Securing UNIX Systems


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
To describe how to implement and maintain UNIX networking

Target Audience
IT professionals working in a UNIX environment for the first time

Prerequisites
A basic understanding of the UNIX operating system; familiarity with the history of UNIX and the reasons for its continued popularity; general comprehension of UNIX system architecture, and awareness of the user interfaces

Expected Duration (hours)
3.3

Lesson Objectives

Securing UNIX Systems

  • describe how UNIX file attributes relate to file ownership and access rights.
  • recognize how to protect the security of entire UNIX filesystems.
  • set security parameters in UNIX kernels and prevent cron and unwanted shutdown security issues.
  • change file permissions and implement permission-based system security in UNIX.
  • recognize how to benchmark operating systems, including UNIX, and evaluate the security of their configurations.
  • describe the UNIX password system.
  • recognize how to restrict boot-level and root access to UNIX systems.
  • recognize how to integrate Kerberos authentication on UNIX systems.
  • design and implement access control policies.
  • use Pluggable Authentication Modules (PAM) to control access to system resources in a given scenario.
  • Course Number:
    107848_eng