Ryan BaclitChivas SicamPeter MembreyJohn Newbigin
You've been introduced to some of the major features of CentOS from its installation up to managing user accounts. It is now time to look at how you can manage your system's security by imposing restrictions and browsing important files that CentOS uses to keep you, the administrator, up to speed. This can be done using logs and modules that can enhance the security of your system. Once you get the hang of logs and modules, you can also use CentOS's task automation facility to run commands that you may often use.
Gustavo AmarchandPatrick BrownThomas A. Mahoney