Let's look at security as it applies to the networking configuration of a Linux system. Here we examine how to perform security administration tasks, set up host security, and use encryption to secure data.
Learning Objectives
{"describe the function and purpose of shadow passwords"}