To describe how to implement and maintain UNIX networking
UNIX file attributes - describe how UNIX file attributes relate to file ownership and access rights. UNIX filesystem security - recognize how to protect the security of entire UNIX filesystems. UNIX system security measures - set security parameters in UNIX kernels and prevent cron and unwanted shutdown security issues. Configuring UNIX for security - change file permissions and implement permission-based system security in UNIX. Benchmarking UNIX operating systems - recognize how to benchmark operating systems, including UNIX, and evaluate the security of their configurations. The UNIX password system - describe the UNIX password system. Boot-level and root access control in UNIX - recognize how to restrict boot-level and root access to UNIX systems. Kerberos authentication on UNIX - recognize how to integrate Kerberos authentication on UNIX systems. Implementing access control in UNIX - design and implement access control policies. UNIX Pluggable Authentication Modules - use Pluggable Authentication Modules (PAM) to control access to system resources in a given scenario.
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.