you’ll learn how to install Linux to achieve optimal security upfront, even if you have no Linux experience. Next, you’ll master best practices for securely administering accounts, devices, services, processes, data, and networks. Then, you’ll master powerful tools and automated scripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more.To help you earn certification and demonstrate skills, this guide covers many key topics on CompTIA Linux+ and LPIC-1 exams. Everything is organized clearly and logically for easy understanding, effective classroom use, and rapid on-the-job training.LEARN HOW TO: Review Linux operating system components from the standpoint of security Master key commands, tools, and skills for securing Linux systems Troubleshoot common Linux security problems, one step at a time Protect user and group accounts with Pluggable Authentication Modules (PAM), SELinux, passwords, and policies Safeguard files and directories with permissions and attributes Create, manage, and protect storage devices: both local and networked Automate system security 24/7 by writing and scheduling scripts Maintain network services, encrypt network connections, and secure network-accessible processes Examine which processes are running–and which may represent a threat Use system logs to pinpoint potential vulnerabilities Keep Linux up-to-date with Red Hat or Debian software management tools Modify boot processes to harden security Master advanced techniques for gathering system information
More
Shipping & Returns

For all orders exceeding a value of 100USD shipping is offered for free.

Returns will be accepted for up to 10 days of Customer’s receipt or tracking number on unworn items. You, as a Customer, are obliged to inform us via email before you return the item.

Otherwise, standard shipping charges apply. Check out our delivery Terms & Conditions for more details.

Reviews
*****
Verified Buyer
5
Short answer: It's a thorough treatment of Linux in general and securing Linux using tools available on every modern distribution. If you don't know where to start; start here. If you're like me and have been around these issues for years but haven't needed to cover all the bases on a real production deployment then you will find the missing pieces here as well.Long answer: I was a bit surprised at starting from the standpoint of no Linux experience for a book on a subject that typically demands a good bit of experience, but as I kept reading, I actually appreciated looking at the basics from a different viewpoint. The writing style is concise but not boring. Considering that I read the bulk of the book, start to finish only skimming sections that are part of my daily Linux life, I can only conclude that I liked the writing style. To be fair, I do have an actual need to deploy and lock down a web server myself (as opposed to outsourcing it) so I was motivated to cover my bases. This book covers a lot of ground and points to a good number of resources on the subjects that are beyond the scope of an essentials book.I think this book also did a good job of picking well proven tools. As with everything Linux, there are MANY tools to choose from and there will always be a 'latest and best tool' for every problem you are solving. Doing a quick search on the more established tools leads you to the mainstream industry practices straight away. It also extends the useful life of the book as a solid reference.

You Might Also Like

Top