Unix Hardening & Maintenance

FreeBSD 11    |    Beginner
  • 7 videos | 29m 28s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 73 users Rating 4.6 of 73 users (73)
In Unix, Cron is used to schedule either user or system jobs, like Windows Task Scheduler. During this course, you will learn how Cron can help to automate repetitive system maintenance and administrative tasks, through the command line or the Unix shell. You will begin by observing how to configure a regularly scheduled Cron job. Next, learn how to harden your Unix system, and identify and mitigate attack methods. Other topics include how to change default passwords, close open network ports, and remove unnecessary software, services, and usernames. You will also learn how to enhance host security with Public Key Infrastructure (PKI), the PKI hierarchy, and view network packets with the tcpdump command.

WHAT YOU WILL LEARN

  • Recognize how cron schedules tasks on a unix system
    Configure a repeating system cron job
    Identify how hardening can secure a host
    Describe how the pki hierarchy enhances security
  • Identify attack methods in order to mitigate them
    View network packets using the tcpdump command
    Configure repeating cron jobs and harden unix

IN THIS COURSE

  • 2m 36s
    After completing this video, you will be able to recognize how tasks are scheduled using cron on a Unix system. FREE ACCESS
  • 3m 50s
    During this video, you will learn how to configure a repeating system cron job. FREE ACCESS
  • Locked
    3.  Hardening Overview
    5m 53s
    In this video, you will learn how hardening can secure a host. FREE ACCESS
  • Locked
    4.  Public Key Infrastructure (PKI)
    7m 23s
    Upon completion of this video, you will be able to describe how the PKI hierarchy enhances security. FREE ACCESS
  • Locked
    5.  Common Unix Attacks
    3m 34s
    During this video, you will learn how to identify attack methods and how to mitigate them. FREE ACCESS
  • Locked
    6.  tcpdump
    2m 22s
    In this video, find out how to view network packets using the Wireshark command. FREE ACCESS
  • Locked
    7.  Exercise: Set Recurring Jobs and Security Settings
    3m 49s
    In this video, learn how to configure repeating cron jobs and harden Unix systems. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 10 users Rating 4.8 of 10 users (10)
Rating 4.8 of 52 users Rating 4.8 of 52 users (52)
Rating 4.5 of 39 users Rating 4.5 of 39 users (39)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 811 users Rating 4.3 of 811 users (811)
Rating 4.5 of 48 users Rating 4.5 of 48 users (48)
Rating 4.3 of 169 users Rating 4.3 of 169 users (169)