Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
CompTIA Linux+ Certification Guide

You're reading from   CompTIA Linux+ Certification Guide A comprehensive guide to achieving LX0-103 and LX0-104 certifications with mock exams

Arrow left icon
Product type Paperback
Published in Sep 2018
Publisher
ISBN-13 9781789344493
Length 590 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Philip Inshanally Philip Inshanally
Author Profile Icon Philip Inshanally
Philip Inshanally
Arrow right icon
View More author details
Toc

Table of Contents (23) Chapters Close

Preface 1. Configuring the Hardware Settings FREE CHAPTER 2. Booting the System 3. Changing Runlevels and Boot Targets 4. Designing a Hard Disk Layout 5. Installing a Linux Distribution 6. Using Debian Package Management 7. Using YUM Package Management 8. Performing File Management 9. Creating, Monitoring, Killing, and Restarting Processes 10. Modifying Process Execution 11. Display Managers 12. Managing User and Group Accounts 13. Automating Tasks 14. Maintaining System Time and Logging 15. Fundamentals of Internet Protocol 16. Network Configuration and Troubleshooting 17. Performing Administrative Security Tasks 18. Shell Scripting and SQL Data Management 19. Mock Exam - 1 20. Mock Exam - 2 21. Assessment 22. Other Books You May Enjoy

Performing Administrative Security Tasks

In the last chapter, we covered IPv4, IPv6, client-side DNS, and network troubleshooting. We worked with IPv4 and discussed IPv4 routing, and then we did the same for IPv6. This led into client-side DNS and network troubleshooting; we covered a number of command-line tools that assist in troubleshooting potential network connectivity issues.

In this chapter, we will focus on security: host security, SSH, and encryption. First, we will cover host security; the /etc/sudoers, /etc/hosts.allow, and /etc/.hosts.deny files will be our main focus. Next, we will work with SSH. We will focus on the steps involved in setting up SSH, and the steps for generating a key. We will also look at logging in to a remote system using SSH. Additionally, we will work with the various SSH files that are available to us. Encryption will be our next focal point...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime