Tags
Language
Tags
January 2025
Su Mo Tu We Th Fr Sa
29 30 31 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

Linux: Linux Security and Administration

Posted By: silva1410
Linux: Linux Security and Administration

Linux: Linux Security and Administration
By Andy Vickler
English | ASIN : B08ZSVY6SL | 2021 | 114 pages | EPUB | 3.8 MB

Did you wonder what the Linux operating system is and how you can install it on your system? Do you want to learn how to separate the Linux operating system from the main operating system used? Have you been trying to learn how to perform penetration testing or other ethical hacking processes to determine the security of the server or network? If you answered yes to these questions, then you have come to the right place.
Linux is an operating system used by system administrators and hackers to manage the server or network's security. You can use the operating system to address business demands, including network administration, system administration, and database management. In this book, you will learn more about the different techniques to help you protect the system from a security breach and how you can protect the files and data you have on your system.

In this book, you will first learn about how you can use Linux on virtual machines. You will also learn about the different tools you can use to harden the network and server's security. You will learn about the different permissions and accesses and how you can use it to enhance the security of setting the security. You will also learn about how you can perform a penetration test, or an ethical hack, to scan the system and see what you can do to improve the settings.

Over the course of this book, you will discover how to:

Installing Linux on your system and accessing it using a virtual machine

Secure user accounts using passwords and ACLs

Secure the server using a firewall and other methods

Learn to decrypt and encrypt data sent over the network

Explore various methods to prevent hackers from accessing information in your system

Perform tests to identify any vulnerabilities in the network and server, and more!