From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment

Unlock this course with a free trial

Join today to access over 24,300 courses taught by industry experts.

Learning objectives

Learning objectives

- Welcome back. Let's show some actual authentication methods in Linux. In this lesson, we will log in as a typical user in the GUI and in the console, or CLI. We'll log in as an enterprise user to a domain and actually show how to connect the client to the domain. We'll demonstrate how to lock a system and show why that's important. We'll show how to modify power saving options. Then we'll discuss secure shell basics. After that, we'll demonstrate how to connect to systems on the LAN via SSH. And finally, we'll show how to connect via SSH to systems on the cloud. It's all about authentication. If you can't get into a system, you're toast. Let's not allow that to happen, time to begin the lesson.

Contents