We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Linux User Management Deep Dive

A Cloud Guru

Welcome to the Linux User Management Deep Dive course. In this course, students will learn to manage accounts and passwords for Linux users and groups. We’ll review user and group IDs, user shells, working with home directories, and user management files such as `/etc/passwd`, `/etc/group`, `/etc/shadow`, and `/etc/gshadow`. Then we’ll discuss creating users and groups, modifying their settings, and removing users and groups from the system. Next, we’ll dive into password management and talk about how passwords are encrypted. We’ll also discuss password aging features and demonstrate the differences between password and account locking, inactivity periods, and expiration. Lastly, we’ll dig into user and group security troubleshooting where we’ll introduce `sudo`, managing file permissions, access control lists, configuring user and group disk quotas, and troubleshooting login issues.

Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Provides a thorough foundation in Linux user management, essential for IT professionals and system administrators
Taught by A Cloud Guru, an organization renowned for its expertise in cloud computing and Linux
Covers password management and encryption techniques, critical for system security
The course may require familiarity with basic Linux commands and concepts

Save this course

Save Linux User Management Deep Dive to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Linux User Management Deep Dive. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Linux User Management Deep Dive will develop knowledge and skills that may be useful to these careers:
Systems Administrator
In this role, you will be responsible for maintaining computer systems, including user accounts and permissions. This course introduces fundamental systems administration concepts and will be very helpful for developing a foundation.
Network Administrator
As a Network Administrator, you will be responsible for managing and maintaining computer networks, including security and access control. This course can help build a foundation that will be valuable.
Database Administrator
Database Administrators are responsible for the design, implementation, and maintenance of database management systems, and you will need to be able to manage user accounts and permissions. This course will be helpful for gaining a basic understanding of these concepts.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's computer systems and networks. Managing user accounts and permissions is an important aspect of this role, and this course can help build a foundation.
Security Analyst
Security Analysts are responsible for identifying and mitigating security risks. This role may involve managing user accounts and permissions. This course can help build a foundation for this role.
IT Auditor
IT Auditors are responsible for assessing and recommending improvements to an organization's IT systems and processes. This course can help build a foundation for this role.
IT Consultant
IT Consultants provide advice and guidance on the use of computer systems and networks. This course can help build a foundation for this role.
Software Developer
Software Developers design, develop, and maintain computer software. While managing user accounts and permissions is typically not a primary responsibility, it may be a secondary task. This course may be helpful for gaining a basic understanding of these concepts.
Web Developer
Web Developers design and develop websites. While managing user accounts and permissions is typically not a primary responsibility, it may be a secondary task. This course may be helpful for gaining a basic understanding of these concepts.
Data Analyst
Data Analysts collect, analyze, and interpret data to help organizations make better decisions. While managing user accounts and permissions is typically not a primary responsibility, it may be a secondary task. This course may be helpful for gaining a basic understanding of these concepts.
Business Analyst
Business Analysts help organizations improve their business processes. While managing user accounts and permissions is typically not a primary responsibility, it may be a secondary task. This course may be helpful for gaining a basic understanding of these concepts.
Project Manager
Project Managers plan, execute, and close projects. While managing user accounts and permissions is typically not a primary responsibility, it may be a secondary task. This course may be helpful for gaining a basic understanding of these concepts.
Technical Writer
Technical Writers create documentation for technical products and services. While managing user accounts and permissions is typically not a primary responsibility, it may be a secondary task. This course may be helpful for gaining a basic understanding of these concepts.
Computer Support Specialist
Computer Support Specialists provide technical support to computer users. While managing user accounts and permissions is typically not a primary responsibility, it may be a secondary task. This course may be helpful for gaining a basic understanding of these concepts.
IT Help Desk Technician
IT Help Desk Technicians provide technical support to computer users. While managing user accounts and permissions is typically not a primary responsibility, it may be a secondary task. This course may be helpful for gaining a basic understanding of these concepts.

Reading list

We've selected 14 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Linux User Management Deep Dive.
This handbook comprehensive guide to UNIX and Linux system administration. It covers a wide range of topics, including user and group management, file permissions, and system security. It valuable reference for both beginners and experienced administrators.
This handbook provides a comprehensive overview of Linux administration. It covers a wide range of topics, including user and group management, file permissions, and system security. It valuable reference for both beginners and experienced administrators.
This handbook provides a comprehensive overview of Linux system administration, including user and group management. It valuable reference for both beginners and experienced administrators.
Provides a comprehensive overview of Linux. It valuable reference for both beginners and experienced Linux users.
Practical guide to managing Linux users and groups. It covers topics such as creating and deleting users, modifying user settings, and managing group permissions. It useful reference for system administrators.
Provides a comprehensive overview of Linux commands and utilities. It valuable reference for both beginners and experienced users.
Provides a basic overview of Linux. It good starting point for beginners who are new to Linux.
Provides a detailed overview of advanced Linux programming techniques. It valuable reference for experienced Linux programmers.
Provides a comprehensive overview of Linux device drivers. It valuable reference for experienced Linux kernel developers.
Provides a comprehensive overview of Linux system programming. It valuable reference for experienced Linux programmers.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Linux User Management Deep Dive.
RHEL 8: Managing Users and Groups
Most relevant
Ubuntu Linux Administration: User and Group Management
Most relevant
Managing Linux users & Access Control List file...
Most relevant
Mastering Group Policy on Windows Server
Most relevant
Linux: User Ownership and Permissions for DevOps
Most relevant
Identifying Security Vulnerabilities
Most relevant
Secure User Account and Authentication Practices in...
Most relevant
Windows Endpoint Administration: Manage Identity and...
Most relevant
Cloud Support Essentials: A Technical Approach
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser