Security Strategies in Linux Platforms and Applications, Third Edition
- 13h 3m
- Michael Jang, Ric Messier
- Jones and Bartlett Learning
- 2024
The third edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments.
Features and Benefits
- Mapped to Linux+ that spans Linux Essentials and Linux Security
- Accounts for the latest Linux distributions and kernels, including end of life for CentOS
- Covers new Linux-based technologies and security strategies
- Discusses the Microsoft acquisition of Red Hat and rise of commercialized Open Source
- Coverage of virtualization, including coverage of Docker and other sandboxing technologies like Firejai
- Instructor resources include an Instructor Guide, slides in PowerPoint format, a test guide, sample syllabi, Time on Task documentation, and a content map
About the Author
Ric Messier - GCIH, GSEC, CEH, CISSP, Senior Information Security Consultant, Mandiant Consulting, a FireEye company
Ric Messier has been working with Unix and Unix-like operating systems since the mid-1980s. In the intervening decades, he has done system administration, network engineering, penetration testing, and programming; developed managed security services; and worked in operations security and a number of other jobs in between.
Ric is a security professional who has worked with a number of companies from large Internet service providers to small software companies. He has run a small networking and security consulting practice for the last several years. Additionally, he has taught courses at both the graduate and undergraduate level. Currently, in addition to writing books and recording training videos, he is a Principal Consultant with Mandiant.
Michael Jang - Senior Staff Technical Writer, ForgeRock
Michael Jang (RHCE, LPIC-2, UCP, Linux+, MCP) has been a freelance technical writer since 1998. He had previously worked for more than 10 years as a specialist engineer at Boeing Commercial Airplane Group. Michael has written white papers on new products and processes. He’s also the author of more than two-dozen IT books, including LPIC-1 In Depth (2009) and Ubuntu Server Administration Course (for VTC in 2009). Finally, Michael travels overseas extensively to troubleshoot IT issues and manage projects.
In this Book
-
Purpose of This Book
-
Security Threats to Linux
-
Basic Components of Linux Security
-
Starting Off—Getting Up and Running
-
User Privileges and Permissions
-
Filesystems, Volumes, and Encryption
-
Securing Services
-
Networks, Firewalls, and More
-
Networked Filesystems and Remote Access
-
Networked Application Security
-
Kernel Security Risk Mitigation
-
Managing Security Alerts and Updates
-
Building and Maintaining a Security Baseline
-
Testing and Reporting
-
Detecting and Responding to Security Breaches
-
Best Practices and Emerging Technologies
-
References