Home > Store

Linux Essentials for Cybersecurity,Rough Cuts

Linux Essentials for Cybersecurity,Rough Cuts

Rough Cuts

  • Available to Safari Subscribers
  • About Rough Cuts
  • Rough Cuts are manuscripts that are developed but not yet published, available through Safari. Rough Cuts provide you access to the very latest information on a given topic and offer you the opportunity to interact with the author to influence the final publication.

Also available in other formats.


  • Copyright 2019
  • Dimensions: 8" x 10"
  • Pages: 800
  • Edition: 1st
  • Rough Cuts
  • ISBN-10: 0-13-485304-0
  • ISBN-13: 978-0-13-485304-8

This is the Rough Cut version of the printed book.

Linux distributions are widely used by technical professionals to support mission-critical applications and manage crucial data. But safeguarding Linux systems can be complex, and many guides to Linux usage and certification provide only superficial coverage of security. Linux Essentials for Cybersecurity is the solution. Part of the new Pearson IT Cybersecurity Curriculum (ITCC), it introduces Linux with the primary goal of enforcing and troubleshooting security. Leading Linux certification and security experts William “Bo” Rothwell and Denise Kinsey, PhD offer a layered approach to security that helps readers protect their Linux systems even if one or more layers are penetrated.

Rothwell and Kinsey show how to install Linux to achieve optimal security right from the outset, even if you have no experience with Linux at all. Next the authors present best practices for the secure day-to-day administration of accounts, devices, services, processes, data, networks, and more. To increase readers’ sophistication in defending Linux systems, the authors also walk through the use of powerful tools and automated scripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more. Finally, to help readers earn certification and demonstrate their abilities, the authors cover many key topics found on the CompTIA Linux+ and LPIC-1 certification exams. 

This guide’s features include:

  • Logical organization designed for easy understanding, effective classroom use, and rapid on-the-job-training
  • Strong emphasis on modern real-world security troubleshooting techniques throughout -- not just in separate sections
  • Real-world examples and step-by-step activities that permit hands-on practice without expensive equipment
  • Key terms, chapter objectives, review questions, and more

Sample Content

Table of Contents


Part I: Introducing Linux
1. Distributions and Key Components
2. Working on the Command Line
3. Getting Help
4. Editing Files
5. When Things Go Wrong

Part II: User and Group Accounts
6. Managing Group Accounts
7. Managing User Accounts
8. Developing an Account Security Policy

Part III: File and Data Storage
9. File Permissions
10. Managing Local Storage
11. Managing Network Storage
12. Developing a Storage Security Policy

Part IV: Automation
13. Crontab and at
14. Scripting
15. Common Automation Tasks
16. Developing an Automation Security Policy

Part V: Networking
17. Networking Basics
18. Network Configuration
19. Network Service Configuration
20. Connecting to Remote Systems
21. Developing a Network Security Policy

Part VI: Process and Log Administration
22. Process Control
23. System Logging
24. Developing a Process and Log Security Policy

Part VII: Software Management
25. Red Hat-based Software Management
26. Debian-based Software Management
27. Additional Management Tools
28. System Booting
29. Developing a Software Management Security Policy

Part VIII: Security Tasks
30. Footprinting
31. Firewalls
32. Intrusion Detection Systems
33. Additional Security Tasks

Appendix A. Resource Guide



Submit Errata

More Information