Skip to main content
  1. Home
  2. Computer Science & IT
  3. IT Professional
  4. Certification
  5. Linux Essentials for Cybersecurity

Linux Essentials for Cybersecurity, 1st edition

  • Denise Kinsey
  • William Rothwell
Linux Essentials for Cybersecurity

ISBN-13:  9780789759351

Free delivery
Free delivery

What's included

  • Paperback

    You'll get a bound printed text.



From the basics to advanced techniques: no Linux security experience necessary
Realistic examples & step-by-step activities: practice hands-on without costly equipment
The perfect introduction to Linux-based security for all students and IT professionals

Linux distributions are widely used to support mission-critical applications and manage crucial data. But safeguarding modern Linux systems is complex, and many Linux books have inadequate or outdated security coverage.

Linux Essentials for Cybersecurity is your complete solution. Leading Linux certification and security experts William “Bo” Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of enforcing and troubleshooting security. Their practical approach will help you protect systems, even if one or more layers are penetrated.

First, you’ll learn how to install Linux to achieve optimal security upfront, even if you have no Linux experience. Next, you’ll master best practices for securely administering accounts, devices, services, processes, data, and networks. Then, you’ll master powerful tools and automated scripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more.

To help you earn certification and demonstrate skills, this guide covers many key topics on CompTIA Linux+ and LPIC-1 exams. Everything is organized clearly and logically for easy understanding, effective classroom use, and rapid on-the-job training.


  • Review Linux operating system components from the standpoint of security
  • Master key commands, tools, and skills for securing Linux systems
  • Troubleshoot common Linux security problems, one step at a time
  • Protect user and group accounts with Pluggable Authentication
  • Modules (PAM), SELinux, passwords, and policies
  • Safeguard files and directories with permissions and attributes
  • Create, manage, and protect storage devices: both local and networked
  • Automate system security 24/7 by writing and scheduling scripts
  • Maintain network services, encrypt network connections, and secure network-accessible processes
  • Examine which processes are running–and which may represent a threat
  • Use system logs to pinpoint potential vulnerabilities
  • Keep Linux up-to-date with Red Hat or Debian software management tools
  • Modify boot processes to harden security
  • Master advanced techniques for gathering system information

Table of contents

  • Introduction
  • Part I: Introducing Linux
  • 1. Distributions and Key Components
  • 2. Working on the Command Line
  • 3. Getting Help
  • 4. Editing Files
  • 5. When Things Go Wrong
  • Part II: User and Group Accounts
  • 6. Managing Group Accounts
  • 7. Managing User Accounts
  • 8. Developing an Account Security Policy
  • Part III: File and Data Storage
  • 9. File Permissions
  • 10. Managing Local Storage
  • 11. Managing Network Storage
  • 12. Developing a Storage Security Policy
  • Part IV: Automation
  • 13. Crontab and at
  • 14. Scripting
  • 15. Common Automation Tasks
  • 16. Developing an Automation Security Policy
  • Part V: Networking
  • 17. Networking Basics
  • 18. Network Configuration
  • 19. Network Service Configuration
  • 20. Connecting to Remote Systems
  • 21. Developing a Network Security Policy
  • Part VI: Process and Log Administration
  • 22. Process Control
  • 23. System Logging
  • 24. Developing a Process and Log Security Policy
  • Part VII: Software Management
  • 25. Red Hat-based Software Management
  • 26. Debian-based Software Management
  • 27. Additional Management Tools
  • 28. System Booting
  • 29. Developing a Software Management Security Policy
  • Part VIII: Security Tasks
  • 30. Footprinting
  • 31. Firewalls
  • 32. Intrusion Detection Systems
  • 33. Additional Security Tasks
  • Appendix A. Resource Guide
  • Glossary

For teachers

All the material you need to teach your courses.

Discover teaching material

Published by Pearson IT Certification (July 20th 2018) - Copyright © 2019