Book Image

ChromeOS System Administrator's Guide

By : Dr. Willie Sanders, Jr.
Book Image

ChromeOS System Administrator's Guide

By: Dr. Willie Sanders, Jr.

Overview of this book

Google's ChromeOS provides a great platform for technicians, system administrators, developers, and casual users alike, providing a seemingly simplistic architecture that is easy enough for a novice user to begin working with. However, beneath the surface, this operating system boasts a plethora of powerful tools, able to rival any other OS on the market. So, learning how to harness the full potential of the OS is critical for you as a technical worker and user to thrive at your workplace. ChromeOS System Administrator’s Guide will help you reap the benefits of all features of ChromeOS. This book explains ChromeOS’ unique architecture and its built-in tools that perform essential tasks such as managing user accounts, working with data, and launching applications. As you build your foundational knowledge of the OS, you'll be exposed to higher-level concepts such as security, command line, and enterprise management. By the end of this book, you’ll be well-equipped to perform a range of system administration tasks within ChromeOS without requiring an alternative operating system, thereby broadening your options as a technician, system administrator, developer, or engineer.
Table of Contents (16 chapters)
1
Part 1:Working with ChromeOS
5
Part 2:Security and Troubleshooting
9
Part 3:Advanced Administration

Summary

In this chapter, we took a deep dive into the many built-in security features that ChromeOS has to offer. After gaining a better understanding of key cybersecurity concepts such as the CIA Triad, we determined how ChromeOS applies the concept to user access control. You learned how to implement screen locks and 2FA to help harden the authentication process on ChromeOS devices.

You examined the system update process, sandboxing, and verified boot as mechanisms for protecting hardware and core software components. You set up parental controls in order to prevent unwanted content from getting into the hands of kids. Finally, you learned to identify and configure key Chrome browser settings in order to protect your data and privacy when online.

In the next chapter, you’ll discover what you can do to recover your data following a digital disaster.