New Training: Troubleshooting Linux User Issues
| new skills - Team Nuggets

New Training: Troubleshooting Linux User Issues

In this 5-video skill, CBT Nuggets trainer Shawn Powers teaches you how to troubleshoot user-related issues on a Linux system. Learn how to identify and mitigate filesystem permission problems, how to troubleshoot user access to a local machine and a remote machine, and how to identify and fix problems related to SELinux privileges. Gain an understanding of the shell environment and the reasons why a user may not be able to manipulate the filesystem.

This skill is part of a series that will prepare you for CompTIA’s XK0-004 exam, the one exam that must be passed to receive the Linux+ certification. Watch this new Linux training.

Watch the full course: CompTIA Linux+

This training includes:

  • 5 videos
  • 34 minutes of training

You’ll learn these topics in this skill:

  • Discovering and Managing Filesystem Permission Problems
  • Repairing User Access Problems
  • Remediating File Creation and Deletion Issues
  • Handling SELinux Privileges
  • Understanding Environment and Shell Issues

3 Types of User-based Linux Permissions

The Linux operating system is designed with security in mind. And one of the most effective design considerations to implement this security-first design comes from user file permissions. User file permissions are categorized into three permission groups known as owner, group, and all users.

Owner permissions is applied to the owner of the directory, granting that user complete control of the file content creation and deletion in that directory.

Group permissions apply to a group of users that have been granted access to that directory and comes with a set of permission limitations defining what a user can and cannot do in that directory. Importantly to note, permissions are applied at the group level here, allowing all users by default in that group to inherit those permissions.

All User permissions apply to any user who uses that directory. Here, All User permissions may limit the ability to delete or copy sensitive files within the given directory.

Within the three basic file permission categories, Linux practitioners can gain control and build effective security policies pertaining to who has access to certain directories and what those users can do based on the granted permissions.

Download

Download

Ultimate Systems Administration Cert Guide

A 158-page guide to every Microsoft, VMware, Citrix, AWS, Google, and Linux certification, and how they fit into your career.

I have read and understood the privacy policy, and am able to consent to it.