Security Strategies in Linux Platforms and Applications Cloud Labs
Jones and Bartlett Publishers, Inc (Verlag)
978-1-284-25597-3 (ISBN)
- Titel z.Zt. nicht lieferbar
- Versandkostenfrei
- Auch auf Rechnung
- Artikel merken
It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments.
Cloud Labs for Security Strategies in Linux Platforms and Applications provide 180-day access to a fully immersive mock IT infrastructures with live virtual machines and real software, where students will learn and practice the foundational information security skills they will need to excel in their future careers. Unlike simulations, these hands-on virtual labs reproduce the complex challenges of the real world, without putting an institution's assets at risk.
Available as a standalone lab solution or bundled with Jones & Bartlett Learning textbooks, cybersecurity Cloud Labs are an essential tool for mastering key course concepts through hands-on training.
Labs:
Lab 1: Installing a Core Linux Operating System on a Server
Lab 2: Configuring Basic Security Controls on a CentOS Linux Server
Lab 3: Hardening Security with User Account Management and Security Controls
Lab 4: Applying Hardened Linux Filesystem Security Controls
Lab 5: Hardening Security for Linux Services and Applications
Lab 6: Hardening Security by Controlling Access
Lab 7: Hardening Security for the Linux Kernel
Lab 8: Applying Best Practices for Secure Software Management
Lab 9: Applying Best Practices for Security Monitoring and Logging
Lab 10: Defining Linux OS and Application Backup and Recovery Procedure
RIC MESSIER has been working with Unix and Unix-like operating systems since the mid-1980s. In the intervening decades, he has done system administration, network engineering, penetration testing, and programming; developed managed security services; and worked in operations security and a number of other jobs in between.Ric is a security professional who has worked with a number of companies from large Internet service providers to small software companies. He has run a small networking and security consulting practice for the last several years. Additionally, he has taught courses at both the graduate and undergraduate level. Currently, in addition to writing books and recording training videos, he is a Principal Consultant with Mandiant.' Michael Jang (RHCE, LPIC-2, UCP, Linux , MCP) has been a freelance technical writer since 1998. He had previously worked for more than 10 years as a specialist engineer at Boeing Commercial Airplane Group. Michael has written white papers on new products and processes. He’s also the author of more than two-dozen IT books, including LPIC-1 In Depth (2009) and Ubuntu Server Administration Course (for VTC in 2009). Finally, Michael travels overseas extensively to troubleshoot IT issues and manage projects.
| Erscheinungsdatum | 09.04.2024 |
|---|---|
| Verlagsort | Sudbury |
| Sprache | englisch |
| Gewicht | 1814 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| ISBN-10 | 1-284-25597-2 / 1284255972 |
| ISBN-13 | 978-1-284-25597-3 / 9781284255973 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich