Linux Security
Back to Home
01. Intro to Linux Security
02. The Rule of Least Privilege
03. Becoming a Super User
04. sudo vs. su
05. Package Source Lists
06. Updating Available Package Lists
07. Upgrading Installed Packages
08. Other Package Related Tasks
09. Discovering Packages
10. Using Package Search
11. Using Finger
12. Introduction to /etc/passwd
13. Reading /etc/passwd Entries
14. User Account Info
15. Introduction to User Management
16. Creating a New User
17. Connecting as the New User
18. Introduction to etc sudoers
19. Giving Sudo Access
20. Resetting Passwords
21. Another Authentication Method
22. Public Key Encryption
23. Generating Key Pairs
24. Supported Key Types
25. Installing a Public Key
26. Forcing Key Based Authentication
27. Introduction to File Permissions
28. Owners and Groups
29. Identifying Owners and Groups
30. Octal Permissions [missing dialogue]
31. Octal File Permissions
32. chgrp and chown
33. Intro to Ports
34. Default Ports for Popular Services
35. Intro to Firewalls
36. Intro to UFW
37. Configuring Ports in UFW
38. Conclusion
Back to Home
24. Supported Key Types
Supported Key Types
Question:
Start Quiz:
Solution: