Whether you are accessing a bank website, Netflix or your home router, chances are that your computer is interacting with a Linux system. The world runs on Linux. In this course, we will dive into how Linux works from an enterprise perspective.
In week 1 we will look at what Linux is used for in the enterprise. By the end of week 1, you will be able to differentiate between different versions of Linux and understand how they are used in an enterprise environment. In week 2, we will explore how Linux systems are configured. By the end of week 2, you will be able to demonstrate different Linux commands and how they are used. You will also be able to interact with a Linux system. In week 3, we will explore Linux authentication mechanisms and how to add users and user controls to a Linux system. By the end of week 3, you should be able to demonstrate how to appropriately add users to a Linux machine and secure them. In week 4, we will explore how to harden a Linux system. By the end of week 4, you should be able to classify different technologies to secure Linux and differentiate access control methods for Linux applications.
Introduction to Practical Linux System Management
Welcome to the first module! This module will cover key aspects of the course in addition to discussing Linux in the enterprise and distributions.
Configuring Linux in the Enterprise
This module covers the installation and configuration of Linux in an enterprise setting.
Users, authentication, and authorization in a Linux environment
This module describes the essentials of managing users in the enterprise.
Securing Linux in the Enterprise
This module covers Linux security. What does a system administrator need to know in order to adequately protect their systems.
Practical Linux Administration - Project
This is the course project. Linux threats come from a variety of sources. It's up to you to have a stance on how to administer and protect a system.