Home > Topics


Sander van Vugt

In this sample chapter from Red Hat RHCSA 8 Cert Guide: EX200, explore how the boot procedure on Red Hat Enterprise Linux is organized, including how to use Systemd targets to boot your Linux system into a specific state and how to apply changes to the GRUB 2 boot loader.

In this sample chapter from CompTIA Linux+ XK0-004 Cert Guide, you will review available technologies that enable an administrator to add another layer of protection on top of regular file and directory permissions.

In this sample chapter from AWS Certified SysOps Administrator - Associate (SOA-C01) Cert Guide, take a deep dive into the Shared Responsibility Model, security best practices, and available access controls to help secure cloud-based solutions.

In this sample chapter from Computer Security Fundamentals, 4th Edition, you will learn how to identify the top threats to a network: security breaches, denial of service attacks, and malware.

See More Articles