CISCO Cybersecurity Essentials related content
• Lab exercises demonstrations (video playlist) (blog post)
• Quiz Questions and Answers (text blog post) (video playlist)
• Cisco Packet Tracer demonstrations (video playlist)
• Linux OS tutorials and reviews (video playlist)
• Exercícios do curso em Português (video playlist)
How to solve the Lab exercice 2.5.2.5 Authentication, Authorization and Accounting
Objectives
• Given a scenario, select the appropriate authentication, authorization, or access control.
• Install and configure security controls when performing account management, based on best practices.
Part 1: Adding Groups, Users, and Passwords on a Linux System.
Part 2: Verify Users, Groups, and Passwords.
Part 3: Using Symbolic Permissions.
Part 4: Absolute Permissions.
Background / Scenario: You will be conducting host security practices using the Linux command line by performing the following tasks: Adding Groups, Users, and Passwords, Verifying Groups, Users, and Passwords, Setting Symbolic Permissions, Setting Absolute Permissions.
Sem comentários:
Enviar um comentário