Career and Technical Education (2022) Grade(s): 10-12 - Information Technology
CTE22.IT.LF.20
Create and apply suitable access, ownership, and authentication techniques for Linux systems in given scenarios.
Create and apply suitable access, ownership, and authentication techniques for Linux systems in given scenarios.
COS Examples
Examples: privilege escalations, file, directory, and context-based permissions; pluggable authentication module (PAM), Secure Shell (SSH), teletypes (TTYs), pseudo terminal (PTYs), public-key infrastructure (PKI)