🎁 New User? Get 20% off your first purchase with code NEWUSER20 Register Now →
Menu

Categories

Linux Security & Networking Essentials
Save 25%
Book Series Linux Security

Linux Security & Networking Essentials

Secure Your Linux Infrastructure from Network to Application Layer

Master Linux security and networking. 5 books covering SSH, remote access, network fundamentals, security hardening, and backup automation.

5 Books
0 views
Individual value: €95.50
€71.63
You save €23.87 (25% off)
Save €23.87 (25% off)

About This Series

The Linux Security & Networking Essentials series is a focused 5-book collection that builds your defensive security and networking skills for Linux infrastructure. In an era where cyberattacks are constant and data breaches make headlines weekly, these skills are not optional — they're essential for every IT professional who touches Linux systems.

Security is not a product you install; it's a practice you maintain. This series teaches you to think like both an administrator and an attacker, understanding how systems are compromised so you can prevent it. From SSH hardening to automated backup strategies, each volume addresses a critical layer of your security posture.

Why Security Skills Matter

Every Linux server connected to the internet is under constant attack. Automated bots scan for open ports, brute-force SSH passwords, exploit known vulnerabilities, and deploy cryptocurrency miners or ransomware. The difference between a compromised server and a secure one is the administrator's knowledge. This series gives you that knowledge, with practical techniques you can implement immediately.

The Learning Journey

Volume 1: SSH Mastery — Secure Remote Administration — SSH is the lifeline of Linux administration. This book covers SSH protocol fundamentals, key-based authentication (RSA, Ed25519), SSH agent forwarding, ProxyJump for bastion hosts, port forwarding (local, remote, dynamic SOCKS proxy), SCP and SFTP file transfer, SSH config file mastery, multiplexing for performance, and hardening sshd_config against attacks. Every concept includes real-world scenarios and production-ready configurations.

Volume 2: OpenSSH Configuration & Tunneling Guide — Go deeper into SSH's advanced capabilities. Master complex tunneling scenarios, multi-hop connections through firewalled networks, automated tunnel maintenance, SSH as a VPN alternative, certificate-based authentication for large environments, host key management at scale, Match blocks for conditional configuration, and integration with configuration management tools (Ansible uses SSH as its transport layer).

Volume 3: Remote Administration Security Guide — Secure remote administration extends beyond SSH. Cover remote desktop protocols (VNC, RDP over tunnels), web-based administration interfaces (Cockpit, Webmin), out-of-band management (IPMI, iLO, iDRAC), VPN solutions (WireGuard, OpenVPN), jump servers and bastion host architecture, privileged access management, session recording and audit trails, and incident response procedures for compromised remote access.

Volume 4: Network Security Fundamentals — Understand the network layer that connects and protects your systems. Cover TCP/IP fundamentals, firewall concepts and implementations (iptables, nftables, firewalld), network segmentation and VLANs, intrusion detection (Snort, Suricata basics), DNS security (DNSSEC, DNS over HTTPS), network monitoring (tcpdump, Wireshark, nmap), packet analysis, DDoS mitigation strategies, and network hardening checklists.

Volume 5: Linux Backup Automation with rsync & Borg — Your last line of defense is your backup. Master rsync for efficient file synchronization (incremental transfers, bandwidth limiting, exclude patterns), BorgBackup for deduplicated, encrypted backups, automated backup scheduling with systemd timers, backup verification and restore testing, remote backup to off-site locations, retention policies, monitoring backup success/failure, and designing a backup strategy that meets RPO/RTO objectives.

What You Will Learn

  • SSH: key authentication, tunneling, bastion hosts, agent forwarding, hardening
  • Certificate-based SSH: managing keys at scale in enterprise environments
  • Remote access security: VPN, bastion architecture, privileged access management
  • Firewalls: iptables, nftables, firewalld — rules, zones, NAT, logging
  • Network monitoring: tcpdump, packet analysis, intrusion detection basics
  • Backup automation: rsync, BorgBackup, scheduling, verification, retention
  • Encryption: data in transit (TLS/SSH), data at rest (LUKS, Borg encryption)
  • Incident response: detection, containment, recovery, post-mortem analysis
  • Security hardening: CIS benchmarks, STIG guidelines, automated compliance
  • DNS security: DNSSEC, DNS filtering, preventing DNS-based attacks

Who Is This Series For?

  • Linux administrators who want to harden their infrastructure
  • Security-conscious developers who deploy their own applications
  • DevOps engineers responsible for infrastructure security
  • IT professionals pursuing security certifications (Security+, CEH, OSCP)
  • Small business admins managing servers without a dedicated security team

Books in This Series (5)

1
SSH Mastery: Secure Remote Administration

SSH Mastery: Secure Remote Administration

by Bas van den Berg

Master SSH beyond basic login: secure authentication, key management, hardening, tunneling, automation, auditing, and enterprise-grade SSH practices for modern infrastructure.

€16.90 Included in series
2
OpenSSH Configuration & Tunneling Guide

OpenSSH Configuration & Tunneling Guide

by Bas van den Berg

Learn how to securely configure, harden, and fully exploit OpenSSH, including advanced tunneling, port forwarding, automation, and enterprise-grade SSH practices.

€18.90 Included in series
3
Remote Administration Security Guide

Remote Administration Security Guide

by Ethan Marshall

Learn how to secure remote administration channels like SSH, RDP, and PowerShell using modern security principles, hardening techniques, monitoring, and zero-trust strategies.

€24.90 Included in series
4
Network Security Fundamentals

Network Security Fundamentals

by Ethan Marshall

Learn how modern networks are attacked and defended. Understand network threats, architecture, firewalls, encryption, monitoring, and defensive strategies used in real-world environments.

€19.90 Included in series
5
Linux Backup Automation with rsync & Borg

Linux Backup Automation with rsync & Borg

by Bas van den Berg

Design secure, automated Linux backup systems using rsync and BorgBackup. Learn incremental backups, encryption, scheduling, monitoring, restore testing, and enterprise-ready backup strategies.

€14.90 Included in series

Get the Complete Series

All 5 books for just €71.63 — save 25% compared to buying individually