July Release Confetti
150+ Courses, Challenges, and Learning Activities
Launching in July!
Learn More

Configure Host-Based and User-Based Security for the Service

Length: 00:10:53

Lesson Summary: Finally, how do we apply the basic security for our services by host and by user. PLEASE NOTE: The contents of "Configure Host Based and User Based Security for the Service" and "Configure the Service for Basic Operation" are the same. The topics are covered in ONE video, however, they are listed as several topics on Red Hat's exam requirements, so we are leaving the two topics in the list for anyone who may not be following the course in order.


This lesson is only available to Linux Academy members.

Sign Up To View This Lesson
Or Log In

Looking For Team Training?

Learn More