This course is part of Computer Security and Systems Management Specialization

Instructor: Greg Williams

Skills you'll gain

There are 5 modules in this course

In week 1 we will look at what Linux is used for in the enterprise. By the end of week 1, you will be able to differentiate between different versions of Linux and understand how they are used in an enterprise environment. In week 2, we will explore how Linux systems are configured. By the end of week 2, you will be able to demonstrate different Linux commands and how they are used. You will also be able to interact with a Linux system. In week 3, we will explore Linux authentication mechanisms and how to add users and user controls to a Linux system. By the end of week 3, you should be able to demonstrate how to appropriately add users to a Linux machine and secure them. In week 4, we will explore how to harden a Linux system. By the end of week 4, you should be able to classify different technologies to secure Linux and differentiate access control methods for Linux applications.

Configuring Linux in the Enterprise

Users, authentication, and authorization in a Linux environment

Securing Linux in the Enterprise

Practical Linux Administration - Project

©2025  ementorhub.com. All rights reserved