Access Control Mechanisms in Linux
Offered By: Pluralsight
Course Description
Overview
By taking this course you will thoroughly learn the methods used in Linux to control access to resources, from simple file modes through to AppArmor, with filesystem based and Network Server based ACLS in between.
Being able to control resource access is one of the most fundamental security features of any operating system. In this course, Access Control Mechanisms in Linux, you will learn the foundation knowledge required for the different methods used in Linux. First, you will start, initially, with the basic file mode and special permissions to ensure that nothing has escaped you. Next, you will look at both local ACLs and network-based ACLS. By this, it implies you will learn to the manage POSIX ACLs in the local filesystem, NFSv4 ACLs working with Network File Servers, and CIFS ACLs with SAMBA Servers. Moving on, you will discover how to implement Kerberos-based authentication to NFS Exports. Finally, this course introduces you to Mandatory ACLs in the form of AppArmor. By the end of this course, you will have gained the required knowledge to secure your Linux system using ACLs.
Being able to control resource access is one of the most fundamental security features of any operating system. In this course, Access Control Mechanisms in Linux, you will learn the foundation knowledge required for the different methods used in Linux. First, you will start, initially, with the basic file mode and special permissions to ensure that nothing has escaped you. Next, you will look at both local ACLs and network-based ACLS. By this, it implies you will learn to the manage POSIX ACLs in the local filesystem, NFSv4 ACLs working with Network File Servers, and CIFS ACLs with SAMBA Servers. Moving on, you will discover how to implement Kerberos-based authentication to NFS Exports. Finally, this course introduces you to Mandatory ACLs in the form of AppArmor. By the end of this course, you will have gained the required knowledge to secure your Linux system using ACLs.
Taught by
Andrew Mallett
Related Courses
Cyber Attack CountermeasuresNew York University (NYU) via Coursera Advanced Pen Testing Techniques for Active Directory
LinkedIn Learning CompTIA CySA+ (CS0-002) Cert Prep: 3 Identity and Access Management
LinkedIn Learning CompTIA Network+ (N10-007) Cert Prep: 5 Securing TCP/IP
LinkedIn Learning CompTIA Network+ (N10-008) Cert Prep: 5 Securing TCP/IP
LinkedIn Learning