• Online, Self-Paced
Course Description

Explore Unix network system user accounts, and how they operate. In this course,you will learn common commands to create and manage user accounts from the command line. See how to create, modify, and delete both individual and group user accounts. Examine various Unix user authentication options. Enable secure shell, SSH, and public key authentication. Enhance account sign-in security. Conclude by connecting to a Unix host through Putty or the Secure Shell (SSH) protocol.

Learning Objectives

{"define how Unix users and groups are created and managed"}

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.