The third edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments.

Features & Benefits

  • Mapped to Linux+ that spans Linux Essentials and Linux Security.
  • Accounts for the latest Linux distributions and kernels, including end of life for CentOS.
  • Covers new Linux-based technologies and security strategies.
  • Discusses the Microsoft acquisition of Red Hat and rise of commercialized Open Source.
  • Coverage of virtualization, including coverage of Docker and other sandboxing technologies like Firejai.
  • Instructor resources include an Instructor Guide, slides in PowerPoint format, a test guide, sample syllabi, Time on Task documentation, and a content map.

Cloud Labs

  • Lab 1 - Installing a Core Linux Operating System on a Server 
  • Lab 2 - Configuring Basic Security Controls on a CentOS Linux Server 
  • Lab 3 - Hardening Security with User Account Management and Security Controls 
  • Lab 4 - Applying Hardened Linux Filesystem Security Controls 
  • Lab 5 - Hardening Security for Linux Services and Applications 
  • Lab 6 - Hardening Security by Controlling Access 
  • Lab 7 - Hardening Security for the Linux Kernel 
  • Lab 8 - Applying Best Practices for Secure Software Management 
  • Lab 9 - Applying Best Practices for Security Monitoring and Logging 
  • Lab 10 - Defining Linux OS and Application Backup and Recovery Procedure

Appropriate Courses

  • Linux Operating Systems
  • Introduction to UNIX/Linux
  • Linux Operating System Security
  • Linux Administration
  • Securing Linux Systems
  • Linux Networking and Security