Linux Security using PAM
3.5 (4 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
855 students enrolled

Linux Security using PAM

Linux
3.5 (4 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
855 students enrolled
Created by Javed Akbar
Last updated 4/2020
English
English [Auto]
Current price: $13.99 Original price: $19.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 32 mins on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Linux-PAM background and how to configure it
Requirements
  • Some Linux background will be helpful
Description

This course will introduce the PAM (Pluggable Authentication Modules) in Linux. We will go over the background and inner workings of PAM and then also show examples on a live system on how to configure PAM. Students will be able understand why PAM is important and how to configure it.

Who this course is for:
  • Anyone interested in learning about security in Linux servers
Course content
Expand 8 lectures 32:00
+ Introduction
8 lectures 32:00
PAM control flags
02:38
Restrict root Access to SSH Service Via PAM
06:19
More advanced features of PAM
03:29
PAM Modules
07:30