Network Services Management
Linux
| Intermediate
- 15 videos | 1h 2m 8s
- Earns a Badge
Let's look at security as it applies to the networking configuration of a Linux system. Here we examine how to perform security administration tasks, set up host security, and use encryption to secure data.
WHAT YOU WILL LEARN
-
describe the function and purpose of shadow passwordsperform the actions to turn off network services that are not in useconfigure TCP wrappers to grant or deny access to services on the local systemuse commands to audit a system to find files that have the suid or sgig bit setdescribe how to set or change a user's password and aging informationuse netstat to discover open ports on a systemuse nmap to discover open ports on a local or remote systemapply limits to user logins, processes, and memory usage
-
identify which users or processes have files openedidentify users who have logged in or who are currently logged into the systemconfigure and use sudo to run commands with superuser, or root, access as a normal userconfigure and use the OpenSSH2 client to securely connect and run commands on another systemdescribe how the OpenSSH2 server host keys are used to secure communicationsperform basic GnuPG configuration, usage, and revocation of keysuse SSH Port Tunnels to tunnel non-secure communications over a secured connection
IN THIS COURSE
-
3m 12s
-
7m
-
3m 24s
-
3m 47s
-
4m 16s
-
2m 41s
-
4m 5s
-
2m 32s
-
4m 38s
-
4m 8s
-
4m 23s
-
6m 7s
-
2m 27s
-
4m 47s
-
4m 42s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.