1 / 13

Project: My Certificate – Linux+ 

Join Team B-Boys and GirlAmazon Apprentice Program to learn about secure communication using SSH, basic network troubleshooting, and SELinux. Gain key takeaways, tips, and study strategies. Communicate using Trello, Chime, and Scrum. References included.

clofton
Download Presentation

Project: My Certificate – Linux+ 

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Project: My Certificate – Linux+  Team B-Boys and GirlAmazon Apprentice Program  Center for Info. Assurance Education (CIAE) (NSA/DHS CAE-CDE)

  2. Agenda • Our assigned modules • Individual Key Takeaways • Tips and What Works for Us • Team Key Takeaways

  3. Secure Communication Using SSH Port 22 • ssh-keygen • ssh-agent • ssh-add • Host Key 

  4. Basic Network Troubleshooting

  5. Jman's Tips • Stick To Study Plan • Diversify Study Material • Set High Benchmarks

  6. SELinux Standard Linux Distribution Under standard Linux Discretionary Access Control (DAC), an application or process running as a user (UID or SUID) has the user's permissions to objects such as files, sockets, and other processes. Security Enhanced Linux SELinux provides a flexible Mandatory Access Control (MAC) system built into the Linux kernel.

  7. SELinux Decision Process • SELinux provides a flexible  • Mandatory Access Control (MAC) • SELinux Modes • Enforcing • Permissive • Disabled • SELinux Commands • Getenforce • Setenforce •                 Config file •                 /etc/sysconfig/selinux

  8. Bal's Key Takeaways • Security is VERY Important • Check application permissions of your personal devices.

  9. Amanda Module 3  • Perform Security Administration Tasks (Lab 37) • Working with Access Control List (Lab 38)

  10. Security Administration and ACL Lab 37 • SUID • Managing passwords and their age • Locking and unlocking a user account • Providing privileges with the  sucommand Lab 38 • Modifying permissions per the user • Access Control List (ACL) supported by the kernel • Installing and mounting to partition through the terminal Image retrieved from: https://www.linuxsecrets.com/categories/15-questions-troubleshooting

  11. What Works For Me • Finding ways concepts connect • The SWEEP Method and utilizing it as another tool • Hands-on practice labs and activities • Notes and understanding the concepts

  12. Team Key Takeaways Communication • Trello • Chime • Scrum • Brainstorming 

  13. References • 49.2. INTRODUCTION TO SELINUX(2019) https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/5/html/deployment_guide/ch-selinux • Wilkins, S. (2011, July 14). Top 10 Basic Network Troubleshooting Tools Every IT Pro Should Know. Retrieved from https://www.pluralsight.com/blog/it-ops/network-troubleshooting-tools

More Related