About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
This learning path is part of the Learn Linux, 102: A roadmap for LPIC-1 series.
Overview
The three tutorials in this learning path enable you to understand the security settings that you can perform on your Linux system. You’ll learn how to audit a system to find files using the suid/sgid bit set, set or change user passwords and password aging information, use nmap and netstat commands to discover open ports on a system, set up limits on user login events, processes, and memory usage, determine which users have logged in to the system or have currently logged in, and so on. You’ll also learn how to set up a basic level of host security that includes tasks, such as learning about shadow passwords and how they work, stopping network services not in use, and understanding the role of TCP wrappers. Finally, you’ll learn how to use public key techniques to secure data and communication.
Skill level
Intermediate
Estimated time to complete
Approximately 3 hours.
Learning objectives
Upon completion of this learning path, you will be able to:
- Perform security administration tasks
- Setup host security - Coming soon
- Secure data with encryption - Coming soon