
Linux
Andy Vickler
Did you wonder what the Linux operating system is and how you can install it on your system? Do you want to learn how to separate the Linux operating system from the main operating system used? Have you been trying to learn how to perform penetration...
Location:
United States
Description:
Did you wonder what the Linux operating system is and how you can install it on your system? Do you want to learn how to separate the Linux operating system from the main operating system used? Have you been trying to learn how to perform penetration testing or other ethical hacking processes to determine the security of the server or network? If you answered yes to these questions, then you have come to the right place. Linux is an operating system used by system administrators and hackers to manage the server or network's security. You can use the operating system to address business demands, including network administration, system administration, and database management. In this book, you will learn more about the different techniques to help you protect the system from a security breach and how you can protect the files and data you have on your system. In this book, you will first learn about how you can use Linux on virtual machines. You will also learn about the different tools you can use to harden the network and server's security. You will learn about the different permissions and accesses and how you can use it to enhance the security of setting the security. You will also learn about how you can perform a penetration test, or an ethical hack, to scan the system and see what you can do to improve the settings. Over the course of this book, you will discover how to: ● Installing Linux on your system and accessing it using a virtual machine ● Secure user accounts using passwords and ACLs ● Perform tests to identify any vulnerabilities in the network and server, and more! If you are eager to learn more about Linux, grab a copy of this book today! Duration - 4h 8m. Author - Andy Vickler. Narrator - Helpful Matthew. Published Date - Thursday, 04 January 2024. Copyright - © 2021 Andy Vickler ©.
Language:
English
Opening Credits
Duración:00:00:09
Introduction
Duración:00:02:32
Chapter 1: Using linux on virtual machines
Duración:00:37:49
Chapter 2: Securing user accounts on linux
Duración:00:31:16
Chapter 3: Securing servers using firewalls
Duración:00:23:47
Chapter 4: Securing your server
Duración:00:45:25
Chapter 5: Password encryption methods in linux
Duración:00:16:26
Chapter 6: Tools to encrypt and decrypt password protected files
Duración:00:14:13
Chapter 7: Using tools to encrypt files on linux
Duración:00:06:57
Chapter 8: Using cryptsetup to setup encrypted filesystems and swap space
Duración:00:12:26
Chapter 9: Using access control lists in linux
Duración:00:08:22
Chapter 10: Downloading and installing kali linux
Duración:00:21:09
Chapter 11: The penetration testing life cycle
Duración:00:06:46
Chapter 12: Scanning
Duración:00:19:11
Conclusion
Duración:00:01:27
Ending Credits
Duración:00:00:17