Securing Unix Systems


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Secure your Unix system and explore methods for controlling file system and command execution access. During this course you will start by learning how to use chmod and changemode commands to set standard Unix file system permissions. Next, learn how to use an ACL (Access Control List) to assign user access and specify allowed operations. Understand Unix special permission bits to control read, write, and execute permissions for file users. Observe how to distinguish access privilege levels for Unix files, including the root user. Other topics on this course include the following: Configure Sudo to enable standard users to run privileged commands; Create a firewall to block unwanted network access; Configure and test OpenBSD PF Firewall rules.

Target Audience
Technicians who want to get a thorough grounding of Unix principles through hands-on examples

Prerequisites
None

Expected Duration (hours)
1.1

Lesson Objectives

Securing Unix Systems

  • start the course
  • describe how Unix file system permissions work
  • use chmod to set file system permissions
  • describe how ACLs provide added file system security
  • use setfacl to assign ACL file system permissions
  • explain the purpose of Unix special permission bits
  • use chmod to set special permission bits
  • identify the importance of not logging in as root
  • enable standard users to run privileged commands
  • describe how firewall solutions protect hosts
  • protect a Unix host from unwanted network traffic
  • ensure configured firewall rules are in effect
  • configure Unix file system permissions, command execution, and firewall settings
  • Course Number:
    lu_unop_a05_it_enus

    Expertise Level
    Beginner