Course details
To describe how to implement and maintain UNIX networking
- UNIX file attributes
- describe how UNIX file attributes relate to file ownership and access rights.
- UNIX filesystem security
- recognize how to protect the security of entire UNIX filesystems.
- UNIX system security measures
- set security parameters in UNIX kernels and prevent cron and unwanted shutdown security issues.
- Configuring UNIX for security
- change file permissions and implement permission-based system security in UNIX.
- Benchmarking UNIX operating systems
- recognize how to benchmark operating systems, including UNIX, and evaluate the security of their configurations.
- The UNIX password system
- describe the UNIX password system.
- Boot-level and root access control in UNIX
- recognize how to restrict boot-level and root access to UNIX systems.
- Kerberos authentication on UNIX
- recognize how to integrate Kerberos authentication on UNIX systems.
- Implementing access control in UNIX
- design and implement access control policies.
- UNIX Pluggable Authentication Modules
- use Pluggable Authentication Modules (PAM) to control access to system resources in a given scenario.
About New Horizons Jordan
- 300 computer training centers in 70 countries (and counting)
- Largest Guaranteed-to-Run ctheirse schedule in the world
- Ranked in the top 5% of the industry for training quality and customer satisfaction
- Official training partner for technology leaders such as Microsoft, Cisco, CompTIA and VMware
- Microsoft’s largest training provider, delivering more than 40% of all authorized Microsoft training worldwide
- World’s largest Cisco-authorized training partner
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- Certification of Security Guard Course LineUSD 24
USD 260Duration: Upto 14 Hours - Microsoft Security Fundamentals (98-367) Practice Exam Testprep TrainingUSD 16Duration: 1 To 2 Months