Useful Links
Computer Science
Operating Systems
Linux
Linux Administration
1. Introduction to Linux and System Administration
2. The Command-Line Interface (CLI)
3. User and Group Management
4. File Permissions and Ownership
5. Process Management
6. Software and Package Management
7. System Services and Daemons
8. Networking
9. Storage Management
10. System Security
11. Shell Scripting and Automation
12. System Monitoring and Performance
13. Backup and Recovery
14. Advanced Topics
System Security
Principles of System Hardening
Minimizing Attack Surface
Disabling Unused Services
Applying Security Updates
Secure Configuration Practices
Firewall Management
Concepts of Firewalls
Managing Rules with iptables
Using firewalld
Using ufw (Uncomplicated Firewall)
Opening and Closing Ports
Saving and Restoring Rules
Intrusion Detection and Prevention
Host-Based Intrusion Detection Systems (HIDS)
Monitoring Suspicious Activity
Security Auditing Tools
Security-Enhanced Linux (SELinux) and AppArmor
SELinux Concepts
Modes
Enforcing
Permissive
Disabled
Policy Types
Managing Contexts
AppArmor Concepts
Profiles and Modes
Managing Profiles
Basic Policy Management
Allowing and Denying Access
Troubleshooting Denials
Auditing and Logging
System Logs in /var/log
Log File Types
Log Rotation
Syslog and Rsyslog
Configuration and Management
Monitoring and Analyzing Logs
Previous
9. Storage Management
Go to top
Next
11. Shell Scripting and Automation