Network Services Management

Linux    |    Intermediate
  • 15 videos | 1h 2m 8s
  • Earns a Badge
Likes 42 Likes 42
Let's look at security as it applies to the networking configuration of a Linux system. Here we examine how to perform security administration tasks, set up host security, and use encryption to secure data.

WHAT YOU WILL LEARN

  • describe the function and purpose of shadow passwords
    perform the actions to turn off network services that are not in use
    configure TCP wrappers to grant or deny access to services on the local system
    use commands to audit a system to find files that have the suid or sgig bit set
    describe how to set or change a user's password and aging information
    use netstat to discover open ports on a system
    use nmap to discover open ports on a local or remote system
    apply limits to user logins, processes, and memory usage
  • identify which users or processes have files opened
    identify users who have logged in or who are currently logged into the system
    configure and use sudo to run commands with superuser, or root, access as a normal user
    configure and use the OpenSSH2 client to securely connect and run commands on another system
    describe how the OpenSSH2 server host keys are used to secure communications
    perform basic GnuPG configuration, usage, and revocation of keys
    use SSH Port Tunnels to tunnel non-secure communications over a secured connection

IN THIS COURSE

  • 3m 12s
  • 7m
  • Locked
    3.  Using TCP Wrappers to Grant or Deny Access to Services
    3m 24s
  • Locked
    4.  Auditing a System to Find suid/sgid Files
    3m 47s
  • Locked
    5.  Setting or Changing Passwords and Aging Information
    4m 16s
  • Locked
    6.  Discovering Open Ports on a System Using netstat
    2m 41s
  • Locked
    7.  Discovering Open Ports on a System Using nmap
    4m 5s
  • Locked
    8.  Setting Limits on User Logins, Processes, and Resources
    2m 32s
  • Locked
    9.  Determining Which Users or Processes Have Opened Files
    4m 38s
  • Locked
    10.  Finding Users Who Have Logged in or Are Online Now
    4m 8s
  • Locked
    11.  Configuring and Using Sudo
    4m 23s
  • Locked
    12.  Performing Basic OpenSSH2 Configuration and Usage
    6m 7s
  • Locked
    13.  OpenSSH2 Server Host Keys
    2m 27s
  • Locked
    14.  Configuring and Using the GnuPG
    4m 47s
  • Locked
    15.  Using SSH Port Tunnels
    4m 42s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 275 Likes 275  
Journey OS Exploits
Likes 69 Likes 69  
Likes 1 Likes 1  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 244 Likes 244  
Likes 174 Likes 174  
Likes 141 Likes 141