Network Services Management

Linux    |    Intermediate
  • 15 videos | 1h 2m 8s
  • Earns a Badge
Rating 4.7 of 167 users Rating 4.7 of 167 users (167)
Let's look at security as it applies to the networking configuration of a Linux system. Here we examine how to perform security administration tasks, set up host security, and use encryption to secure data.

WHAT YOU WILL LEARN

  • Describe the function and purpose of shadow passwords
    Perform the actions to turn off network services that are not in use
    Configure tcp wrappers to grant or deny access to services on the local system
    Use commands to audit a system to find files that have the suid or sgig bit set
    Describe how to set or change a user's password and aging information
    Use netstat to discover open ports on a system
    Use nmap to discover open ports on a local or remote system
    Apply limits to user logins, processes, and memory usage
  • Identify which users or processes have files opened
    Identify users who have logged in or who are currently logged into the system
    Configure and use sudo to run commands with superuser, or root, access as a normal user
    Configure and use the openssh2 client to securely connect and run commands on another system
    Describe how the openssh2 server host keys are used to secure communications
    Perform basic gnupg configuration, usage, and revocation of keys
    Use ssh port tunnels to tunnel non-secure communications over a secured connection

IN THIS COURSE

  • 3m 12s
    Upon completion of this video, you will be able to describe the function and purpose of passwords that are used to encrypt other passwords. FREE ACCESS
  • 7m
    Learn how to turn off network services that are not in use. FREE ACCESS
  • Locked
    3.  Using TCP Wrappers to Grant or Deny Access to Services
    3m 24s
    In this video, you will configure TCP wrappers to grant or deny access to services on the local system. FREE ACCESS
  • Locked
    4.  Auditing a System to Find suid/sgid Files
    3m 47s
    In this video, you will use commands to audit a system to find files that have the suid or sgid bit set. FREE ACCESS
  • Locked
    5.  Setting or Changing Passwords and Aging Information
    4m 16s
    Upon completion of this video, you will be able to describe how to set or change a user's password and aging information. FREE ACCESS
  • Locked
    6.  Discovering Open Ports on a System Using netstat
    2m 41s
    In this video, find out how to use netstat to discover open ports on your system. FREE ACCESS
  • Locked
    7.  Discovering Open Ports on a System Using nmap
    4m 5s
    In this video, find out how to use nmap to discover open ports on a local or remote system. FREE ACCESS
  • Locked
    8.  Setting Limits on User Logins, Processes, and Resources
    2m 32s
    Find out how to apply limits to user logins, processes, and memory usage. FREE ACCESS
  • Locked
    9.  Determining Which Users or Processes Have Opened Files
    4m 38s
    Learn how to identify which users or processes have opened files. FREE ACCESS
  • Locked
    10.  Finding Users Who Have Logged in or Are Online Now
    4m 8s
    During this video, you will learn how to identify users who have logged in or who are currently logged in to the system. FREE ACCESS
  • Locked
    11.  Configuring and Using Sudo
    4m 23s
    During this video, you will learn how to configure and use sudo to run commands with superuser, or root, access as a normal user. FREE ACCESS
  • Locked
    12.  Performing Basic OpenSSH2 Configuration and Usage
    6m 7s
    During this video, you will learn how to configure and use the OpenSSH2 client to securely connect to and run commands on another system. FREE ACCESS
  • Locked
    13.  OpenSSH2 Server Host Keys
    2m 27s
    After completing this video, you will be able to describe how the OpenSSH2 server host keys are used to secure communications. FREE ACCESS
  • Locked
    14.  Configuring and Using the GnuPG
    4m 47s
    During this video, you will learn how to perform basic configuration, usage, and revocation of GnuPG keys. FREE ACCESS
  • Locked
    15.  Using SSH Port Tunnels
    4m 42s
    During this video, you will learn how to use SSH Port Tunnels to tunnel non-secure communications over a secure connection. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 33 users Rating 4.5 of 33 users (33)
Rating 4.7 of 46 users Rating 4.7 of 46 users (46)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 62 users Rating 4.4 of 62 users (62)
Rating 4.5 of 354 users Rating 4.5 of 354 users (354)
Rating 4.6 of 2240 users Rating 4.6 of 2240 users (2240)