Summary
Congratulations! You are now a master in securing Unix servers, and let me tell you why.
First, you learned all about Unix services, including how they work and how they can be managed.
We also covered a very complex topic, Unix permissions, in a very smooth and easy way, including how to handle them using octal representation.
Then, we also learned about the different types of permissions on Unix systems, and how to properly manage them.
Additionally, we reviewed how we can leverage umask
for advanced configuration of default permissions.
You also learned how to enhance the security of your systems by leveraging access controls, and how to configure them.
Finally, you also learned what a host-based firewall is, and how to configure one using iptables.
Now, grab a cup of coffee and get prepared, because in the next chapter, you will acquire all the skills that you need to protect your network.