We may earn an affiliate commission when you visit our partners.
Course image
Course image
Coursera logo

إداره مستخدمي Linux وصلاحيات الملف (Access Control List (ACL

Abdelrahman Tarek Hafez

في نهاية هذا المشروع ، يتكون قادر على تحديد و ادارة صلاحيات الملفات الخاصة بك باستخدام نظام Linux. خلال المشروع ستكون قادرًا علي الوصول إلى المعلومات المتعلقة بالمستخدم وتحديد المجموعة الخاص به في نظام Linux الخاص بك باستخدام الأمر “id” عن طريق ال terminal، وستكون قادر على تبديله إلى المستخدم المتميز root واستخدامه لتشغيل الأوامر التي تحتاج إلى الامتيازات الكامله.ستتمكن ايضا من إنشاء وتعديل وحذف المستخدمين والمجموعات وإدارة كلمات المرور الخاصة بهم عبر نظام Linux الخاص بك. و ستكون قادر على تحديد قوائم التحكم(ACL) Access Control List واستخدام الأمرين "setfacl" و "getfacl" لإعداد وإظهار ACL على التوالي. وأخيرًا ستكون قادر على تعيين قوائم ACL الافتراضية على ال folders ، وتعيين صلاحيات ACL الافتراضية تلقائيًا لأي ملفات تم إنشاؤها داخل هذه ال folders وأيضًا إزالة جميع صلاحيات ACL المحددة أو إزالة صلاحيات ACL لمستخدم معين في ملف معين. هذا المشروع الإرشادي مخصص للأشخاص المبتدئين المهتمين بتعلم Linux ,و المبتدئين الذين يرغبون في استخدام Linux للمهام الأساسية ولكن لا يعرفون من أين يبدأون. و المبتدئين المهتمين بمعرفة كيفية إدارة المستخدمين والمجموعات.و الأشخاص الذين لا يعرفون ما هي قوائم التحكم (ACL) Access Control List.

Read more

في نهاية هذا المشروع ، يتكون قادر على تحديد و ادارة صلاحيات الملفات الخاصة بك باستخدام نظام Linux. خلال المشروع ستكون قادرًا علي الوصول إلى المعلومات المتعلقة بالمستخدم وتحديد المجموعة الخاص به في نظام Linux الخاص بك باستخدام الأمر “id” عن طريق ال terminal، وستكون قادر على تبديله إلى المستخدم المتميز root واستخدامه لتشغيل الأوامر التي تحتاج إلى الامتيازات الكامله.ستتمكن ايضا من إنشاء وتعديل وحذف المستخدمين والمجموعات وإدارة كلمات المرور الخاصة بهم عبر نظام Linux الخاص بك. و ستكون قادر على تحديد قوائم التحكم(ACL) Access Control List واستخدام الأمرين "setfacl" و "getfacl" لإعداد وإظهار ACL على التوالي. وأخيرًا ستكون قادر على تعيين قوائم ACL الافتراضية على ال folders ، وتعيين صلاحيات ACL الافتراضية تلقائيًا لأي ملفات تم إنشاؤها داخل هذه ال folders وأيضًا إزالة جميع صلاحيات ACL المحددة أو إزالة صلاحيات ACL لمستخدم معين في ملف معين. هذا المشروع الإرشادي مخصص للأشخاص المبتدئين المهتمين بتعلم Linux ,و المبتدئين الذين يرغبون في استخدام Linux للمهام الأساسية ولكن لا يعرفون من أين يبدأون. و المبتدئين المهتمين بمعرفة كيفية إدارة المستخدمين والمجموعات.و الأشخاص الذين لا يعرفون ما هي قوائم التحكم (ACL) Access Control List.

و الأشخاص الذين يفكرون في مهنة كمسؤول أو مهندس لنظام Linux ، لكنهم بحاجة إلى الأساسيات أولاً.

Enroll now

What's inside

Syllabus

ملخص المشروع
في نهاية هذا المشروع ،ستكون قادرا على تحديد و ادارة صلاحيات الملفات الخاصة بك باستخدام نظام Linux. خلال المشروع ستكون قادرًا علي الوصول إلى المعلومات المتعلقة بالمستخدم وتحديد المجموعة الخاص به في نظام Linux الخاص بك باستخدام الأمر “id” عن طريق ال terminal، وستكون قادر على تبديله إلى المستخدم المتميز root واستخدامه لتشغيل الأوامر التي تحتاج إلى الامتيازات الكامله.ستتمكن ايضا من إنشاء وتعديل وحذف المستخدمين والمجموعات وإدارة كلمات المرور الخاصة بهم عبر نظام Linux الخاص بك. و ستكون قادر على تحديد قوائم التحكم(ACL) Access Control List واستخدام الأمرين "setfacl" و "getfacl" لإعداد وإظهار ACL على التوالي. وأخيرًا ستكون قادر على تعيين قوائم ACL الافتراضية على ال folders ، وتعيين صلاحيات ACL الافتراضية تلقائيًا لأي ملفات تم إنشاؤها داخل هذه ال folders وأيضًا إزالة جميع صلاحيات ACL المحددة أو إزالة صلاحيات ACL لمستخدم معين في ملف معين. هذا المشروع الإرشادي مخصص للأشخاص المبتدئين المهتمين بتعلم Linux ,و المبتدئين الذين يرغبون في استخدام Linux للمهام الأساسية ولكن لا يعرفون من أين يبدأون. و المبتدئين المهتمين بمعرفة كيفية إدارة المستخدمين والمجموعات و الأشخاص الذين لا يعرفون ما هي قوائم التحكم (ACL) Access Control List. و الأشخاص الذين يفكرون في مهنة كمسؤول أو مهندس لنظام Linux ، لكنهم بحاجة إلى الأساسيات أولاً.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores user administration and file permission management, core Linux tasks
Builds foundation for those new to Linux

Save this course

Save إداره مستخدمي Linux وصلاحيات الملف (Access Control List (ACL to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for إداره مستخدمي Linux وصلاحيات الملف (Access Control List (ACL. These are activities you can do either before, during, or after a course.

Career center

Learners who complete إداره مستخدمي Linux وصلاحيات الملف (Access Control List (ACL will develop knowledge and skills that may be useful to these careers:
Linux Systems Engineer
A Linux Systems Engineer is responsible for the installation, maintenance, and configuration of Linux systems, including the management of user accounts, permissions, and file systems. This course may enhance the skills necessary to confidently execute the responsibilities of this role.
Systems Administrator
A Systems Administrator is responsible for the upkeep, configuration, and reliable operation of computer systems; including hardware, software, and operating systems. They also manage user accounts, permissions, and file systems, tasks commonly performed with the Linux command line. A background in file system management, user permissions, and user management like that built through this course may help build a foundation for this role.
Network Administrator
A Network Administrator is responsible for the installation, maintenance, and security of computer networks. They may also manage network traffic, bandwidth, and user permissions. A background managing user permissions and file systems like that achieved through this course may provide a foundational knowledge to facilitate entry or growth in this role.
Database Administrator
A Database Administrator is responsible for the installation, maintenance, and security of databases. They also manage user accounts, permissions, and file systems, tasks commonly performed with the Linux command line. A background in file system management, user permissions, and user management like that built through this course may help build a foundation for this role.
IT Auditor
IT Auditors are responsible for ensuring that an organization's IT systems are secure and compliant. They also review and evaluate IT systems, processes, and controls. A background managing user permissions and file systems, tasks covered by this course, may provide a foundational knowledge to facilitate entry or growth in this role.
Security Analyst
Security Analysts are responsible for identifying, assessing, and mitigating security risks to an organization's IT systems. They also develop and implement security policies and procedures. A background in file system management, user permissions, and user management like that built through this course may help build a foundation for this role.
Cloud Engineer
Cloud Engineers are responsible for the design, implementation, and management of cloud computing systems. They also manage user accounts, permissions, and file systems, tasks commonly performed with the Linux command line. A background in file system management, user permissions, and user management like that built through this course may help build a foundation for this role.
Cybersecurity Engineer
Cybersecurity Engineers are responsible for designing, implementing, and maintaining an organization's cybersecurity infrastructure. They also monitor and respond to security incidents. A background in file system management, user permissions, and user management like that built through this course may help build a foundation for this role.
DevOps Engineer
DevOps Engineers are responsible for the development and maintenance of software systems. They also work with system administrators to manage user accounts, permissions, and file systems, tasks commonly performed with the Linux command line. A background in file system management, user permissions, and user management like that built through this course may help build a foundation for this role.
Software Engineer
Software Engineers are responsible for the design, development, and maintenance of software systems. They also work with system administrators to manage user accounts, permissions, and file systems, tasks commonly performed with the Linux command line. A background in file system management, user permissions, and user management like that built through this course may help build a foundation for this role.
IT Manager
IT Managers are responsible for the planning, implementation, and management of an organization's IT systems. They also manage user accounts, permissions, and file systems, tasks commonly performed with the Linux command line. A background in file system management, user permissions, and user management like that built through this course may help build a foundation for this role.
IT Specialist
IT Specialists are responsible for providing technical support to users of computer systems. They also manage user accounts, permissions, and file systems, tasks commonly performed with the Linux command line. A background in file system management, user permissions, and user management like that built through this course may help build a foundation for this role.
Computer Systems Analyst
Computer Systems Analysts are responsible for the analysis, design, and implementation of computer systems. They also manage user accounts, permissions, and file systems, tasks commonly performed with the Linux command line. A background in file system management, user permissions, and user management like that built through this course may help build a foundation for this role.
Security Engineer
Security Engineers are responsible for the design, implementation, and maintenance of an organization's security systems. They also manage user accounts, permissions, and file systems, tasks commonly performed with the Linux command line. A background in file system management, user permissions, and user management like that built through this course may help build a foundation for this role.
Information Security Analyst
Information Security Analysts are responsible for the protection of an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. A background in file system management, user permissions, and user management like that built through this course may help build a foundation for this role.

Reading list

We've selected 14 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in إداره مستخدمي Linux وصلاحيات الملف (Access Control List (ACL.
This comprehensive handbook provides a wealth of information on Linux system administration, including chapters on user and group management, file permissions, and ACLs.
Focuses on Linux security and hardening, providing guidance on user and group management, file permissions, and ACLs as part of a comprehensive security strategy.
Provides a comprehensive guide to the Linux command line and shell scripting, including coverage of user and group management, file permissions, and ACLs.
Provides advanced coverage of Linux programming, including topics such as user and group management, file permissions, and ACLs.
Provides a comprehensive guide to Linux device drivers, including how to manage user and group permissions for device access.
Provides an in-depth look at the Linux kernel internals, including how it manages users, groups, and files.
Provides a detailed overview of the Linux kernel architecture, including how it manages users, groups, and files.
Provides a comprehensive guide to Linux system programming, including how to manage user and group permissions for system resources.
Provides a practical guide to Linux kernel programming, including how to manage user and group permissions for kernel objects.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to إداره مستخدمي Linux وصلاحيات الملف (Access Control List (ACL.
مقدمة إلي Bash shell & Linux processes & Job scheduling
Most relevant
معالجة الملفات والمجلدات بإستخدام Linux لمهندسي الكمبيوتر
Most relevant
برنامج Power BI للمبتدئين: تصور البيانات
Most relevant
jQuery للمبتدئين : الصيغه المبدئيه
Most relevant
تعليم مبادئ ال SQL Syntax
Most relevant
امازون Redshift للمبتدئين: مقدمة عن تخزين البيانات
Most relevant
تحليل البيانات باستخدام Tableau
Most relevant
تصميم مواد تكميلية وموثقة للدورة التدريبية الرقمية على...
Most relevant
SQL تحسين أداء وضبط أوامر
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser