In this course, automating repetitive tasks with cron will be covered. You'll also learn how to harden Unix hosts from common Unix attacks.
start the course
recognize how cron schedules tasks on a Unix system
configure a repeating system cron job
identify how hardening can secure a host
describe how the PKI hierarchy enhances security
identify attack methods in order to mitigate them
view network packets using the tcpdump command
Practice: Automating and Hardening Unix
configure repeating cron jobs and harden Unix
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.