Security Strategies in Linux Platforms and Applications, Second Edition

Security Strategies in Linux Platforms and Applications, Second Edition

Michael Jang and Ric Messier
ISBN-13: 978-1-284-09065-9
500 pages
© 2017

Learn More
Request a Review Copy

  • Description
  • Applied Labs
  • Table of Contents
  • Course Objectives
  • Resources

The Second Edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux–user and group options, filesystems, and security options for important services, as well as the security modules associated with AppArmor and SELinux. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system.

Key Features

  • Focuses on Linux as a server operating system.
  • Covers every major aspect of security on a Linux system.
  • Uses examples from Red Hat Enterprise Linux and Ubuntu Server Edition, two of the major distributions built for servers.
  • Explores open source and proprietary tools when building a layered security strategy for your Linux operating system.
  • Offers step-by-step instructions for identifying weaknesses and creating more secure systems.

This title is available with Virtual Security Cloud Labs – delivered in a first-of-its-kind cloud computing environment- that provides a fully immersive mock IT infrastructure enabling hands-on-experiential learning. An integrated lab manual is available to assist you with these labs.

Lab #1: Installing a Core Linux Operating System on a Server
Lab #2: Configuring Basic Security Controls on a Centos Linux Server
Lab #3: Hardening Security with User Account Management and Security Controls
Lab #4: Applying Hardened Linux File System Security Controls
Lab #5: Hardening Security for Linux Services and Applications
Lab #6: Hardening Security by Controlling Access
Lab #7: Hardening Security for the Linux Kernel
Lab #8: Applying Best Practices for Security Software Management
Lab #9: Applying Best Practices for Security Logging and Monitoring
Lab #10: Defining Linux OS and Application Backup and Recovery Procedures
Part 1: Is Linux Really Secure?
Chapter 1: Security Threats to Linux
Chapter 2: Basic Components of Linux Security
Part 2: Layered Security and Linux
Chapter 3: Basic Security: Facilities Through the Boot Process
Chapter 4: User Privileges and Permissions
Chapter 5: Filesystems, Volumes, and Encryption
Chapter 6: Every Service Is a Potential Risk
Chapter 7: Networks, Firewalls, and More
Chapter 8: Networked Filesystems and Remote Access
Chapter 9: Networked Application Security
Chapter 10: Kernel Security Risk Mitigation
Part 3: Building a Layered Linux Security Strategy
Chapter 11: Managing Security Alerts and Updates
Chapter 12: Building and Maintaining a Security Baseline
Chapter 13: Testing and Reporting
Chapter 14: Detecting and Responding to Security Breaches
Chapter 15: Best Practices and Emerging Technologies
  1. Identify threats to the Linux operating system and other open source applications.
  2. Configure the basic settings to secure a Linux platform.
  3. Explain user account management and the principle of least privilege to protect and secure the system and its data.
  4. Examine the flexibility of various options with file permissions and filesystem settings and how granular control isolates data access.
  5. Describe security solutions to mitigate vulnerabilities in Linux services and the appropriate steps to mitigate the risks.
  6. Assess how firewall, Transmission Control Protocol (TCP) Wrappers, and Security Enhanced Linux (SELinux) complement one another to secure network applications.
  7. Assess the architecture of the Linux kernel and techniques used to enact a more secure kernel.
  8. Evaluate the importance of maintaining a software management plan.
  9. Establish a system baseline with monitoring and logging to detect anomalies.
  10. Analyze the best practices to respond and recover from a security breach (incident).

Instructor Resources include:

  • PowerPoint Lectures
  • Instructor’s Guide
  • Test and Quiz Items
  • Sample Syllabus
  • Case Scenarios/Handouts
  • Handouts
  • Projects
  • Study Guide
  • Time on Task
  • Content Map