cirrostrat

linux lessons

for cybersecurity training
select a presentation to view or download
Introduction to Linux and its command line
Orientation towards the CyberPatriot competition
Guide to checklisting for cybersecurity competitions
Auditing users and configuring the shadow password suite in Linux
Beginner's guide to PAM and the sudoers file
The APT package manager to install and audit software
Searching the system for certain files
Using redirects and pipes in the shell
Networking concepts and firewalls in Linux
Hardening FTP, the File Transfer Protocol
Hardening SSH, an advanced config using pub-key authentication
Hardening SSH, a basic guide to the Secure Shell
Using and auditing crontab files and aliases
Configuration and hardening of Samba fileshares
Intro to MySQL relational databases and basic hardening
Hardening the Squid proxy service
Configuration of browsers in Linux
The procfs and configuring the kernel using sysctl
Configuration and hardening of the Apache2 HTTP server
The LAMP stack and configuring the backend in Linux
Really basic rundown of X11 and the lightdm display manager
GRUB, the Linux bootloader
Auditing the Linux system with auditd
Scripting and automating tasks using shell scripts
Regarding rootkits, the malware that runs deep
Kali Linux, tools, and Linux for CTF-aligned tasks
Making Linux your home operating system
A conclusion and note on professionalism