Redhat System Administration  «Prev  Next»

Lesson 1

Introduction to Red Hat Linux System Administration

In this course, you will discover the power of Linux on the internet and integrate Linux with other networks and operating systems.
Linux is a Unix-like and mostly POSIX-compliant computer operating system assembled under the model of free and open-source software development and distribution. The defining component of Linux is the Linux kernel, an operating system kernel first released on 5 October 1991 by Linus Torvalds.
Linux was originally developed as a free operating system for Intel x86-based personal computers. It is a leading operating system on servers and other big systems such as mainframe computers. Linux also runs on embedded systems, which are devices whose operating system is typically built into the firmware and is highly tailored to the system. This includes
  1. mobile phones,
  2. tablet computers,
  3. network routers,
  4. facility automation controls,
  5. and video game consoles.
Android is built on top of the Linux kernel.

Red Hat Reference
Computer security is a branch of computer technology known as information security as applied to computers and networks.The objective of computer security includes protection of information and property from theft, corruption while allowing the information and property to remain accessible and productive to its intended users.
The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively.
The strategies and methodologies of computer security often differ from most other computer technologies because of it combines various elements from different computer fields.
The goal of computer security is preventing unwanted computer behavior instead of enabling wanted computer behavior.