In this chapter, we discussed how to create a Secure Shell server. Then, we discussed scheduling jobs using cron, optimized the shell, and managed user profiles. In the end, we studied file access, Octal, and special file permissions.
The next chapter deals with virtualization, how to implement virtualization, and the benefits of virtualization. You will learn about KVM, Xen, and Qemu.