Career and Technical Education (2022) Grade(s): 10-12 - Information Technology

CTE22.IT.LF.20

Create and apply suitable access, ownership, and authentication techniques for Linux systems in given scenarios.

COS Examples

Examples: privilege escalations, file, directory, and context-based permissions; pluggable authentication module (PAM), Secure Shell (SSH), teletypes (TTYs), pseudo terminal (PTYs), public-key infrastructure (PKI)

ALSDE LOGO