Security Programming: System Essentials
Secure Programming
| Beginner
- 14 Videos | 56m 2s
- Includes Assessment
- Earns a Badge
In this 14-video course, learners will explore how Linux-based systems operate, communicate, and manage the underlying information they contain. Begin by examining management and monitoring tools available in Unix and Linux environments. Then learn to work with user accounts and domain names, and learn how to monitor user and system activity. You will learn how to securely connect to remote servers by using secure shell (SSH), and how to work with user accounts. This course examines elements of both an Internet Protocol routing table and a network interface, and demonstrates how to perform Domain Name System lookups. Learners will examine log files for monitoring critical events on a Linux system and use the PS command to retrieve process information. You will learn how to retrieve disk usage, partition information, and directory contents of a Linux system, and how to monitor both user and system activity on a Linux system. Finally, this course demonstrates how to configure time and date services and explore system configurations in the /etc folder of a Unix system.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courseconnect to a remote server securely using sshcreate, modify, and delete user accounts in a Linux systemidentify and describe the elements of an Internet Protocol routing tabledescribe the elements of a network interface using the ifconfig commandperform Domain Name System lookupsdescribe the important log files on a Linux system that are used to monitor for critical events
-
use the ps command to get process informationquery disk space use, partition information, and directory contents of a Linux systemmonitor user activity on a Linux systemuse system monitoring tools to monitor Linux activityconfigure time servers and set the correct date, time, and time zone on a systemdescribe important system configurations found in the /etc folder of a UNIX-based systemsummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 35sUP NEXT
-
2.Remote Shell Access5m 10s
-
3.User Accounts3m 45s
-
4.IP Routing4m 48s
-
5.Network Interfaces4m 21s
-
6.Domain Names4m 11s
-
7.Log Files3m 53s
-
8.Process Reporting4m 53s
-
9.Disk Use6m 34s
-
10.User Activity3m 43s
-
11.System Activity3m 56s
-
12.Time and Date Services4m 7s
-
13./etc Configurations3m 59s
-
14.Course Summary1m 6s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.