• Online, Self-Paced
Course Description

User and group accounts need to be authenticated before they can be authorized to use network resources. In this course, you'll learn how users prove their identity to a system through authentication.

Learning Objectives

User and Group Management

  • start the course
  • define how Unix users and groups are created and managed
  • create a Unix user account from the command line
  • modify a Unix user account from the command line
  • delete a Unix user account from the command line
  • create a Unix group from the command line
  • modify a Unix group from the command line
  • delete a Unix group from the command line

Authentication

  • describe various Unix user authentication options
  • enhance sign-in security with SSH public key authentication
  • use PuTTY to establish Secure Shell (SSH) connection to a Unix host
  • connect to a Unix host using the Secure Shell (SSH) protocol

Practice: Unix Identity Management

  • manage users and groups as well as authentication

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.