Top 10 Linux security tutorials for sysadmins from 2021
![Top 13 security articles of 2020](/sysadmin/sites/default/files/styles/full/public/2020-12/Top_Security_Articles_2020.jpg?itok=5msWRZfD)
Even in the midst of a global pandemic, there are still things that haven't changed—and probably will not change anytime soon. One is the importance of IT security for sysadmins and the companies these folks work for.
When you ask a new sysadmin, "What is IT security? And what tasks come with it?" you may get the following answer: "It's about keeping your applications, containers, and systems current by installing the latest available updates all the time." While this answer isn't wrong, there is so much more to explore, learn, and do in IT security.
Enable Sysadmin is a community where sysadmins meet. The experienced ones share their knowledge with those who are eager to learn and evolve in their field of expertise. If that sounds like you, consider sharing your knowledge by writing about it! Consult our contributors page for more information about becoming part of our community.
You can find many articles covering a variety of topics in IT security on Enable Sysadmin, including the top 10 security articles of 2021 listed below. Take a look, stay safe, and I wish you all the best in 2022.
![How to set up SSH port forwarding on Linux hosts](/sysadmin/sites/default/files/styles/card/public/2021-01/SSHPortForwarding.jpg?itok=aAvUtUQP)
![Exploring the differences between su and sudo in Linux](/sysadmin/sites/default/files/styles/card/public/2021-03/SecurityTiles.jpg?itok=TvyjETpy)
![6 OpenSSL command options every sysadmin should know](/sysadmin/sites/default/files/styles/card/public/2021-03/Keys.jpg?itok=u05GFUdU)
![The 7 most used Linux namespaces](/sysadmin/sites/default/files/styles/card/public/2020-12/Containers_0.jpg?itok=D9O_shai)
![Women with index finger over mouthing (ssshhhh)](/sysadmin/sites/default/files/styles/card/public/2021-02/secret_0.jpg?itok=_eSXTaSS)
![matrix rainfall](/sysadmin/sites/default/files/styles/card/public/2021-01/pexels-markus-spiske-1089438_0.jpg?itok=hXm-tOeo)
![Managing users with the passwd command](/sysadmin/sites/default/files/styles/card/public/2020-12/ManagingUsers.jpg?itok=qOY5YZnN)
![Enumerating a new network with nmap](/sysadmin/sites/default/files/styles/card/public/2021-01/Flags.jpg?itok=cIMCAFr8)
![File encryption and decryption made easy with GPG](/sysadmin/sites/default/files/styles/card/public/2021-06/cyber-security.jpg?itok=8z7qegEa)
![How to manage Linux passwords with the pass command](/sysadmin/sites/default/files/styles/card/public/2021-03/Security.jpg?itok=VijfilL3)
![Author’s photo](/sysadmin/sites/default/files/styles/user_picture_square/public/pictures/2019-07/Profil_im_Buero2.jpg?itok=VuE03_kc)
Jörg Kastning
Jörg has been a Sysadmin for over ten years now. His fields of operation include Virtualization (VMware), Linux System Administration and Automation (RHEL), Firewalling (Forcepoint), and Loadbalancing (F5). More about me