MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
By the end of week 2, you will be able to demonstrate different Linux commands and how they are used. You will also be able to interact with a Linux system. In week 3, we will explore Linux authentication mechanisms and how to add users and user controls to a Linux system. By the end of week 3, you should be able to demonstrate how to appropriately add users to a Linux machine and secure them. In week 4, we will explore how to harden a Linux system. By the end of week 4, you should be able to classify different technologies to secure Linux and differentiate access control methods for Linux applications.
Course 3 of 4 in the Computer Security and Systems Management Specialization
Syllabus
WEEK 1
Introduction to Practical Linux System Management
Welcome to the first module! This module will cover key aspects of the course in addition to discussing Linux in the enterprise and distributions.
WEEK 2
Configuring Linux in the Enterprise
This module covers the installation and configuration of Linux in an enterprise setting.
WEEK 3
Users, authentication, and authorization in a Linux environment
This module describes the essentials of managing users in the enterprise
WEEK 4
Securing Linux in the Enterprise
This module covers Linux security. What does a system administrator need to know in order to adequately protect their systems.
WEEK 5
Practical Linux Administration - Project
This is the course project. Linux threats come from a variety of sources. It's up to you to have a stance on how to administer and protect a system.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.