Securing Linux - Basic Restrictions
Linux has the ability to natively place restrictions on the users and the processes that they run. In this lab, you will explore those restrictions, how to apply them and to what end they can be used to lock down a system. Additionally, you will explore the number of ways that limitations can be applied to users and the authentication process.
Time
1 hour
Difficulty
Intermediate
Share
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Overview
Linux has the ability to natively place restrictions on the users and the processes that they run. In this lab, you will explore those restrictions, how to apply them and to what end they can be used to lock down a system. Additionally, you will explore the number of ways that limitations can be applied to users and the authentication process.
Learning Partner