Configure a Firewall in Linux Project Overview

Configure a Firewall in Linux Overview Linux has a built-in packet filtering firewall which allows system administrators to configure the IP packet filter rules of the Linux firewall. Utilizing the built-in Linux application firewall IPtables or UFW, set up and create...

Create a Monitoring System Project Overview

Create a Monitoring System Overview A monitoring system is a technology used to analyze network operations, performance, and to detect and alert about possible errors in the network. Configure a monitoring system in Linux using a monitoring service such as Cacti,...

Configure LAMP Stack Project Overview

Configure the LAMP Stack Overview The Linux Apache MySQL PHP (LAMP) stack is a common web server implementation. Setup and configure each service to create a web server, sharpen your skills using each service after downloading the LAMP stack. Project Recommendations...

Write a Password Generator Program Project Overview

Write a Password Generator Program Overview Password security is a very important subject to consider. Without strong passwords, an adversary will be able to gain access to user accounts, websites, and more. Using the programming language of your choice, create a...

Create a Port Scanner Project Overview

Create a Port Scanner Overview A port scanner is a method used to determine which ports are open on a network. Port scanners can vary in complexity. From using a port scanner, an attacker could use the information received from the port scan to target an open or...

Write a Hash Cracker Project Overivew

Write a Hash Cracker Overview A hash function is used to map data of any size into a fixed-size value. Hashes are used to verify the integrity of data. Using the programming language of your choice, write a program to generate a hash using a broken hashing algorithm....