1) Auditing SetUID-SetGID Permissions
2) Managing root access with sudo
3) Exploring Networks with nmap and netstat
4) Hardening Linux
5) Configuring an SSH Server
6) Configuring an SSH Client
7) Encrypting data with GPG
8) Tunneling Traffic with SSH