Mastering Linux Security and Hardening: A practical guide to protecting your Linux system from cyber attacks
$27.32
Description
Book Synopsis: Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threats. Purchase of the print or Kindle book includes a free eBook in PDF format.
Key Features
- Discover security techniques to prevent malware from infecting a Linux system, and detect it
- Prevent unauthorized people from breaking into a Linux system
- Protect important and sensitive data from being revealed to unauthorized persons
Book Description
The third edition of Mastering Linux Security and Hardening is an updated, comprehensive introduction to implementing the latest Linux security measures, using the latest versions of Ubuntu and AlmaLinux.
In this new edition, you will learn how to set up a practice lab, create user accounts with appropriate privilege levels, protect sensitive data with permissions settings and encryption, and configure a firewall with the newest firewall technologies. You'll also explore how to use sudo to set up administrative accounts with only the privileges required to do a specific job, and you'll get a peek at the new sudo features that have been added over the past couple of years. You'll also see updated information on how to set up a local certificate authority for both Ubuntu and AlmaLinux, as well as how to automate system auditing. Other important skills that you'll learn include how to automatically harden systems with OpenSCAP, audit systems with auditd, harden the Linux kernel configuration, protect your systems from malware, and perform vulnerability scans of your systems. As a bonus, you'll see how to use Security Onion to set up an Intrusion Detection System.
By the end of this new edition, you will confidently be able to set up a Linux server that will be secure and harder for malicious actors to compromise.
What you will learn
- Prevent malicious actors from compromising a production Linux system
- Leverage additional features and capabilities of Linux in this new version
- Use locked-down home directories and strong passwords to create user accounts
- Prevent unauthorized people from breaking into a Linux system
- Configure file and directory permissions to protect sensitive data
- Harden the Secure Shell service in order to prevent break-ins and data loss
- Apply security templates and set up auditing
Who this book is for
This book is for Linux administrators, system administrators, and network engineers interested in securing moderate to complex Linux environments. Security consultants looking to enhance their Linux security skills will also find this book useful. Working experience with the Linux command line and package management is necessary to understand the concepts covered in this book.
Table of Contents
- Running Linux in a Virtual Environment
- Securing Administrative User Accounts
- Securing Normal User Accounts
- Securing Your Server with a Firewall - Part 1
- Securing Your Server with a Firewall - Part 2
- Encryption Technologies
- SSH Hardening
- Mastering Discretionary Access Control
- Access Control Lists and Shared Directory Management
- Implementing Mandatory Access Control with SELinux and AppArmor
- Kernel Hardening and Process Isolation
- Scanning, Auditing and Hardening
- Logging and Log Security
- Vulnerability Scanning and Intrusion Detection
- Prevent Unwanted Programs from Running
Security Tips & Tricks for the Busy Bee Read more
Details
Are you concerned about the security of your Linux system? Look no further! Mastering Linux Security and Hardening, now in its 3rd Edition, is the ultimate practical guide you need to protect your system from harmful cyber attacks. With the increasing threat of data breaches and malicious activities, ensuring the security of your Linux system has become more crucial than ever.
Written by renowned experts in the field, this book equips you with invaluable techniques and strategies to fortify your system's defenses. From securing the network and implementing robust authentication mechanisms to preventing unauthorized access and detecting potential vulnerabilities, this guide covers it all.
One of the greatest strengths of Mastering Linux Security and Hardening is its hands-on approach. With step-by-step instructions and real-world examples, you'll be able to implement security measures effectively even if you have limited experience in Linux security. Plus, the comprehensive coverage of the latest tools and best practices ensures you stay up-to-date with the rapidly evolving landscape of cyber threats.
Don't leave your Linux system vulnerable to cyber attacks. Take charge of your system's security today by grabbing your copy of Mastering Linux Security and Hardening, 3rd Edition. Arm yourself with the knowledge and skills to safeguard your valuable data and maintain peace of mind. Visit our website to order now!
Discover More Best Sellers in Security & Encryption
Shop Security & Encryption
ISC2 CCSP Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle
Security & Encryption - ISC2 CCSP Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle
How to Speak Tech: The Non-Techie’s Guide to Key Technology Concepts
Security & Encryption - How to Speak Tech: The Non-Techie’s Guide to Key Technology Concepts
Metasploit: The Penetration Tester's Guide
Security & Encryption - Metasploit: The Penetration Tester's Guide
Security & Encryption - CompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
Security & Encryption - Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, 2nd Edition
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Security & Encryption - Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks
Security & Encryption - Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks
Security & Encryption - Gifts for Women Who Have Everything: Password Book with Alphabetical Tabs: Internet Password Logbook with Website, Login, Password: Gifts for Mom, Wife, Mother, Grandma, Co-worker Who Wants Nothing
Security & Encryption - RMF Security Control Assessor: NIST 800-53A Security Control Assessment Guide: NIST 800 Cybersecurity, Book 3

