Securing Linux - Basic Restrictions

CYBRScore
Cyberscore

Linux has the ability to natively place restrictions on the users and the processes that they run. In this lab, you will explore those restrictions, how to apply them and to what end they can be used to lock down a system. Additionally, you will explore the number of ways that limitations can be applied to users and the authentication process.

Time
1 hour
Difficulty
Intermediate
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

Linux has the ability to natively place restrictions on the users and the processes that they run. In this lab, you will explore those restrictions, how to apply them and to what end they can be used to lock down a system. Additionally, you will explore the number of ways that limitations can be applied to users and the authentication process.