Useful Links
1. Introduction to Linux and System Administration
2. The Command-Line Interface (CLI)
3. User and Group Management
4. File Permissions and Ownership
5. Process Management
6. Software and Package Management
7. System Services and Daemons
8. Networking
9. Storage Management
10. System Security
11. Shell Scripting and Automation
12. System Monitoring and Performance
13. Backup and Recovery
14. Advanced Topics
  1. Computer Science
  2. Operating Systems
  3. Linux

Linux Administration

1. Introduction to Linux and System Administration
2. The Command-Line Interface (CLI)
3. User and Group Management
4. File Permissions and Ownership
5. Process Management
6. Software and Package Management
7. System Services and Daemons
8. Networking
9. Storage Management
10. System Security
11. Shell Scripting and Automation
12. System Monitoring and Performance
13. Backup and Recovery
14. Advanced Topics
  1. System Security
    1. Principles of System Hardening
      1. Minimizing Attack Surface
        1. Disabling Unused Services
          1. Applying Security Updates
            1. Secure Configuration Practices
            2. Firewall Management
              1. Concepts of Firewalls
                1. Managing Rules with iptables
                  1. Using firewalld
                    1. Using ufw (Uncomplicated Firewall)
                      1. Opening and Closing Ports
                        1. Saving and Restoring Rules
                        2. Intrusion Detection and Prevention
                          1. Host-Based Intrusion Detection Systems (HIDS)
                            1. Monitoring Suspicious Activity
                              1. Security Auditing Tools
                              2. Security-Enhanced Linux (SELinux) and AppArmor
                                1. SELinux Concepts
                                  1. Modes
                                    1. Enforcing
                                      1. Permissive
                                        1. Disabled
                                        2. Policy Types
                                          1. Managing Contexts
                                          2. AppArmor Concepts
                                            1. Profiles and Modes
                                              1. Managing Profiles
                                              2. Basic Policy Management
                                                1. Allowing and Denying Access
                                                  1. Troubleshooting Denials
                                                2. Auditing and Logging
                                                  1. System Logs in /var/log
                                                    1. Log File Types
                                                      1. Log Rotation
                                                      2. Syslog and Rsyslog
                                                        1. Configuration and Management
                                                        2. Monitoring and Analyzing Logs

                                                      Previous

                                                      9. Storage Management

                                                      Go to top

                                                      Next

                                                      11. Shell Scripting and Automation

                                                      © 2025 Useful Links. All rights reserved.

                                                      About•Bluesky•X.com