Securing UNIX Systems
This course is included in our On-demand training solution.
To describe how to implement and maintain UNIX networking
IT professionals working in a UNIX environment for the first time
A basic understanding of the UNIX operating system; familiarity with the history of UNIX and the reasons for its continued popularity; general comprehension of UNIX system architecture, and awareness of the user interfaces
Securing UNIX Systemsdescribe how UNIX file attributes relate to file ownership and access rights.recognize how to protect the security of entire UNIX filesystems.set security parameters in UNIX kernels and prevent cron and unwanted shutdown security issues.change file permissions and implement permission-based system security in UNIX.recognize how to benchmark operating systems, including UNIX, and evaluate the security of their configurations.describe the UNIX password system.recognize how to restrict boot-level and root access to UNIX systems.recognize how to integrate Kerberos authentication on UNIX systems.design and implement access control policies.use Pluggable Authentication Modules (PAM) to control access to system resources in a given scenario.