Network Services Management
Linux
| Intermediate
- 15 videos | 1h 2m 8s
- Earns a Badge
Let's look at security as it applies to the networking configuration of a Linux system. Here we examine how to perform security administration tasks, set up host security, and use encryption to secure data.
WHAT YOU WILL LEARN
-
Describe the function and purpose of shadow passwordsPerform the actions to turn off network services that are not in useConfigure tcp wrappers to grant or deny access to services on the local systemUse commands to audit a system to find files that have the suid or sgig bit setDescribe how to set or change a user's password and aging informationUse netstat to discover open ports on a systemUse nmap to discover open ports on a local or remote systemApply limits to user logins, processes, and memory usage
-
Identify which users or processes have files openedIdentify users who have logged in or who are currently logged into the systemConfigure and use sudo to run commands with superuser, or root, access as a normal userConfigure and use the openssh2 client to securely connect and run commands on another systemDescribe how the openssh2 server host keys are used to secure communicationsPerform basic gnupg configuration, usage, and revocation of keysUse ssh port tunnels to tunnel non-secure communications over a secured connection
IN THIS COURSE
-
3m 12sUpon completion of this video, you will be able to describe the function and purpose of passwords that are used to encrypt other passwords. FREE ACCESS
-
7mLearn how to turn off network services that are not in use. FREE ACCESS
-
3m 24sIn this video, you will configure TCP wrappers to grant or deny access to services on the local system. FREE ACCESS
-
3m 47sIn this video, you will use commands to audit a system to find files that have the suid or sgid bit set. FREE ACCESS
-
4m 16sUpon completion of this video, you will be able to describe how to set or change a user's password and aging information. FREE ACCESS
-
2m 41sIn this video, find out how to use netstat to discover open ports on your system. FREE ACCESS
-
4m 5sIn this video, find out how to use nmap to discover open ports on a local or remote system. FREE ACCESS
-
2m 32sFind out how to apply limits to user logins, processes, and memory usage. FREE ACCESS
-
4m 38sLearn how to identify which users or processes have opened files. FREE ACCESS
-
4m 8sDuring this video, you will learn how to identify users who have logged in or who are currently logged in to the system. FREE ACCESS
-
4m 23sDuring this video, you will learn how to configure and use sudo to run commands with superuser, or root, access as a normal user. FREE ACCESS
-
6m 7sDuring this video, you will learn how to configure and use the OpenSSH2 client to securely connect to and run commands on another system. FREE ACCESS
-
2m 27sAfter completing this video, you will be able to describe how the OpenSSH2 server host keys are used to secure communications. FREE ACCESS
-
4m 47sDuring this video, you will learn how to perform basic configuration, usage, and revocation of GnuPG keys. FREE ACCESS
-
4m 42sDuring this video, you will learn how to use SSH Port Tunnels to tunnel non-secure communications over a secure connection. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.