Whether you are accessing a bank website, Netflix or your home router, chances are that your computer is interacting with a Linux system. The world runs on Linux. In this course, we will dive into how Linux works from an enterprise perspective.
In week 1 we will look at what Linux is used for in the enterprise. By the end of week 1, you will be able to differentiate between different versions of Linux and understand how they are used in an enterprise environment. In week 2, we will explore how Linux systems are configured. By the end of week 2, you will be able to demonstrate different Linux commands and how they are used. You will also be able to interact with a Linux system. In week 3, we will explore Linux authentication mechanisms and how to add users and user controls to a Linux system. By the end of week 3, you should be able to demonstrate how to appropriately add users to a Linux machine and secure them. In week 4, we will explore how to harden a Linux system. By the end of week 4, you should be able to classify different technologies to secure Linux and differentiate access control methods for Linux applications.
Who is this class for: This course is for those who want to understand how Linux is used in an enterprise environment. It is for those who plan on becoming a Linux system administrator and need to brush up on their skills. This course is also for those who need to apply and assess system security and how it is used an a Linux environment.
Course 3 of 4 in the Computer Security and Systems Management Specialization
Introduction to Practical Linux System Management
Welcome to the first module! This module will cover key aspects of the course in addition to discussing Linux in the enterprise and distributions.
Graded: About Linux
Configuring Linux in the Enterprise
This module covers the installation and configuration of Linux in an enterprise setting.
Graded: Configuring Linux
Users, authentication, and authorization in a Linux environment
This module describes the essentials of managing users in the enterprise.
Graded: Users, authentication, and authorization
Securing Linux in the Enterprise
This module covers Linux security. What does a system administrator need to know in order to adequately protect their systems.
Graded: Linux Security
Practical Linux Administration – Project
This is the course project. Linux threats come from a variety of sources. It’s up to you to have a stance on how to administer and protect a system.
Graded: A new hire – you!
ENROLL IN COURSE