Ein Angebot für € 37,19 €
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Virtual, hands-on learning labs allow you to apply your technical skills using live hardware and software hosted in the cloud. So Sybex has bundled CompTIA Linux+ labs from Practice Labs, the IT Competency Hub, with our popular CompTIA Linux+ Study Guide, Fourth Edition. Working in these labs gives you the same experience you need to prepare for the CompTIA Linux+ Exam XK0-004 that you would face in a real-life setting. Used in addition to the book, the labs are a proven way to prepare for the certification and for work in the IT and cybersecurity fields where Linux is fundamental to modern…mehr
Virtual, hands-on learning labs allow you to apply your technical skills using live hardware and software hosted in the cloud. So Sybex has bundled CompTIA Linux+ labs from Practice Labs, the IT Competency Hub, with our popular CompTIA Linux+ Study Guide, Fourth Edition. Working in these labs gives you the same experience you need to prepare for the CompTIA Linux+ Exam XK0-004 that you would face in a real-life setting. Used in addition to the book, the labs are a proven way to prepare for the certification and for work in the IT and cybersecurity fields where Linux is fundamental to modern systems and security.This is your one-stop resource for complete coverage of Exam XK0-004, covering 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to superior content including, assessment tests that check exam readiness, objective map, real-world scenarios, hands-on exercises, key topic exam essentials, and challenging chapter review questions.Linux is viewed by many organizations and companies as an excellent, low-cost, secure alternative to expensive OSs, such as Microsoft Windows and is crucial to today's server and cloud infrastructure. The CompTIA Linux+ exam tests a candidate's understanding and familiarity with the Linux. As the Linux server market share continues to grow, so too does demand for qualified and certified Linux administrators.Building on the popular Sybex Study Guide approach, this book will provide 100% coverage of the NEW Linux+ Exam XK0-004 objectives. The book contains clear and concise information on all Linux administration topic, and includes practical examples and insights drawn from real-world experience._ Hardware and System Configuration_ Systems Operation and Maintenance_ Security_ Linux Troubleshooting and Diagnostics_ Automation and ScriptingYou'll also have access to an online test bank, including a bonus practice exam, electronic flashcards, and a searchable PDF of key terms.And with this edition you also get Practice Labs virtual labs that run from your browser. The registration code is included with the book and gives you 6 months unlimited access to Practice Labs CompTIA Linux+ Exam XK0-004 Labs with 65 unique lab modules to practice your skills.
Produktdetails
- Produktdetails
- Verlag: Sybex / Wiley & Sons
- Artikelnr. des Verlages: 1W119784240
- 4. Aufl.
- Seitenzahl: 928
- Erscheinungstermin: 21. Dezember 2020
- Englisch
- Abmessung: 43mm x 188mm x 232mm
- Gewicht: 1492g
- ISBN-13: 9781119784241
- Artikelnr.: 60142122
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Verlag: Sybex / Wiley & Sons
- Artikelnr. des Verlages: 1W119784240
- 4. Aufl.
- Seitenzahl: 928
- Erscheinungstermin: 21. Dezember 2020
- Englisch
- Abmessung: 43mm x 188mm x 232mm
- Gewicht: 1492g
- ISBN-13: 9781119784241
- Artikelnr.: 60142122
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
CHRISTINE BRESNAHAN, LINUX+, started working with computers more than 30 years ago as a system administrator. She is an Adjunct Professor at Ivy Tech Community College, where she teaches Linux Essentials, CompTIA Linux+ certification, and Python classes.RICHARD BLUM, LINUX+, is a 30-year IT industry veteran, as both systems and network administrator for UNIX, Linux, and Microsoft servers. Rich is widely published on Linux and open source software and is an online Linux instructor for universities nationwide.
Introduction xxixAssessment Test xliiPart I Gathering Your Tools 1Chapter 1 Preparing Your Environment 3Setting Up a Learning Space 4Using That Old Laptop 4Creating a Virtualized Environment 5Jumping to the Cloud 7Exploring Linux Distributions 8Looking at CentOS 9Looking at Ubuntu 10Looking at openSUSE 12Looking at Fedora 13Locating a Terminal 14Summary 14Chapter 2 Sifting Through Services 15What is a Linux Server? 16Launching Services 17Listening for Clients 18Serving the Basics 19Web Servers 20Database Servers 21Mail Servers 22Serving Local Networks 24File Servers 25Print Servers 26Network Resource Servers 26Implementing Security 29Authentication Server 29Certificate Authority 30Access Server (SSH) 31Virtual Private Networks 31Proxy Server 32Monitoring 32Improving Performance 32Clustering 32Load Balancing 33Containers 33Summary 33Exam Essentials 34Review Questions 35Chapter 3 Managing Files, Directories, and Text 39Handling Files and Directories 40Viewing and Creating Files 40Copying and Moving Files 45Removing Files 52Linking Files and Directories 55Establishing a Hard Link 55Constructing a Soft Link 57Reading Files 59Reading Entire Text Files 59Reading Text File Portions 61Reading Text File Pages 65Finding Information 66Exploring File Differences 67Using Simple Pinpoint Commands 69Using Intricate Pinpoint Commands 73Summary 77Exam Essentials 77Review Questions 78Chapter 4 Searching and Analyzing Text 83Processing Text Files 84Filtering Text 84Formatting Text 89Determining Word Count 93Redirecting Input and Output 95Handling Standard Output 95Redirecting Standard Error 96Regulating Standard Input 98Piping Commands 100Creating Here Documents 102Creating Command Lines 103Editing Text Files 105Appreciating Text Editors 105Learning About Stream Editors 110Summary 116Exam Essentials 117Review Questions 118Part II Starting Up and Configuring Your System 123Chapter 5 Explaining the Boot Process 125The Linux Boot Process 126Following the Boot Process 126Viewing the Boot Process 127The Firmware Startup 128The BIOS Startup 128The UEFI Startup 129Linux Bootloaders 130GRUB Legacy 131GRUB2 134Alternative Bootloaders 136System Recovery 137Kernel Failures 137Root Drive Failure 139Summary 141Exam Essentials 141Review Questions 143Chapter 6 Maintaining System Startup and Services 147Looking at init 148Managing systemd Systems 149Exploring Unit Files 150Focusing on Service Unit Files 152Focusing on Target Unit Files 157Looking at systemctl 159Examining Special systemd Commands 162Managing SysV init Systems 167Understanding Runlevels 168Investigating SysV init Commands 171Digging Deeper into systemd 176Looking at systemd Mount Units 176Exploring Automount Units 178Summary 179Exam Essentials 179Review Questions 181Chapter 7 Configuring Network Connections 187Configuring Network Features 188Network Configuration Files 188Graphical Tools 191Command-Line Tools 193Basic Network Troubleshooting 201Sending Test Packets 201Finding Host Information 202Advanced Network Troubleshooting 205The netstat Command 205Examining Sockets 208Summary 209Exam Essentials 210Review Questions 212Chapter 8 Comparing GUIs 217Focusing on the GUI 218Getting to Know GNOME 219Probing KDE Plasma 221Considering Cinnamon 223Making Acquaintance with MATE 225Understanding Unity 227Setting Up Accessibility 228Serving Up the GUI 231Figuring Out Wayland 232Examining X11 234Using Remote Desktops 235Viewing VNC 236Grasping Xrdp 238Exploring NX 239Studying SPICE 240Forwarding 240Local 242Remote 243Tunneling Your X11 Connection 244Summary 245Exam Essentials 245Review Questions 247Chapter 9 Adjusting Localization Options 253Understanding Localization 254Character Sets 254Environment Variables 255Setting Your Locale 256Installation Locale Decisions 256Changing Your Locale 257Looking at Time 259Working with Time Zones 259Setting the Time and Date 260Watching System Time 264Summary 265Exam Essentials 266Review Questions 267Part III Managing Your System 273Chapter 10 Administering Users and Groups 275Managing User Accounts 276Adding Accounts 276Maintaining Passwords 288Modifying Accounts 290Deleting Accounts 292Managing Groups 294Setting Up the Environment 297Perusing Bash Parameters 298Understanding User Entries 299Grasping Global Entries 300Querying Users 300Exploring the whoami Utility 300Understanding the who Utility 301Identifying with the id Program 302Displaying Access History with the last Utility 303Managing Disk Space Usage 304Summary 308Exam Essentials 308Review Questions 310Chapter 11 Handling Storage 315Storage Basics 316Drive Connections 316Partitioning Drives 317Automatic Drive Detection 317Partitioning Tools 318Working with fdisk 318Working with gdisk 320The GNU parted Command 322Graphical Tools 322Understanding Filesystems 323The Virtual Directory 324Maneuvering Around the Filesystem 326Formatting Filesystems 326Common Filesystem Types 326Creating Filesystems 328Mounting Filesystems 329Manually Mounting Devices 329Automatically Mounting Devices 330Managing Filesystems 331Retrieving Filesystem Stats 331Filesystem Tools 332Storage Alternatives 333Multipath 333Logical Volume Manager 334Using RAID Technology 336Summary 338Exam Essentials 338Review Questions 340Chapter 12 Protecting Files 343Understanding Backup Types 344Looking at Compression Methods 346Comparing Archive and Restore Utilities 349Copying with cpio 349Archiving with tar 352Duplicating with dd 357Replicating with rsync 359Securing Offsite/Off-System Backups 362Copying Securely via scp 362Transferring Securely via sftp 363Checking Backup Integrity 366Digesting an MD5 Algorithm 366Securing Hash Algorithms 367Summary 368Exam Essentials 368Review Questions 370Chapter 13 Governing Software 373Working with Source Code 374Downloading Source Code 374Bundling Source Code Packages 375Compiling Source Code 379Packaging Applications 380Installing and Managing Packages 381Understanding Repositories 385Summary 392Exam Essentials 393Review Questions 394Chapter 14 Tending Kernel Modules 397Exploring Kernel Modules 398Installing Kernel Modules 402Removing Kernel Modules 404Summary 405Exam Essentials 405Review Questions 407Part IV Securing Your System 409Chapter 15 Applying Ownership and Permissions 411Looking at File and Directory Permissions 412Understanding Ownership 412Controlling Access Permissions 414Exploring Special Permissions 417Managing Default Permissions 418Access Control Lists 420Context-Based Permissions 422Using SELinux 423Using AppArmor 427Understanding Linux User Types 430Types of User Accounts 430Escalating Privileges 430Restricting Users 431Summary 435Exam Essentials 436Review Questions 437Chapter 16 Looking at Access and Authentication Methods 439Getting to Know PAM 440Exploring PAM Configuration Files 440Enforcing Strong Passwords 444Locking Out Accounts 447Limiting Root Access 451Exploring PKI Concepts 452Getting Certificates 453Discovering Key Concepts 453Securing Data 454Signing Transmissions 455Using SSH 455Exploring Basic SSH Concepts 456Configuring SSH 458Generating SSH Keys 460Authenticating with SSH Keys 462Authenticating with the Authentication Agent 464Using SSH Securely 466Using VPN as a Client 468Summary 469Exam Essentials 469Review Questions 471Chapter 17 Implementing Logging Services 473Understanding the Importance of Logging 474The syslog Protocol 474The History of Linux Logging 476Basic Logging Using rsyslog 477Configuration 477Making Log Entries 479Finding Event Messages 479Journaling with systemd-journald 480Configuration 480Viewing Logs 481Summary 483Exam Essentials 484Review Questions 485Chapter 18 Overseeing Linux Firewalls 487Providing Access Control 488Looking at Firewall Technologies 490Familiarizing Yourself with firewalld 491Investigating iptables 495Understanding UFW 500Forwarding IP Packets 505Dynamically Setting Rules 506DenyHosts 506Fail2ban 506IPset 507Summary 508Exam Essentials 508Review Questions 510Chapter 19 Embracing Best Security Practices 513User Security 514Authentication Methods 514Multifactor Authentication 516Unique User Accounts 517Restricting the root Account 517System Security 518Separation of Data 518Disk Encryption 519Restricting Applications 520Preventing Unauthorized Rebooting 520Restricting Unapproved Jobs 522Banners and Messages 523Restricting USB Devices 523Looking for Trouble 524Auditing 524Network Security 525Denying Hosts 525Disabling Unused Services 525Changing Default Ports 526Using Encryption on the Network 526Summary 528Exam Essentials 528Review Questions 530Part V Troubleshooting Your System 533Chapter 20 Analyzing System Properties and Remediation 535Troubleshooting the Network 536Exploring Network Issues 536Viewing Network Performance 540Reviewing the Network's Configuration 546Troubleshooting Storage Issues 549Running Out of Filesystem Space 549Waiting on Disk I/O 550Failing Disks 553Troubleshooting the CPU 554Troubleshooting Memory 556Swapping 556Running Out of Memory 560Surviving a Lost root Password 560Summary 562Exam Essentials 562Review Questions 563Chapter 21 Optimizing Performance 567Looking at Processes 568Monitoring Processes in Real Time 570Managing Processes 573Setting Priorities 574Stopping Processes 574Summary 577Exam Essentials 577Review Questions 579Chapter 22 Investigating User Issues 581Troubleshooting Access 582Local 582Remote 586Authentication 587Examining File Obstacles 588File Permissions 588Directory Permissions 589File Creation 590Exploring Environment and Shell Issues 591Summary 593Exam Essentials 593Review Questions 594Chapter 23 Dealing with Linux Devices 597Communicating with Linux Devices 598Device Interfaces 598The /dev Directory 600The /proc Directory 601The /sys Directory 604Working with Devices 605Finding Devices 605Working with PCI Cards 608Working with USB Devices 609Supporting Monitors 610Using Printers 611Using Hot Pluggable Devices 613Detecting Dynamic Devices 613Working with Dynamic Devices 614Summary 615Exam Essentials 616Review Questions 617Chapter 24 Troubleshooting Application and Hardware Issues 619Dealing with Storage Problems 620Exploring Common Issues 620Dealing with Specialized Issues 622Uncovering Application Permission Issues 626Analyzing Application Dependencies 628Versioning 629Updating Issues 629Patching 630Dealing with Libraries 630Exploring Environment Variable Issues 631Gaining GCC Compatibility 631Perusing Repository Problems 632Looking at SELinux Context Violations 633Exploring Firewall Blockages 633Unrestricting ACLs 633Unblocking Ports 634Unblocking Protocols 635Troubleshooting Additional Hardware Issues 635Looking at Helpful Hardware Commands 635Investigating Other Hardware Problems 639Summary 643Exam Essentials 643Review Questions 645Part VI Automating Your System 649Chapter 25 Deploying Bash Scripts 651The Basics of Shell Scripting 652Running Multiple Commands 652Redirecting Output 653Piping Data 654The Shell Script Format 655Running the Shell Script 656Advanced Shell Scripting 657Displaying Messages 657Using Variables 658Command-Line Arguments 661The Exit Status 662Writing Script Programs 663Command Substitution 663Performing Math 664Logic Statements 666Loops 669Summary 673Exam Essentials 674Review Questions 675Chapter 26 Automating Jobs 677Running Scripts in Background Mode 678Running in the Background 678Running Multiple Background Jobs 679Running Scripts Without a Console 680Sending Signals 681Interrupting a Process 682Pausing a Process 682Job Control 683Viewing Jobs 683Restarting Stopped Jobs 686Running Like Clockwork 687Scheduling a Job Using the at Command 687Scheduling Regular Scripts 690Summary 692Exam Essentials 693Review Questions 694Chapter 27 Controlling Versions with Git 697Understanding Version Control 698Setting Up Your Git Environment 700Committing with Git 703Merging Versions 710Summary 713Exam Essentials 713Review Questions 715Part VII Realizing Virtual and Cloud Environments 717Chapter 28 Understanding Cloud and Virtualization Concepts 719Considering Cloud Services 720What is Cloud Computing? 720What Are the Cloud Services? 721Understanding Virtualization 723Hypervisors 723Types of Hypervisors 725Hypervisor Templates 726Exploring Containers 727What Are Containers? 727Container Software 728Container Templates 729Exercise 729Summary 730Exam Essentials 731Review Questions 732Chapter 29 Inspecting Cloud and Virtualization Services 735Focusing on VM Tools 736Looking at libvirt 736Viewing virsh 737Managing with Virtual Machine Manager 738Understanding Bootstrapping 740Booting with Shell Scripts 740Kick-Starting with Anaconda 741Initializing with Cloud-init 744Exploring Storage Issues 746Considering Network Configurations 747Virtualizing the Network 747Configuring Virtualized NICs 748Summary 750Exam Essentials 751Review Questions 752Chapter 30 Orchestrating the Environment 755Understanding Orchestration Concepts 756Probing Procedures 757Analyzing Attributes 758Provisioning the Data Center 760Coding the Infrastructure 761Automating the Infrastructure 762Comparing Agent and Agentless 762Investigating the Inventory 763Looking at Container Orchestration Engines 763Embracing Kubernetes 763Inspecting Docker Swarm 764Surveying Mesos 764Summary 765Exam Essentials 765Review Questions 766Appendix Answers to Review Questions 769Chapter 2: Sifting Through Services 770Chapter 3: Managing Files, Directories, and Text 773Chapter 4: Searching and Analyzing Text 777Chapter 5: Explaining the Boot Process 781Chapter 6: Maintaining System Startup and Services 784Chapter 7: Configuring Network Connections 788Chapter 8: Comparing GUIs 791Chapter 9: Adjusting Localization Options 795Chapter 10: Administering Users and Groups 798Chapter 11: Handling Storage 801Chapter 12: Protecting Files 803Chapter 13: Governing Software 804Chapter 14: Tending Kernel Modules 806Chapter 15: Applying Ownership and Permissions 808Chapter 16: Looking at Access and Authentication Methods 810Chapter 17: Implementing Logging Services 811Chapter 18: Overseeing Linux Firewalls 813Chapter 19: Embracing Best Security Practices 815Chapter 20: Embracing Best Security Practices 817Chapter 21: Optimizing Performance 818Chapter 22: Investigating User Issues 820Chapter 23: Dealing with Linux Devices 822Chapter 24: Troubleshooting Application and Hardware Issues 824Chapter 25: Deploying Bash Scripts 826Chapter 26: Automating Jobs 827Chapter 27: Controlling Versions with Git 829Chapter 28: Understanding Cloud and Virtualization Concepts 831Chapter 29: Inspecting Cloud and Virtualization Services 832Chapter 30: Orchestrating the Environment 834Index 837
Introduction xxixAssessment Test xliiPart I Gathering Your Tools 1Chapter 1 Preparing Your Environment 3Setting Up a Learning Space 4Using That Old Laptop 4Creating a Virtualized Environment 5Jumping to the Cloud 7Exploring Linux Distributions 8Looking at CentOS 9Looking at Ubuntu 10Looking at openSUSE 12Looking at Fedora 13Locating a Terminal 14Summary 14Chapter 2 Sifting Through Services 15What is a Linux Server? 16Launching Services 17Listening for Clients 18Serving the Basics 19Web Servers 20Database Servers 21Mail Servers 22Serving Local Networks 24File Servers 25Print Servers 26Network Resource Servers 26Implementing Security 29Authentication Server 29Certificate Authority 30Access Server (SSH) 31Virtual Private Networks 31Proxy Server 32Monitoring 32Improving Performance 32Clustering 32Load Balancing 33Containers 33Summary 33Exam Essentials 34Review Questions 35Chapter 3 Managing Files, Directories, and Text 39Handling Files and Directories 40Viewing and Creating Files 40Copying and Moving Files 45Removing Files 52Linking Files and Directories 55Establishing a Hard Link 55Constructing a Soft Link 57Reading Files 59Reading Entire Text Files 59Reading Text File Portions 61Reading Text File Pages 65Finding Information 66Exploring File Differences 67Using Simple Pinpoint Commands 69Using Intricate Pinpoint Commands 73Summary 77Exam Essentials 77Review Questions 78Chapter 4 Searching and Analyzing Text 83Processing Text Files 84Filtering Text 84Formatting Text 89Determining Word Count 93Redirecting Input and Output 95Handling Standard Output 95Redirecting Standard Error 96Regulating Standard Input 98Piping Commands 100Creating Here Documents 102Creating Command Lines 103Editing Text Files 105Appreciating Text Editors 105Learning About Stream Editors 110Summary 116Exam Essentials 117Review Questions 118Part II Starting Up and Configuring Your System 123Chapter 5 Explaining the Boot Process 125The Linux Boot Process 126Following the Boot Process 126Viewing the Boot Process 127The Firmware Startup 128The BIOS Startup 128The UEFI Startup 129Linux Bootloaders 130GRUB Legacy 131GRUB2 134Alternative Bootloaders 136System Recovery 137Kernel Failures 137Root Drive Failure 139Summary 141Exam Essentials 141Review Questions 143Chapter 6 Maintaining System Startup and Services 147Looking at init 148Managing systemd Systems 149Exploring Unit Files 150Focusing on Service Unit Files 152Focusing on Target Unit Files 157Looking at systemctl 159Examining Special systemd Commands 162Managing SysV init Systems 167Understanding Runlevels 168Investigating SysV init Commands 171Digging Deeper into systemd 176Looking at systemd Mount Units 176Exploring Automount Units 178Summary 179Exam Essentials 179Review Questions 181Chapter 7 Configuring Network Connections 187Configuring Network Features 188Network Configuration Files 188Graphical Tools 191Command-Line Tools 193Basic Network Troubleshooting 201Sending Test Packets 201Finding Host Information 202Advanced Network Troubleshooting 205The netstat Command 205Examining Sockets 208Summary 209Exam Essentials 210Review Questions 212Chapter 8 Comparing GUIs 217Focusing on the GUI 218Getting to Know GNOME 219Probing KDE Plasma 221Considering Cinnamon 223Making Acquaintance with MATE 225Understanding Unity 227Setting Up Accessibility 228Serving Up the GUI 231Figuring Out Wayland 232Examining X11 234Using Remote Desktops 235Viewing VNC 236Grasping Xrdp 238Exploring NX 239Studying SPICE 240Forwarding 240Local 242Remote 243Tunneling Your X11 Connection 244Summary 245Exam Essentials 245Review Questions 247Chapter 9 Adjusting Localization Options 253Understanding Localization 254Character Sets 254Environment Variables 255Setting Your Locale 256Installation Locale Decisions 256Changing Your Locale 257Looking at Time 259Working with Time Zones 259Setting the Time and Date 260Watching System Time 264Summary 265Exam Essentials 266Review Questions 267Part III Managing Your System 273Chapter 10 Administering Users and Groups 275Managing User Accounts 276Adding Accounts 276Maintaining Passwords 288Modifying Accounts 290Deleting Accounts 292Managing Groups 294Setting Up the Environment 297Perusing Bash Parameters 298Understanding User Entries 299Grasping Global Entries 300Querying Users 300Exploring the whoami Utility 300Understanding the who Utility 301Identifying with the id Program 302Displaying Access History with the last Utility 303Managing Disk Space Usage 304Summary 308Exam Essentials 308Review Questions 310Chapter 11 Handling Storage 315Storage Basics 316Drive Connections 316Partitioning Drives 317Automatic Drive Detection 317Partitioning Tools 318Working with fdisk 318Working with gdisk 320The GNU parted Command 322Graphical Tools 322Understanding Filesystems 323The Virtual Directory 324Maneuvering Around the Filesystem 326Formatting Filesystems 326Common Filesystem Types 326Creating Filesystems 328Mounting Filesystems 329Manually Mounting Devices 329Automatically Mounting Devices 330Managing Filesystems 331Retrieving Filesystem Stats 331Filesystem Tools 332Storage Alternatives 333Multipath 333Logical Volume Manager 334Using RAID Technology 336Summary 338Exam Essentials 338Review Questions 340Chapter 12 Protecting Files 343Understanding Backup Types 344Looking at Compression Methods 346Comparing Archive and Restore Utilities 349Copying with cpio 349Archiving with tar 352Duplicating with dd 357Replicating with rsync 359Securing Offsite/Off-System Backups 362Copying Securely via scp 362Transferring Securely via sftp 363Checking Backup Integrity 366Digesting an MD5 Algorithm 366Securing Hash Algorithms 367Summary 368Exam Essentials 368Review Questions 370Chapter 13 Governing Software 373Working with Source Code 374Downloading Source Code 374Bundling Source Code Packages 375Compiling Source Code 379Packaging Applications 380Installing and Managing Packages 381Understanding Repositories 385Summary 392Exam Essentials 393Review Questions 394Chapter 14 Tending Kernel Modules 397Exploring Kernel Modules 398Installing Kernel Modules 402Removing Kernel Modules 404Summary 405Exam Essentials 405Review Questions 407Part IV Securing Your System 409Chapter 15 Applying Ownership and Permissions 411Looking at File and Directory Permissions 412Understanding Ownership 412Controlling Access Permissions 414Exploring Special Permissions 417Managing Default Permissions 418Access Control Lists 420Context-Based Permissions 422Using SELinux 423Using AppArmor 427Understanding Linux User Types 430Types of User Accounts 430Escalating Privileges 430Restricting Users 431Summary 435Exam Essentials 436Review Questions 437Chapter 16 Looking at Access and Authentication Methods 439Getting to Know PAM 440Exploring PAM Configuration Files 440Enforcing Strong Passwords 444Locking Out Accounts 447Limiting Root Access 451Exploring PKI Concepts 452Getting Certificates 453Discovering Key Concepts 453Securing Data 454Signing Transmissions 455Using SSH 455Exploring Basic SSH Concepts 456Configuring SSH 458Generating SSH Keys 460Authenticating with SSH Keys 462Authenticating with the Authentication Agent 464Using SSH Securely 466Using VPN as a Client 468Summary 469Exam Essentials 469Review Questions 471Chapter 17 Implementing Logging Services 473Understanding the Importance of Logging 474The syslog Protocol 474The History of Linux Logging 476Basic Logging Using rsyslog 477Configuration 477Making Log Entries 479Finding Event Messages 479Journaling with systemd-journald 480Configuration 480Viewing Logs 481Summary 483Exam Essentials 484Review Questions 485Chapter 18 Overseeing Linux Firewalls 487Providing Access Control 488Looking at Firewall Technologies 490Familiarizing Yourself with firewalld 491Investigating iptables 495Understanding UFW 500Forwarding IP Packets 505Dynamically Setting Rules 506DenyHosts 506Fail2ban 506IPset 507Summary 508Exam Essentials 508Review Questions 510Chapter 19 Embracing Best Security Practices 513User Security 514Authentication Methods 514Multifactor Authentication 516Unique User Accounts 517Restricting the root Account 517System Security 518Separation of Data 518Disk Encryption 519Restricting Applications 520Preventing Unauthorized Rebooting 520Restricting Unapproved Jobs 522Banners and Messages 523Restricting USB Devices 523Looking for Trouble 524Auditing 524Network Security 525Denying Hosts 525Disabling Unused Services 525Changing Default Ports 526Using Encryption on the Network 526Summary 528Exam Essentials 528Review Questions 530Part V Troubleshooting Your System 533Chapter 20 Analyzing System Properties and Remediation 535Troubleshooting the Network 536Exploring Network Issues 536Viewing Network Performance 540Reviewing the Network's Configuration 546Troubleshooting Storage Issues 549Running Out of Filesystem Space 549Waiting on Disk I/O 550Failing Disks 553Troubleshooting the CPU 554Troubleshooting Memory 556Swapping 556Running Out of Memory 560Surviving a Lost root Password 560Summary 562Exam Essentials 562Review Questions 563Chapter 21 Optimizing Performance 567Looking at Processes 568Monitoring Processes in Real Time 570Managing Processes 573Setting Priorities 574Stopping Processes 574Summary 577Exam Essentials 577Review Questions 579Chapter 22 Investigating User Issues 581Troubleshooting Access 582Local 582Remote 586Authentication 587Examining File Obstacles 588File Permissions 588Directory Permissions 589File Creation 590Exploring Environment and Shell Issues 591Summary 593Exam Essentials 593Review Questions 594Chapter 23 Dealing with Linux Devices 597Communicating with Linux Devices 598Device Interfaces 598The /dev Directory 600The /proc Directory 601The /sys Directory 604Working with Devices 605Finding Devices 605Working with PCI Cards 608Working with USB Devices 609Supporting Monitors 610Using Printers 611Using Hot Pluggable Devices 613Detecting Dynamic Devices 613Working with Dynamic Devices 614Summary 615Exam Essentials 616Review Questions 617Chapter 24 Troubleshooting Application and Hardware Issues 619Dealing with Storage Problems 620Exploring Common Issues 620Dealing with Specialized Issues 622Uncovering Application Permission Issues 626Analyzing Application Dependencies 628Versioning 629Updating Issues 629Patching 630Dealing with Libraries 630Exploring Environment Variable Issues 631Gaining GCC Compatibility 631Perusing Repository Problems 632Looking at SELinux Context Violations 633Exploring Firewall Blockages 633Unrestricting ACLs 633Unblocking Ports 634Unblocking Protocols 635Troubleshooting Additional Hardware Issues 635Looking at Helpful Hardware Commands 635Investigating Other Hardware Problems 639Summary 643Exam Essentials 643Review Questions 645Part VI Automating Your System 649Chapter 25 Deploying Bash Scripts 651The Basics of Shell Scripting 652Running Multiple Commands 652Redirecting Output 653Piping Data 654The Shell Script Format 655Running the Shell Script 656Advanced Shell Scripting 657Displaying Messages 657Using Variables 658Command-Line Arguments 661The Exit Status 662Writing Script Programs 663Command Substitution 663Performing Math 664Logic Statements 666Loops 669Summary 673Exam Essentials 674Review Questions 675Chapter 26 Automating Jobs 677Running Scripts in Background Mode 678Running in the Background 678Running Multiple Background Jobs 679Running Scripts Without a Console 680Sending Signals 681Interrupting a Process 682Pausing a Process 682Job Control 683Viewing Jobs 683Restarting Stopped Jobs 686Running Like Clockwork 687Scheduling a Job Using the at Command 687Scheduling Regular Scripts 690Summary 692Exam Essentials 693Review Questions 694Chapter 27 Controlling Versions with Git 697Understanding Version Control 698Setting Up Your Git Environment 700Committing with Git 703Merging Versions 710Summary 713Exam Essentials 713Review Questions 715Part VII Realizing Virtual and Cloud Environments 717Chapter 28 Understanding Cloud and Virtualization Concepts 719Considering Cloud Services 720What is Cloud Computing? 720What Are the Cloud Services? 721Understanding Virtualization 723Hypervisors 723Types of Hypervisors 725Hypervisor Templates 726Exploring Containers 727What Are Containers? 727Container Software 728Container Templates 729Exercise 729Summary 730Exam Essentials 731Review Questions 732Chapter 29 Inspecting Cloud and Virtualization Services 735Focusing on VM Tools 736Looking at libvirt 736Viewing virsh 737Managing with Virtual Machine Manager 738Understanding Bootstrapping 740Booting with Shell Scripts 740Kick-Starting with Anaconda 741Initializing with Cloud-init 744Exploring Storage Issues 746Considering Network Configurations 747Virtualizing the Network 747Configuring Virtualized NICs 748Summary 750Exam Essentials 751Review Questions 752Chapter 30 Orchestrating the Environment 755Understanding Orchestration Concepts 756Probing Procedures 757Analyzing Attributes 758Provisioning the Data Center 760Coding the Infrastructure 761Automating the Infrastructure 762Comparing Agent and Agentless 762Investigating the Inventory 763Looking at Container Orchestration Engines 763Embracing Kubernetes 763Inspecting Docker Swarm 764Surveying Mesos 764Summary 765Exam Essentials 765Review Questions 766Appendix Answers to Review Questions 769Chapter 2: Sifting Through Services 770Chapter 3: Managing Files, Directories, and Text 773Chapter 4: Searching and Analyzing Text 777Chapter 5: Explaining the Boot Process 781Chapter 6: Maintaining System Startup and Services 784Chapter 7: Configuring Network Connections 788Chapter 8: Comparing GUIs 791Chapter 9: Adjusting Localization Options 795Chapter 10: Administering Users and Groups 798Chapter 11: Handling Storage 801Chapter 12: Protecting Files 803Chapter 13: Governing Software 804Chapter 14: Tending Kernel Modules 806Chapter 15: Applying Ownership and Permissions 808Chapter 16: Looking at Access and Authentication Methods 810Chapter 17: Implementing Logging Services 811Chapter 18: Overseeing Linux Firewalls 813Chapter 19: Embracing Best Security Practices 815Chapter 20: Embracing Best Security Practices 817Chapter 21: Optimizing Performance 818Chapter 22: Investigating User Issues 820Chapter 23: Dealing with Linux Devices 822Chapter 24: Troubleshooting Application and Hardware Issues 824Chapter 25: Deploying Bash Scripts 826Chapter 26: Automating Jobs 827Chapter 27: Controlling Versions with Git 829Chapter 28: Understanding Cloud and Virtualization Concepts 831Chapter 29: Inspecting Cloud and Virtualization Services 832Chapter 30: Orchestrating the Environment 834Index 837