July 2018
Intermediate to advanced
356 pages
9h 18m
English
Secure configuration guidelines include operating systems, servers, communication protocols, software, web services, databases, virtualization, and so on. It's highly recommended to refer to the CIS benchmarks (www.cisecurity.org) as a baseline:
|
|
Common software components |
|
Database |
MySQL, SQL Server, Oracle |
|
Web Service |
Apache Tomcat, NginX |
|
Virtualization |
VMWare, Docker |
|
Operating |
Linux (Sent, REdHat, Suse, Ubuntu), Windows Server |
Read now
Unlock full access