Linux Essentials for Cybersecurity

Upgrade your Linux skills! Secure your digital assets from cyberattacks and hackers.

(Pearson-linux-ess-cybersec-complete) / ISBN : 978-1-64459-036-2
This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
Video Lessons (Add-on)
AI Tutor (Add-on)
168 Reviews
Get A Free Trial

About This Course

Linux Essentials for Cybersecurity is a comprehensive online training course that equips you with the knowledge and skills needed to build a career in the high-demand field of cybersecurity. Gain knowledge of the core concepts, tools, and best practices of security in Linux environments. Learn how to manage user accounts, enforce access controls, and implement security policies to safeguard your data when using technology. Get trained on practical cybersecurity challenges with our hands-on exercises that mimic real-world scenarios. By the end of this course, you’ll be able to troubleshoot and resolve security issues with Linux.

Skills You’ll Get

  • Expertise with command-line for interacting with the Linux system
  • File and directory management using Linux commands
  • Package management (apt, yum) for installing, updating, and removing software 
  • Create user accounts, manage groups, access and permissions
  • Manage network interface configuration and connectivity
  • Install firewalls to control network traffic
  • Implement security policies to protect systems and data
  • Identify and resolve security threats using Intrusion Detection System (IDS)
  • Automate tasks and improve efficiency with shell scripting
  • Understanding of the Linux boot process and its components

1

Introduction

2

Distributions and Key Components

  • Introducing Linux
  • Linux Distributions
  • Installing Linux
  • Summary
3

Working on the Command Line

  • File Management
  • Shell Features
  • Advanced Commands
  • Summary
4

Getting Help

  • Man Pages
  • Command Help Options
  • The help Command
  • The info Command
  • The /usr/share/doc Directory
  • Internet Resources
  • Summary
5

Editing Files

  • The vi Editor
  • Additional Editors
  • Summary
6

When Things Go Wrong

  • The Science of Troubleshooting
  • Notifying Users
  • Summary
7

Managing Group Accounts

  • What Are Groups Used For?
  • Managing Groups
  • Summary
8

Managing User Accounts

  • The Importance of User Accounts
  • Managing Users
  • Network-Based User Accounts
  • Using su and sudo
  • Restricting User Accounts
  • Summary
9

Develop an Account Security Policy

  • Introducing Kali Linux
  • Security Principles
  • Creating a Security Policy
  • Securing Accounts
  • Security Tools
  • Summary
10

File Permissions

  • Standard Permissions
  • Default Permissions
  • Special Permissions
  • Access Control Lists (ACLs)
  • Changing Ownership
  • File Attributes
  • Introduction to SELinux
  • Summary
11

Manage Local Storage: Essentials

  • Filesystem Essentials
  • Filesystem Types
  • Additional Filesystem Tools
  • Mounting Filesystems
  • Summary
12

Manage Local Storage: Advanced Features

  • Encrypted Filesystems
  • Managing autofs
  • Logical Volume Manager
  • Disk Quotas
  • Hard and Soft Links
  • Summary
13

Manage Network Storage

  • Samba
  • Network File System
  • Summary
14

Develop a Storage Security Policy

  • Developing the Plan
  • Backing Up Data
  • Summary
15

crontab and at

  • Using crontab
  • Using at
  • Summary
16

Scripting

  • Linux Programming
  • Basics of BASH Scripting
  • Flow Control Statements
  • User Interaction
  • Using Command Substitution
  • Additional Information
  • Summary
17

Common Automation Tasks

  • Exploring Scripts that Already Exist on Your System
  • Creating Your Own Automation Scripts
  • Summary
18

Develop an Automation Security Policy

  • Securing crontab and at
  • Securing BASH Scripts
  • Summary
19

Networking Basics

  • Network Terminology
  • IPv4 Versus IPv6
  • IPv4 Addresses
  • Common Protocol Suites
  • Network Ports
  • Summary
20

Network Configuration

  • Ethernet Network Interfaces
  • Persistent Network Configurations
  • Network Troubleshooting Commands
  • Access to Wireless Networks
  • Summary
21

Network Service Configuration: Essential Services

  • DNS Servers
  • Zone Files
  • Securing BIND
  • DHCP Server
  • Email Servers
  • Managing Local Email Delivery
  • Remote Email Delivery
  • Summary
22

Network Service Configuration: Web Services

  • Apache Web Server
  • Basic Apache Web Server Configuration
  • Apache Web Server Security
  • Virtual Hosts
  • HTTPS
  • SSL and Apache
  • Proxy Servers
  • Summary
23

Connecting to Remote Systems

  • LDAP
  • FTP Servers
  • Secure Shell
  • Summary
24

Develop a Network Security Policy

  • Kernel Parameters
  • TCP Wrappers
  • Network Time Protocol
  • Summary
25

Process Control

  • Viewing Processes
  • Running Processes
  • Killing Process
  • The nohup Command
  • Process Priority
  • Summary
26

System Logging

  • Syslog
  • The logrotate Command
  • The journalctl Command
  • Summary
27

Red Hat–Based Software Management

  • Red Hat Packages
  • Using the rpm Command
  • The yum Command
  • Additional Tools
  • Summary
28

Debian-Based Software Management

  • Managing Packages with dpkg
  • Managing Packages with APT
  • Listing Package Information with APT Commands
  • Summary
29

System Booting

  • Phases of the Boot Process
  • GRUB
  • Kernel Components
  • The init Phase
  • Summary
30

Develop a Software Management Security Policy

  • Ensuring Software Security
  • xinetd
  • Summary
31

Footprinting

  • Understanding Footprinting
  • Common Footprinting Tools
  • Kali Linux Utilities
  • Summary
32

Firewalls

  • Introduction to Firewalls
  • Essentials of the iptables Command
  • Using iptables to Filter Incoming Packets
  • Using iptables to Filter Outgoing Packets
  • Implementing NAT
  • Summary
33

Intrusion Detection

  • Introduction to Intrusion Detection Tools
  • Intrusion Detection Network Tools
  • Intrusion Detection File Tools
  • Additional Intrusion Detection Tools
  • Summary
34

Additional Security Tasks

  • The fail2ban Service
  • OpenVPN
  • gpg
  • Security Alert Services
  • Summary
A

Appendix A: Resource Guide

  • Resources by Lesson
36

CompTIA Linux+ LX0-103 and LPIC-1 (Exam 101)

37

CompTIA Linux+ LX0-103 and LPIC-1 (Exam 102)

1

Distributions and Key Components

  • Installing Kali Linux
  • Installing Ubuntu
  • Installing CentOS
2

Working on the Command Line

  • Managing Files Using the Command Line
  • Using Shell Features
  • Compressing Files
3

Getting Help

  • Getting Help Using the man Command
  • Getting Help Using the info Command
4

Editing Files

  • Editing Files using the Vim Editor
5

When Things Go Wrong

  • Troubleshooting Linux Issues
  • Configuring User Notifications
6

Managing Group Accounts

  • Managing Group Accounts
  • Managing Group Administrators
7

Managing User Accounts

  • Managing User Accounts
  • Securing User Accounts
  • Configuring sudo
8

Develop an Account Security Policy

  • Developing an Account Security Policy
  • Testing the Security of Accounts
9

File Permissions

  • Managing File Permissions
  • Managing Special Permissions
  • Enabling Access Control Lists
  • Managing File Ownership and Attributes
  • Monitoring Security Issues with SELinux
10

Manage Local Storage: Essentials

  • Creating Partitions and Filesystems
  • Mounting Filesystems at Boot
  • Managing Swap Devices
11

Manage Local Storage: Advanced Features

  • Managing Encrypted Filesystems
  • Managing Hard and Soft Links
12

Manage Network Storage

  • Configuring Samba
  • Administering NFS
13

Develop a Storage Security Policy

  • Backing Up a Filesystem
  • Developing a Backup Security Policy
14

crontab and at

  • Managing crontab
  • Configuring at Commands
15

Scripting

  • Using the Bash Shell Script to Display System Info
  • Validating the User Input
16

Common Automation Tasks

  • Performing a System Check
  • Using Script that will Back Up All the Files
17

Develop an Automation Security Policy

  • Securing crontab and at
  • Creating an Automation of Security Policy
18

Networking Basics

  • Obtaining the Standard Ports for the Protocols
19

Network Configuration

  • Understanding Network Configuration on CentOS
  • Understanding Network Configuration on Ubuntu
20

Network Service Configuration: Essential Services

  • Configuring a BIND Server
  • Configuring a Postfix Server
21

Network Service Configuration: Web Services

  • Configuring and Administering an Apache Server
  • Configuring a Proxy Server
22

Connecting to Remote Systems

  • Configuring an FTP Server
  • Administering an SSH Server
23

Develop a Network Security Policy

  • Administering Kernel Security Parameters
  • Securing a System with TCP Wrappers
  • Examining an Intrusion Detection Security Policy
  • Configuring Chrony
24

Process Control

  • Managing System Processes
  • Displaying System Information
25

System Logging

  • Managing Log Files
  • Configuring Log Rotation
26

Red Hat–Based Software Management

  • Managing Software Packages with rpm
  • Managing Software Packages with dnf
27

Debian-Based Software Management

  • Managing Software Packages with dpkg
28

System Booting

  • Managing the Startup Process
  • Configuring GRUB Security
29

Develop a Software Management Security Policy

  • Exploring Common Vulnerabilities and Exposure Reports
  • Managing and Securing Legacy Services
30

Footprinting

  • Using Probing Tools
  • Scanning the Network
31

Firewalls

  • Configuring Linux Firewall using iptable
32

Intrusion Detection

  • Examining an Intrusion Detection Security Policy
33

Additional Security Tasks

  • Configuring fail2ban
  • Encrypting Files with gpg

Why Do Learners Love This Course?

The uCertify Linux Essentials for Cybersecurity course is well organized, clear and with exercises to test your understanding. I just wanted to share this very complete course for any students or professionals interested in studying Linux for Cybersecurity.

Marc Calache
Marc Calache
Cyber Security Analyst

Any questions?
Check out the FAQs

Here’s everything you need to know about the Linux Essentials for Cybersecurity course.

Contact Us Now

It is a great starting point for those wanting to make a career in cybersecurity or those wanting to build on their existing Linux skills for career advancement. Also, those preparing for advanced certifications like CompTIA Linux+ and LPIC-1 certifications can also benefit greatly from this course.

No, you don’t need prior experience to take this course. However, we recommend you should have some knowledge of Linux command line for better understanding of more advanced topics.

You’ll be exploring a wide range of essential cybersecurity tools including firewalls, intrusion detection systems (IDS), packet analyzers, encryption tools, password managers, security scanners, log analysis tools, and security improvement tools.

Yes, you will be awarded a certificate of completion.

It is a self-paced course that can be completed within 1 year after enrollment.

Hands-on Linux for Cybersecurity Training

Boost your career goals with advanced Linux skills

$ 198

Buy Now

Related Courses

All Course
scroll to top