Mastering Linux Security and Hardening
eBook - ePub

Mastering Linux Security and Hardening

A practical guide to protecting your Linux system from cyber attacks, 3rd Edition

  1. 618 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Mastering Linux Security and Hardening

A practical guide to protecting your Linux system from cyber attacks, 3rd Edition

About this book

Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threatsPurchase of the print or Kindle book includes a free eBook in PDF format.

Key Features

  • Discover security techniques to prevent malware from infecting a Linux system, and detect it
  • Prevent unauthorized people from breaking into a Linux system
  • Protect important and sensitive data from being revealed to unauthorized persons

Book Description

The third edition of Mastering Linux Security and Hardening is an updated, comprehensive introduction to implementing the latest Linux security measures, using the latest versions of Ubuntu and AlmaLinux.In this new edition, you will learn how to set up a practice lab, create user accounts with appropriate privilege levels, protect sensitive data with permissions settings and encryption, and configure a firewall with the newest firewall technologies. You'll also explore how to use sudo to set up administrative accounts with only the privileges required to do a specific job, and you'll get a peek at the new sudo features that have been added over the past couple of years. You'll also see updated information on how to set up a local certificate authority for both Ubuntu and AlmaLinux, as well as how to automate system auditing. Other important skills that you'll learn include how to automatically harden systems with OpenSCAP, audit systems with auditd, harden the Linux kernel configuration, protect your systems from malware, and perform vulnerability scans of your systems. As a bonus, you'll see how to use Security Onion to set up an Intrusion Detection System.By the end of this new edition, you will confidently be able to set up a Linux server that will be secure and harder for malicious actors to compromise.

What you will learn

  • Prevent malicious actors from compromising a production Linux system
  • Leverage additional features and capabilities of Linux in this new version
  • Use locked-down home directories and strong passwords to create user accounts
  • Prevent unauthorized people from breaking into a Linux system
  • Configure file and directory permissions to protect sensitive data
  • Harden the Secure Shell service in order to prevent break-ins and data loss
  • Apply security templates and set up auditing

Who this book is for

This book is for Linux administrators, system administrators, and network engineers interested in securing moderate to complex Linux environments. Security consultants looking to enhance their Linux security skills will also find this book useful. Working experience with the Linux command line and package management is necessary to understand the concepts covered in this book.

]]>

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Mastering Linux Security and Hardening by Donald A. Tevault in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Networking. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. Preface
  2. Setting up a Secure Linux System
  3. Running Linux in a Virtual Environment
  4. Securing Administrative User Accounts
  5. Securing Normal User Accounts
  6. Securing Your Server with a Firewall – Part 1
  7. Securing Your Server with a Firewall — Part 2
  8. Encryption Technologies
  9. SSH Hardening
  10. Mastering File and Directory Access Control (DAC)
  11. Mastering Discretionary Access Control
  12. Access Control Lists and Shared Directory Management
  13. Advanced System Hardening Techniques
  14. Implementing Mandatory Access Control with SELinux and AppArmor
  15. Kernel Hardening and Process Isolation
  16. Scanning, Auditing, and Hardening
  17. Logging and Log Security
  18. Vulnerability Scanning and Intrusion Detection
  19. Prevent Unwanted Programs from Running
  20. Security Tips and Tricks for the Busy Bee
  21. Other Books You May Enjoy
  22. Index