diff --git a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/106-understand-permissions.md b/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/106-understand-permissions.md index 6c20ab0fa..aea356103 100644 --- a/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/106-understand-permissions.md +++ b/src/data/roadmaps/cyber-security/content/101-operating-systems/learn-for-each/106-understand-permissions.md @@ -32,3 +32,5 @@ To ensure cyber security with permissions, follow these best practices: - **Implement Security Training**: Educate users about the importance of permissions and their responsibilities to maintain a secure environment. By understanding permissions and following best practices, you can enhance cyber security and minimize the risk of unauthorized access and data breaches. + +- [Linux File Permissions (Linux Journey)](https://linuxjourney.com/lesson/file-permissions) \ No newline at end of file