Gain hands-on expertise on the Linux cybersecurity principles with the Linux Essentials for Cybersecurity course and lab to gain the hands-on expertise required to understand the Linux cybersecurity principles. The lab is cloud-based, device-enabled, and can easily be integrated with an LMS. The Linux training course and lab provide knowledge and skills in managing local storage, group, and user accounts; working on the command line, editing files, developing a storage security policy, and more

starstarstarstarstar

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

The Linux training course and lab provide knowledge and skills in managing local storage, group, and user accounts; working on the command line, editing files, developing a storage security policy, and more.

1
  • Introduction


2
  • Distributions and Key Components

  • Introducing Linux
    Linux Distributions
    Installing Linux
    Summary

3
  • Working on the Command Line

  • File Management
    Shell Features
    Advanced Commands
    Summary

4
  • Getting Help

  • Man Pages
    Command Help Options
    The help Command
    The info Command
    The /usr/share/doc Directory
    Internet Resources
    Summary

5
  • Editing Files

  • The vi Editor
    Additional Editors
    Summary

6
  • When Things Go Wrong

  • The Science of Troubleshooting
    Notifying Users
    Summary

7
  • Managing Group Accounts

  • What Are Groups Used For?
    Managing Groups
    Summary

8
  • Managing User Accounts

  • The Importance of User Accounts
    Managing Users
    Network-Based User Accounts
    Using su and sudo
    Restricting User Accounts
    Summary

9
  • Develop an Account Security Policy

  • Introducing Kali Linux
    Security Principles
    Creating a Security Policy
    Securing Accounts
    Security Tools
    Summary

10
  • File Permissions

  • Standard Permissions
    Default Permissions
    Special Permissions
    Access Control Lists (ACLs)
    Changing Ownership
    File Attributes
    Introduction to SELinux
    Summary

11
  • Manage Local Storage: Essentials

  • Filesystem Essentials
    Filesystem Types
    Additional Filesystem Tools
    Mounting Filesystems
    Summary

12
  • Manage Local Storage: Advanced Features

  • Encrypted Filesystems
    Managing autofs
    Logical Volume Manager
    Disk Quotas
    Hard and Soft Links
    Summary

13
  • Manage Network Storage

  • Samba
    Network File System
    Summary

14
  • Develop a Storage Security Policy

  • Developing the Plan
    Backing Up Data
    Summary

15
  • crontab and at

  • Using crontab
    Using at
    Summary

16
  • Scripting

  • Linux Programming
    Basics of BASH Scripting
    Flow Control Statements
    User Interaction
    Using Command Substitution
    Additional Information
    Summary

17
  • Common Automation Tasks

  • Exploring Scripts that Already Exist on Your System
    Creating Your Own Automation Scripts
    Summary

18
  • Develop an Automation Security Policy

  • Securing crontab and at
    Securing BASH Scripts
    Summary

19
  • Networking Basics

  • Network Terminology
    IPv4 Versus IPv6
    IPv4 Addresses
    Common Protocol Suites
    Network Ports
    Summary

20
  • Network Configuration

  • Ethernet Network Interfaces
    Persistent Network Configurations
    Network Troubleshooting Commands
    Access to Wireless Networks
    Summary

21
  • Network Service Configuration: Essential Services

  • DNS Servers
    Zone Files
    Securing BIND
    DHCP Server
    Email Servers
    Managing Local Email Delivery
    Remote Email Delivery
    Summary

22
  • Network Service Configuration: Web Services

  • Apache Web Server
    Basic Apache Web Server Configuration
    Apache Web Server Security
    Virtual Hosts
    HTTPS
    SSL and Apache
    Proxy Servers
    Summary

23
  • Connecting to Remote Systems

  • LDAP
    FTP Servers
    Secure Shell
    Summary

24
  • Develop a Network Security Policy

  • Kernel Parameters
    TCP Wrappers
    Network Time Protocol
    Summary

25
  • Process Control

  • Viewing Processes
    Running Processes
    Killing Process
    The nohup Command
    Process Priority
    Summary

26
  • System Logging

  • Syslog
    The logrotate Command
    The journalctl Command
    Summary

27
  • Red Hat–Based Software Management

  • Red Hat Packages
    Using the rpm Command
    The yum Command
    Additional Tools
    Summary

28
  • Debian-Based Software Management

  • Managing Packages with dpkg
    Managing Packages with APT
    Listing Package Information with APT Commands
    Summary

29
  • System Booting

  • Phases of the Boot Process
    GRUB
    Kernel Components
    The init Phase
    Summary

30
  • Develop a Software Management Security Policy

  • Ensuring Software Security
    xinetd
    Summary

31
  • Footprinting

  • Understanding Footprinting
    Common Footprinting Tools
    Kali Linux Utilities
    Summary

32
  • Firewalls

  • Introduction to Firewalls
    Essentials of the iptables Command
    Using iptables to Filter Incoming Packets
    Using iptables to Filter Outgoing Packets
    Implementing NAT
    Summary

33
  • Intrusion Detection

  • Introduction to Intrusion Detection Tools
    Intrusion Detection Network Tools
    Intrusion Detection File Tools
    Additional Intrusion Detection Tools
    Summary

34
  • Additional Security Tasks

  • The fail2ban Service
    OpenVPN
    gpg
    Security Alert Services
    Summary

35
  • Appendix A: Resource Guide

  • Resources by Lesson

36
  • (Exam 101)

  • CompTIA Linux+ LX0-103 and LPIC-1 (Exam 101)

37
  • (Exam 102)

  • CompTIA Linux+ LX0-103 and LPIC-1

Audience

Cybersecurity professionals looking to learn Linux basics will benefit from this course.

Language

English

Prerequisites

While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training.

Length: 365.0 days ( hours)

Level:

Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.

Loading...