Secure a Linux Terminal and Implement Logging Services

Practice Labs Module
Time
58 minutes
Difficulty
Intermediate

Welcome to the Secure a Linux Terminal and Implement Logging Services Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills.

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

Introduction

Welcome to the Secure a Linux Terminal and Implement Logging Services Practice Lab. In this module you will be provided with the instructions and devices needed to develop your hands-on skills.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 - Secure a Linux Terminal and Implement Logging Services

After completing this lab, you will be able to:

  • Log into a Linux System
  • Disable Unnecessary Services
  • Disable the root Login via SSH
  • Change the Default SSH Port
  • Verify the Last Logged in Users
  • Know the Key Locations for logging

Exam Objectives

The following exam objectives are covered in this lab:

  • LPI: 110.3 Securing data with encryption
  • CompTIA: 3.4 Given a scenario, implement logging services.

Lab Duration

It will take approximately 1 hour to complete this lab.

Exercise 1 - Secure a Linux Terminal and Implement Logging Services

There is no doubt that as compared to Windows, Linux is more secure. Just like any other operating system, Linux has an in-built security model, which can be further fine-tuned. CentOS, being a flavour of Linux, carries the same security model. However, it is important to note that the out-of-the-box configuration cannot be highly secure. You must fine-tune the system as per your need and ensure that you have secured the system

In this exercise, you will learn to secure a Linux terminal and implement logging services.

Learning Outcomes

After completing this exercise, you will be able to:

  • Log into a Linux System
  • Disable Unnecessary Services
  • Disable the root Login via SSH
  • Change the Default SSH Port
  • Verify the Last Logged in Users
  • Know the Key Locations for logging
Learning Partner
Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.