
Linux
Andy Vickler
Did you wonder what the Linux operating system is and how you can install it on your system? Do you want to learn how to separate the Linux operating system from the main operating system used? Have you been trying to learn how to perform penetration...
Location:
United States
Description:
Did you wonder what the Linux operating system is and how you can install it on your system? Do you want to learn how to separate the Linux operating system from the main operating system used? Have you been trying to learn how to perform penetration testing or other ethical hacking processes to determine the security of the server or network? If you answered yes to these questions, then you have come to the right place. Linux is an operating system used by system administrators and hackers to manage the server or network's security. You can use the operating system to address business demands, including network administration, system administration, and database management. In this book, you will learn more about the different techniques to help you protect the system from a security breach and how you can protect the files and data you have on your system. In this book, you will first learn about how you can use Linux on virtual machines. You will also learn about the different tools you can use to harden the network and server's security. You will learn about the different permissions and accesses and how you can use it to enhance the security of setting the security. You will also learn about how you can perform a penetration test, or an ethical hack, to scan the system and see what you can do to improve the settings. Over the course of this book, you will discover how to: ● Installing Linux on your system and accessing it using a virtual machine ● Secure user accounts using passwords and ACLs ● Perform tests to identify any vulnerabilities in the network and server, and more! If you are eager to learn more about Linux, grab a copy of this book today! Duration - 4h 8m. Author - Andy Vickler. Narrator - Helpful Matthew. Published Date - Thursday, 04 January 2024. Copyright - © 2021 Andy Vickler ©.
Language:
English
Opening Credits
Duration:00:00:09
Introduction
Duration:00:02:32
Chapter 1: Using linux on virtual machines
Duration:00:37:49
Chapter 2: Securing user accounts on linux
Duration:00:31:16
Chapter 3: Securing servers using firewalls
Duration:00:23:47
Chapter 4: Securing your server
Duration:00:45:25
Chapter 5: Password encryption methods in linux
Duration:00:16:26
Chapter 6: Tools to encrypt and decrypt password protected files
Duration:00:14:13
Chapter 7: Using tools to encrypt files on linux
Duration:00:06:57
Chapter 8: Using cryptsetup to setup encrypted filesystems and swap space
Duration:00:12:26
Chapter 9: Using access control lists in linux
Duration:00:08:22
Chapter 10: Downloading and installing kali linux
Duration:00:21:09
Chapter 11: The penetration testing life cycle
Duration:00:06:46
Chapter 12: Scanning
Duration:00:19:11
Conclusion
Duration:00:01:27
Ending Credits
Duration:00:00:17