Linux Server Management and Security course provide by university of colorado system
Linux Server Management and Security free videos and free material uploaded by University of Colorado System Staff .
Introduction to Practical Linux System Management
Welcome to the first module! This module will cover key aspects of the course in addition to discussing Linux in the enterprise and distributions
Configuring Linux in the Enterprise
This module covers the installation and configuration of Linux in an enterprise setting
Users, authentication, and authorization in a Linux environment
This module describes the essentials of managing users in the enterprise
Securing Linux in the Enterprise
This module covers Linux security What does a system administrator need to know in order to adequately protect their systems
Practical Linux Administration - Project
This is the course project. Linux threats come from a variety of sources It's up to you to have a stance on how to administer and protect a system
Whether you are accessing a bank website, Netflix or your home router, chances are that your computer is interacting with a Linux system The world runs on Linux. In this course, we will dive into how Linux works from an enterprise perspective In week 1 we will look at what Linux is used for in the enterprise By the end of week 1, you will be able to differentiate between different versions of Linux and understand how they are used in an enterprise environment In week 2, we will explore how Linux systems are configured By the end of week 2, you will be able to demonstrate different Linux commands and how they are used You will also be able to interact with a Linux system In week 3, we will explore Linux authentication mechanisms and how to add users and user controls to a Linux system By the end of week 3, you should be able to demonstrate how to appropriately add users to a Linux machine and secure them In week 4, we will explore how to harden a Linux system By the end of week 4, you should be able to classify different technologies to secure Linux and differentiate access control methods for Linux applications
Write a public review