Network Services Management

Linux
  • 15 Videos | 1h 3m 8s
  • Earns a Badge
Likes 24 Likes 24
Let's look at security as it applies to the networking configuration of a Linux system. Here we examine how to perform security administration tasks, set up host security, and use encryption to secure data.

WHAT YOU WILL LEARN

  • describe the function and purpose of shadow passwords
    perform the actions to turn off network services that are not in use
    configure TCP wrappers to grant or deny access to services on the local system
    use commands to audit a system to find files that have the suid or sgig bit set
    describe how to set or change a user's password and aging information
    use netstat to discover open ports on a system
    use nmap to discover open ports on a local or remote system
    apply limits to user logins, processes, and memory usage
  • identify which users or processes have files opened
    identify users who have logged in or who are currently logged into the system
    configure and use sudo to run commands with superuser, or root, access as a normal user
    configure and use the OpenSSH2 client to securely connect and run commands on another system
    describe how the OpenSSH2 server host keys are used to secure communications
    perform basic GnuPG configuration, usage, and revocation of keys
    use SSH Port Tunnels to tunnel non-secure communications over a secured connection

IN THIS COURSE

  • Playable
    1. 
    Introducing Shadow Passwords
    3m 12s
    UP NEXT
  • Playable
    2. 
    Disabling Unused Network Services
    7m
  • Locked
    3. 
    Using TCP Wrappers to Grant or Deny Access to Services
    3m 24s
  • Locked
    4. 
    Auditing a System to Find suid/sgid Files
    3m 47s
  • Locked
    5. 
    Setting or Changing Passwords and Aging Information
    4m 16s
  • Locked
    6. 
    Discovering Open Ports on a System Using netstat
    2m 41s
  • Locked
    7. 
    Discovering Open Ports on a System Using nmap
    4m 5s
  • Locked
    8. 
    Setting Limits on User Logins, Processes, and Resources
    2m 32s
  • Locked
    9. 
    Determining Which Users or Processes Have Opened Files
    4m 38s
  • Locked
    10. 
    Finding Users Who Have Logged in or Are Online Now
    4m 8s
  • Locked
    11. 
    Configuring and Using Sudo
    4m 23s
  • Locked
    12. 
    Performing Basic OpenSSH2 Configuration and Usage
    6m 7s
  • Locked
    13. 
    OpenSSH2 Server Host Keys
    2m 27s
  • Locked
    14. 
    Configuring and Using the GnuPG
    4m 47s
  • Locked
    15. 
    Using SSH Port Tunnels
    4m 42s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 0 Likes 0  
Likes 1 Likes 1  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 43 Likes 43  
Likes 33 Likes 33  
COURSE Networking
Likes 52 Likes 52