Chapter 32. Intrusion Detection

This lab should be performed on the CentOS operating system that you installed in Chapter 1, “Distributions and Key Components.” Before you begin this lab, log in to the student account that you created during the installation process.

Lab 32.1 Creating an Intrusion Detection Security Plan

This lab doesn’t have a specific correct answer. The goal is to use what you learned in Chapter 32 of Linux Essentials for Cybersecurity to develop security policies for intrusion detection.

As a starting point, you can make use of some excellent sample security policies available at https://www.sans.org/security-resources/policies. You may find some policies at this site very useful, as some are specific to accounts. For example, ...

Get Linux Essentials for Cybersecurity Lab Manual, First Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.