Shells

Boot your computer if it’s not running. When it arrives at the login prompt, log in as studenth. Use the password I supply. UNM Trainees: Boot, login, Remote Desktop as necessary, and start Secure Telnet/Secure Shell (SSH). Log in with your UNM user name and password. Check Your Shell Command: echo $SHELL Your answer may …

What is Linux?

Linux is a Unix-type operating system Before Unix, there was Multics Dennis Ritchie’s “Unics” PDP7 Ritchie and Brian Kernighan invented C, and with Ken Thompson largely originated Unix The effort outgrew U Cal Berkeley and was taken over by AT&T Which gave rise to commercial Unices (Unixes or *nix) Richard Stallman made the technical, political …

Linux Fundamentals

UNM Continuing Education Course Instructor: Glenn Norman Text: Objectives A basic understanding of working in Linux Familiarity with construction, maintenance and troubleshooting of Linux systems Beginning preparation to pass the CompTIA Linux+ Certification Exam

Security+ Security Tools

My Favorite Free Security Tools Command-Line Tools Command Description Example Explanation Linux dig Queries DNS servers for host name/IP address mappings. dig dig <hostname> Queries hosts listed in /etc/resolve.conf or the host named. ping Requests a response from a host. Keeps going until Ctrl-C. ping google.com Asks the computer handling requests for google.com for a …

6.0 Cryptography

Domain 6.0 Cryptography – 11%   Symmetric Cyphers Type Block or Stream Key Rounds Details DES 64 bit block 56 bit 16 Used in the electronic payment industry. 3DES/TDES/3TDES 64 bit block 56 bit 16 x 3 different keys TDES is used in commercial data transfers. AES (Rijndael – “Rhine doll”) 128 bit block 128/192/256 …

5.0 Access Control and Identity Management

Domain 5.0 Access Control and Identity Management – 13% Authentication, Access Control & Auditing Know For The Security+ Test: The three “pillars” or “foundations” of information security are Authentication, Access Control and Auditing. (The mnemonic “AAA” may help you remember.) Authentication: By What You Know – A password, PIN, or mother’s maiden name By What …