Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt

Rekomendowane odpowiedzi

SI4n5w5.jpg

 

LinuxCBT SLES-12x Edition

English | mp4 | H264 1356x764 | AAC 2 ch | 16 hrs 3 min | 1.98 Gb

Genre: eLearning

 

 

Course Objective

Installations

- Identify and obtain ISO images

- Prep VM GUEST

- Perform Desktop installation

- Tweak Desktop environment

- Publish repository via HTTP

- Perform Server installation via HTTP

- Confirm setup and tweak

- Discuss various installation methods

- Perform SSH-based installation

- Perform VNC-based installation

- Confirm installation images

- Evaluate SystemD Target

- Clone GUEST installation

- Evaluate results of various installation methods

 

Basic Linux Skills - Command Line Interface (CLI) - BASH

- Introduction to GNOME Terminal

- Demonstrate usage of the following useful commands & concepts

- ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami, man, info

- alias, cat, file, chmod, chown, history

- Standard in/out, UNIX Pipes, Redirection, Command Chaining

- ps, df, free, vmstat, top, kill

- less & more, head & tail, diff

- which & whereis, w, who

- Explore BASH configuration files

- Use grep and awk to process text files

- Archival & Compression Utilities: tar, gzip, bzip2, zip

- Explore important facets of BASH environment

 

Common Network Clients

- File Transfer Protocol (FTP) client

- Install and use LFTP - FTP Client to connect to FTP resources

- Mirror and reverse mirror using LFTP to synchronize data

- Wget - HTTP/HTTPS/FTP connectivity

- Explore SSH clients - Discuss features

- Identify key SSH-client files (.known_hosts, public/private key pairs,etc.)

- Use Secure Copy Protocol (SCP) to move data between systems non-interactively

- Use Secure File Transfer Protocol (SFTP) to move data between systems interactively

- Demonstrate how to generate Public/Private key (RSA/DSA) pairs using ssh-keygen

- Copy public keys to remote systems using: ssh-copy-id

- Demonstrate using SSHto authenticate to remote Linux hosts without passwords

- Authenticate to remote Linux systems using alternate credentials

- Generate Public Key/Private Key pairs for use with file and E-mail encryption

- Demonstrate using E-mail client with GNU Privacy Guard (GPG) Open PGP for E-Mail encryption

- Use ping, netstat, arp, telnet, traceroute, ifconfig - network diagnostics

- Use dig, host, nslookup, whois name resolution clients

 

Users, Groups & Permissions

- User and group creation & management concepts - passwd, shadow, group, gshadow files

- Use lastlog to determine system-access to various terminals

- Use YaST to create and manage users and groups

- Use stat to ascertain file information

- SETUID | SETGID | Sticky Bit

- Discuss and Implement Hard and SyMbolic links

 

SYSLOG | LOG ROTATE

- Explore Boot log & System Log

- Explanation of syslog facilities & levels

- Discuss rSYSLOG features & enhancements

- Demonstrate syslog administration

- Enable rSYSLOG network listener

- Explore automatic log rotation and customization via Logrotate

- Configure Logrotate to rotate & compress sample log files

 

Storage Administration

- Provision additional SWAP storage paritions and files

- Identify allocated swap space to the kernel

- Committ changes to /etc/fstab for persistence

- Disable swapping with swapoff as necessary

- Introduction to BTRFS File System

- Explore BTRFS defaults

- Administer important aspects of BTRFS

- Discuss features and benefits of LVM

- Implement Logical Volume Management (LVM)

- Manage LVM via GUI and CLI

- Evaluate results

 

Network - Physical & Logical Configuration

- Identify key management tool

- Explore interfaces across systems

- Provision IP aliases and evaluate

- Add network routes as needed

- Confirm interface configuration

 

CRON - System Scheduler

- Explore Cron Implementation

- Explain scheduling options

- Global and scope-based Cron options

- Schedules jobs to run & examine the output

- Configure individual Crontab entries

 

Implement Network Time Protocol Daemon (NTPD) Client/Server

- Configure Network Time Protocol (NTP) to perform client/server time synchronization

- Identify NTP bounded UDP interfaces

- Synchronize with various NTP instancs

- Confirm synchronization status

 

Dynamic Host Configuration Protocol (DHCP)

- Provision dedicated broadcast domain

- Configure DHCP scope

- Discuss various options

- Confirm functional configuration

- Add reservations and test

 

Domain Name System (DNS)

- Explore SUSE DNS configuration via YaST

- Configure BIND as a caching-only DNS server

- Implement Master DNS Zone

- Configure Reverse Zone for local subnet

- Implement Dynamic Domain Name System (DDNS) Zones (Forward/Reverse)

- Explain DHCP and DNS update integration options

- Integrate DHCP with DNS via Encypted Transaction Signatures (TSigs)

- Evaluate results of BIND configuration using DIG & host

- Implement DNS sub-domains (Third-level domains)

 

FTP Service

- Install FTP Server

- Explore common options

- Test anonymous and authenticated connectivity

- Disable anonymous access

- CHROOT authenticated users | debug where required

 

Software Repository

- Examine existing configuration

- Provision HTTP repository | confirm HTTP access

- Add Repos to configuration | evaluate

 

Apache HTTPD Server

- Install Apache HTTPD

- Confirm content delivery

- Enable IP-based Virtual Hosts

- Test access to various content

- Transition to Name-based Virtual Hosts

- Contrast with IP-based Virtual Hosts

 

Network Reconnaissance

- Install NMap

- Explore common features

- Ascertain local resources

- Contrast discrepancies

- Find subnet-wide hosts

- Perform comprehensive scan of subnet-wide hosts

 

GPG Content Protection

- Discuss features

- Generate usage keys

- Share public keys

- Encrypt and share content

- Decrypt and confirm integrity

 

Packet Capturing

- Discuss features

- Capture various traffic

- Store captures for analysis

- Read captures with various filters

- Capture using various BPFs

 

WireShark | Packet Analysis

- Discuss Usage

- Install WireShark

- Analyze TCPDump captures

- Reconstruct streams

- Identify interesting packet characteristics

 

SuSE Firewall

- Discuss features

- Explore defaults

- Apply custom rules

- Apply rules to internal zone

- Examine behavior

DOWNLOAD

 

Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.

Udostępnij tę odpowiedź


Odnośnik do odpowiedzi
Udostępnij na innych stronach

Dołącz do dyskusji

Możesz dodać zawartość już teraz a zarejestrować się później. Jeśli posiadasz już konto, zaloguj się aby dodać zawartość za jego pomocą.

Gość
Dodaj odpowiedź do tematu...

×   Wklejono zawartość z formatowaniem.   Usuń formatowanie

  Dozwolonych jest tylko 75 emoji.

×   Odnośnik został automatycznie osadzony.   Przywróć wyświetlanie jako odnośnik

×   Przywrócono poprzednią zawartość.   Wyczyść edytor

×   Nie możesz bezpośrednio wkleić grafiki. Dodaj lub załącz grafiki z adresu URL.

    • 1 Posts
    • 124 Views
    • 1 Posts
    • 128 Views
    • 1 Posts
    • 106 Views
    • 1 Posts
    • 109 Views
    • 1 Posts
    • 159 Views

×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.