From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Unlock this course with a free trial
Join today to access over 24,300 courses taught by industry experts.
Using the sudo command - Linux Tutorial
From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Using the sudo command
- Let's talk about sudo and how it works. For this sub-lesson, we're going to be working in Lab 08 using the sudo command, but first, let's talk about sudo a little bit. And so sudo has multiple meanings and I want to go over those briefly. First of all, sudo is a program. So it's a program that runs on Linux systems. It associates permissions with users and groups, but sudo is also a group. It's a group of users that could be added in Debian and Ubuntu and similar systems. If you're working in Debian or Ubuntu, it's known as the sudo group. If you're working in Fedora-based systems, it's the wheel group. That's the name of it. By default, once a user is added to the sudo or wheel group, the user then becomes an administrator, or better yet, a superuser on the system. And finally, sudo is a command, right? So this can be a little confusing because it has multiple meanings, but it's also a command. So when it precedes another command that requires administrative access, it'll allow…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Learning objectives1m 34s
-
(Locked)
Introduction to nftables and the nft command2m 34s
-
(Locked)
nftables setup4m 5s
-
(Locked)
Tables > Chains > Rules2m 31s
-
(Locked)
Building the nftables configuration, part 18m 41s
-
(Locked)
Building the nftables configuration, part 28m 39s
-
Saving and restoring the nftables configurations8m 36s
-
(Locked)
Translating iptables to nftables7m 49s
-
(Locked)
-
-
(Locked)
Learning objectives1m 18s
-
(Locked)
Review of SSH1m 47s
-
(Locked)
Using keys to connect via SSH12m 57s
-
(Locked)
The sshd_config file3m 19s
-
(Locked)
Modifying the default SSH port7m 32s
-
(Locked)
Disabling password-based SSH2m 57s
-
(Locked)
Disabling root login via SSH2m 32s
-
(Locked)
Exclusive SSH groups4m 37s
-
(Locked)
Authentication settings10m 6s
-
(Locked)
Terminating SSH connections, part 17m 45s
-
(Locked)
Terminating SSH connections, part 26m 51s
-
(Locked)