In this course, automating repetitive tasks with cron will be covered. You'll also learn how to harden Unix hosts from common Unix attacks.
Learning Objectives
Task Scheduling
- start the course
- recognize how cron schedules tasks on a Unix system
- configure a repeating system cron job
Securing Unix
- identify how hardening can secure a host
- describe how the PKI hierarchy enhances security
- identify attack methods in order to mitigate them
- view network packets using the tcpdump command
Practice: Automating and Hardening Unix
- configure repeating cron jobs and harden Unix
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Systems Administration
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.