Table of Contents
Professional utility of information security knowledge
Definition of information security
Example case – Wikileaks, Cablegate, and free reign over classified networks
Hands-on activity – Software Inspector, Steganography
Critical thinking exercise: identifying CIA area(s) affected by sample real-life hacking incidents
Chapter 2 — System Administration (Part 1)
What is system administration?
System administration and information security
Common system administration tasks
System administration utilities
Hands-on Activity – Linux system installation
Critical thinking exercise – Google executives sentenced to prison over video
Chapter 3 — System Administration (Part 2)
Moving around the filesystem – pwd, cd
Access control and user management
Software installation and updates
Command-line user administration
Example case – Northwest Florida State College
Get Information Security and IT Risk Management now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.