Unix Hardening and Maintenance


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
In Unix, Cron is used to schedule either user or system jobs, like Windows Task Scheduler. During this course, you will learn how Cron can help to automate repetitive system maintenance and administrative tasks, through the command line or the Unix shell. You will begin by observing how to configure a regularly scheduled Cron job. Next, learn how to harden your Unix system, and identify and mitigate attack methods. Other topics include how to change default passwords, close open network ports, and remove unnecessary software, services, and usernames. You will also learn how to enhance host security with Public Key Infrastructure (PKI), the PKI hierarchy, and view network packets with the tcpdump command.

Target Audience
Technicians who want to get a thorough grounding of Unix principles through hands-on examples

Prerequisites
None

Expected Duration (hours)
0.6

Lesson Objectives

Unix Hardening and Maintenance

  • start the course
  • recognize how cron schedules tasks on a Unix system
  • configure a repeating system cron job
  • identify how hardening can secure a host
  • describe how the PKI hierarchy enhances security
  • identify attack methods in order to mitigate them
  • view network packets using the tcpdump command
  • configure repeating cron jobs and harden Unix
  • Course Number:
    lu_unop_a09_it_enus

    Expertise Level
    Beginner