O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Linux Essentials for Cybersecurity Lab Manual, First Edition

Book Description

This lab manual accompanies the textbook Linux Essentials for Cybersecurity, which teaches people how to use Linux systems and ensures that the Linux systems they work on are as secure as possible.

 

To really become a Linux cybersecurity expert, you need practice.

 

In this book, there are three different types of labs to practice your skills:

  • Labs in which you are presented with a short problem that requires only a single operation to complete.
  • Labs that are more complex but in which we provide you with a guide to perform each step, one at a time.
  • Scenario labs in which you are asked to solve a problem entirely on your own. These labs are designed to pose a greater challenge.

No matter the type, these labs are designed to be performed on live Linux systems to give you hands-on practice and develop critical thinking and complex problem-solving skills.

Table of Contents

  1. Cover Page
  2. About This E-Book
  3. Title Page
  4. Copyright Page
  5. Contents at a Glance
  6. Table of Contents
  7. About the Author
  8. Dedication
  9. Acknowledgments
  10. About the Technical Reviewer
  11. We Want to Hear from You!
  12. Reader Services
  13. Figure Credits
  14. Introduction
    1. Who Should Read This Book?
    2. How This Book Is Organized
  15. Part I Introducing Linux
    1. Chapter 1 Distributions and Key Components
      1. Lab 1.1 Installing CentOS
      2. Lab 1.2 Installing Ubuntu
      3. Lab 1.3 Installing Kali
    2. Chapter 2 Working on the Command Line
      1. Lab 2.1 Manage Files
      2. Lab 2.2 Using Shell Features
      3. Lab 2.3 Compressing Files
    3. Chapter 3 Getting Help
      1. Lab 3.1 Getting Help with man
      2. Lab 3.2 Getting Help with info
    4. Chapter 4 Editing Files
      1. Lab 4.1 Editing Files with the vim Editor
    5. Chapter 5 When Things Go Wrong
      1. Lab 5.1 Troubleshooting Linux Issues
      2. Lab 5.2 Configuring User Notifications
  16. Part II User and Group Accounts
    1. Chapter 6 Managing Group Accounts
      1. Lab 6.1 Managing Group Accounts
      2. Lab 6.2 Managing Group Administrators
    2. Chapter 7 Managing User Accounts
      1. Lab 7.1 Managing User Accounts
      2. Lab 7.2 Securing User Accounts
      3. Lab 7.3 Configuring sudo
    3. Chapter 8 Develop an Account Security Policy
      1. Lab 8.1 Testing the Security of Accounts
      2. Lab 8.2 Developing an Account Security Policy
  17. Part III File and Data Storage
    1. Chapter 9 File Permissions
      1. Lab 9.1 Managing File Permissions
      2. Lab 9.2 Managing Special Permissions
      3. Lab 9.3 Enabling Access Control Lists
      4. Lab 9.4 Managing File Ownership and Attributes
      5. Lab 9.5 Monitoring Security Issues with SELinux
    2. Chapter 10 Manage Local Storage: Essentials
      1. Lab 10.1 Creating Partitions and Filesystems
      2. Lab 10.2 Mounting Filesystems at Boot
      3. Lab 10.3 Managing Swap Devices
    3. Chapter 11 Manage Local Storage: Advanced Features
      1. Lab 11.1 Managing Encrypted Filesystems
      2. Lab 11.2 Configuring Logical Volumes
      3. Lab 11.3 Administering Disk Quotas
      4. Lab 11.4 Managing Hard and Soft Links
    4. Chapter 12 Manage Network Storage
      1. Lab 12.1 Configuring Samba
      2. Lab 12.2 Administering NFS
      3. Lab 12.3 Managing iSCSI
    5. Chapter 13 Develop a Storage Security Policy
      1. Lab 13.1 Backing Up a Filesystem
      2. Lab 13.2 Developing a Backup Security Policy
  18. Part IV Automation
    1. Chapter 14 Crontab and At
      1. Lab 14.1 Managing crontab
      2. Lab 14.2 Configuring at Commands
    2. Chapter 15 Scripting
      1. Lab 15.1 Script Project #1
      2. Lab 15.2 Script Project #2
    3. Chapter 16 Common Automation Tasks
      1. Lab 16.1 Script Project #3
      2. Lab 16.2 Script Project #4
    4. Chapter 17 Develop an Automation Security Policy
      1. Lab 17.1 Securing crontab and at
      2. Lab 17.2 Creating an Automation Security Policy
  19. Part V Networking
    1. Chapter 18 Networking Basics
      1. Lab 18.1 Exploring Networking Components
    2. Chapter 19 Network Configuration
      1. Lab 19.1 Understanding Network Configuration on CentOS
      2. Lab 19.2 Understanding Network Configuration on Ubuntu
    3. Chapter 20 Network Service Configuration: Essential Services
      1. Lab 20.1 Configuring a BIND Server
      2. Lab 20.2 Configuring a Postfix Server
    4. Chapter 21 Network Service Configuration: Web Services
      1. Lab 21.1 Configuring and Administering an Apache Server
      2. Lab 21.2 Configuring a Proxy Server
    5. Chapter 22 Connecting to Remote Systems
      1. Lab 22.1 Configuring an FTP Server
      2. Lab 22.2 Administering an SSH Server
    6. Chapter 23 Develop a Network Security Policy
      1. Lab 23.1 Administering Kernel Security Parameters
      2. Lab 23.2 Securing a System with TCP Wrappers
      3. Lab 23.3 Configuring Network Time Protocol
      4. Lab 23.4 Creating a Networking Security Policy
  20. Part VI Process and Log Administration
    1. Chapter 24 Process Control
      1. Lab 24.1 Managing System Processes
      2. Lab 24.2 Displaying System Information
    2. Chapter 25 System Logging
      1. Lab 25.1 Managing Log Files
      2. Lab 25.2 Configuring Log Rotation
  21. Part VII Software Management
    1. Chapter 26 Red Hat-Based Software Management
      1. Lab 26.1 Managing Software Packages with rpm
      2. Lab 26.2 Managing Software Packages with yum
    2. Chapter 27 Debian-Based Software Management
      1. Lab 27.1 Managing Software Packages with dpkg
      2. Lab 27.2 Managing Software Packages with apt
    3. Chapter 28 System Booting
      1. Lab 28.1 Configuring GRUB Security
      2. Lab 28.2 Managing the Startup Process
    4. Chapter 29 Develop a Software Management Security Policy
      1. Lab 29.1 Exploring Common Vulnerabilities and Exposure Reports
      2. Lab 29.2 Managing and Securing Legacy Services
  22. Part VIII Security Tasks
    1. Chapter 30 Footprinting
      1. Lab 30.1 Using Probing Tools
      2. Lab 30.2 Scanning the Network
    2. Chapter 31 Firewalls
      1. Lab 31.1 Creating a Firewall to Protect a System
    3. Chapter 32 Intrusion Detection
      1. Lab 32.1 Creating an Intrusion Detection Security Plan
    4. Chapter 33 Additional Security Tasks
      1. Lab 33.1 Configuring fail2ban
      2. Lab 33.2 Encrypting Files with gpg
  23. Code Snippets