To describe methods for securing Linux system resources
Configuring NIS - recognize how to configure NIS. LDAP - recognize how to install and configure an LDAP server. PAM authentication - recognize how to configure PAM authentication. Configuring user authentication - configure LDAP and PAM authentication. IP chains and IP tables - recognize the characteristics of IP chains and IP tables. Securing FTP servers in Linux - identify methods for restricting access to FTP servers. Configuring OpenSSH - recognize how to configure OpenSSH. TCP wrappers - configure TCP wrappers. Implementing system security - restrict access to system resources using OpenSSH and TCP wrappers.
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.