Course details

Users, Groups, and Authentication

Users, Groups, and Authentication


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
User and group accounts need to be authenticated before they can be authorized to use network resources. In this course, you'll learn how users prove their identity to a system through authentication.

Target Audience
Technicians who want to get a thorough grounding of Unix principles through hands-on examples

Prerequisites
None

Expected Duration (hours)
0.9

Lesson Objectives

Users, Groups, and Authentication

  • start the course
  • define how Unix users and groups are created and managed
  • create a Unix user account from the command line
  • modify a Unix user account from the command line
  • delete a Unix user account from the command line
  • create a Unix group from the command line
  • modify a Unix group from the command line
  • delete a Unix group from the command line
  • describe various Unix user authentication options
  • enhance sign-in security with SSH public key authentication
  • use PuTTY to establish Secure Shell (SSH) connection to a Unix host
  • connect to a Unix host using the Secure Shell (SSH) protocol
  • manage users and groups as well as authentication
  • Course Number:
    lu_unop_a04_it_enus

    Expertise Level
    Beginner