Security Programming: System Essentials
Secure Programming
| Beginner
- 14 videos | 56m 2s
- Includes Assessment
- Earns a Badge
In this 14-video course, learners will explore how Linux-based systems operate, communicate, and manage the underlying information they contain. Begin by examining management and monitoring tools available in Unix and Linux environments. Then learn to work with user accounts and domain names, and learn how to monitor user and system activity. You will learn how to securely connect to remote servers by using secure shell (SSH), and how to work with user accounts. This course examines elements of both an Internet Protocol routing table and a network interface, and demonstrates how to perform Domain Name System lookups. Learners will examine log files for monitoring critical events on a Linux system and use the PS command to retrieve process information. You will learn how to retrieve disk usage, partition information, and directory contents of a Linux system, and how to monitor both user and system activity on a Linux system. Finally, this course demonstrates how to configure time and date services and explore system configurations in the /etc folder of a Unix system.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseConnect to a remote server securely using sshCreate, modify, and delete user accounts in a linux systemIdentify and describe the elements of an internet protocol routing tableDescribe the elements of a network interface using the ifconfig commandPerform domain name system lookupsDescribe the important log files on a linux system that are used to monitor for critical events
-
Use the ps command to get process informationQuery disk space use, partition information, and directory contents of a linux systemMonitor user activity on a linux systemUse system monitoring tools to monitor linux activityConfigure time servers and set the correct date, time, and time zone on a systemDescribe important system configurations found in the /etc folder of a unix-based systemSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 35s
-
5m 10sIn this video, find out how to connect to a remote server securely using SSH. FREE ACCESS
-
3m 45sIn this video, you will learn how to create, modify, and delete user accounts in a Linux system. FREE ACCESS
-
4m 48sFind out how to identify and describe the elements of an Internet Protocol routing table. FREE ACCESS
-
4m 21sAfter completing this video, you will be able to describe the elements of a network interface using the ifconfig command. FREE ACCESS
-
4m 11sIn this video, find out how to perform Domain Name System lookups. FREE ACCESS
-
3m 53sAfter completing this video, you will be able to describe the important log files on a Linux system that are used to monitor for critical events. FREE ACCESS
-
4m 53sIn this video, you will learn how to use the ps command to get process information. FREE ACCESS
-
6m 34sLearn how to query disk space usage, partition information, and directory contents of a Linux system. FREE ACCESS
-
3m 43sIn this video, you will learn how to monitor user activity on a Linux system. FREE ACCESS
-
3m 56sDuring this video, you will learn how to use system monitoring tools to monitor Linux activity. FREE ACCESS
-
4m 7sDuring this video, you will learn how to configure time servers and set the correct date, time, and time zone on a system. FREE ACCESS
-
3m 59sUpon completion of this video, you will be able to describe important system configurations found in the /etc folder of a UNIX-based system. FREE ACCESS
-
1m 6s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.