LinuxCBT SLES-12x Edition
English | 2015 | mp4 | H264 1356x764 | AAC 2 ch | 16 hrs 3 min | 1.98 GB
eLearning
Course Objective
Installations
- Identify and obtain ISO images
- Prep VM GUEST
- Perform Desktop installation
- Tweak Desktop environment
- Publish repository via HTTP
- Perform Server installation via HTTP
- Confirm setup and tweak
- Discuss various installation methods
- Perform SSH-based installation
- Perform VNC-based installation
- Confirm installation images
- Evaluate SystemD Target
- Clone GUEST installation
- Evaluate results of various installation methods
Basic Linux Skills - Command Line Interface (CLI) - BASH
- Introduction to GNOME Terminal
- Demonstrate usage of the following useful commands & concepts
- ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami, man, info
- alias, cat, file, chmod, chown, history
- Standard in/out, UNIX Pipes, Redirection, Command Chaining
- ps, df, free, vmstat, top, kill
- less & more, head & tail, diff
- which & whereis, w, who
- Explore BASH configuration files
- Use grep and awk to process text files
- Archival & Compression Utilities: tar, gzip, bzip2, zip
- Explore important facets of BASH environment
Common Network Clients
- File Transfer Protocol (FTP) client
- Install and use LFTP - FTP Client to connect to FTP resources
- Mirror and reverse mirror using LFTP to synchronize data
- Wget - HTTP/HTTPS/FTP connectivity
- Explore SSH clients - Discuss features
- Identify key SSH-client files (.known_hosts, public/private key pairs,etc.)
- Use Secure Copy Protocol (SCP) to move data between systems non-interactively
- Use Secure File Transfer Protocol (SFTP) to move data between systems interactively
- Demonstrate how to generate Public/Private key (RSA/DSA) pairs using ssh-keygen
- Copy public keys to remote systems using: ssh-copy-id
- Demonstrate using SSHto authenticate to remote Linux hosts without passwords
- Authenticate to remote Linux systems using alternate credentials
- Generate Public Key/Private Key pairs for use with file and E-mail encryption
- Demonstrate using E-mail client with GNU Privacy Guard (GPG) Open PGP for E-Mail encryption
- Use ping, netstat, arp, telnet, traceroute, ifconfig - network diagnostics
- Use dig, host, nslookup, whois name resolution clients
Users, Groups & Permissions
- User and group creation & management concepts - passwd, shadow, group, gshadow files
- Use lastlog to determine system-access to various terminals
- Use YaST to create and manage users and groups
- Use stat to ascertain file information
- SETUID | SETGID | Sticky Bit
- Discuss and Implement Hard and Symbolic links
SYSLOG | LOG ROTATE
- Explore Boot log & System Log
- Explanation of syslog facilities & levels
- Discuss rSYSLOG features & enhancements
- Demonstrate syslog administration
- Enable rSYSLOG network listener
- Explore automatic log rotation and customization via Logrotate
- Configure Logrotate to rotate & compress sample log files
Storage Administration
- Provision additional SWAP storage paritions and files
- Identify allocated swap space to the kernel
- Committ changes to /etc/fstab for persistence
- Disable swapping with swapoff as necessary
- Introduction to BTRFS File System
- Explore BTRFS defaults
- Administer important aspects of BTRFS
- Discuss features and benefits of LVM
- Implement Logical Volume Management (LVM)
- Manage LVM via GUI and CLI
- Evaluate results
Network - Physical & Logical Configuration
- Identify key management tool
- Explore interfaces across systems
- Provision IP aliases and evaluate
- Add network routes as needed
- Confirm interface configuration
CRON - System Scheduler
- Explore Cron Implementation
- Explain scheduling options
- Global and scope-based Cron options
- Schedules jobs to run & examine the output
- Configure individual Crontab entries
Implement Network Time Protocol Daemon (NTPD) Client/Server
- Configure Network Time Protocol (NTP) to perform client/server time synchronization
- Identify NTP bounded UDP interfaces
- Synchronize with various NTP instancs
- Confirm synchronization status
Dynamic Host Configuration Protocol (DHCP)
- Provision dedicated broadcast domain
- Configure DHCP scope
- Discuss various options
- Confirm functional configuration
- Add reservations and test
Domain Name System (DNS)
- Explore SUSE DNS configuration via YaST
- Configure BIND as a caching-only DNS server
- Implement Master DNS Zone
- Configure Reverse Zone for local subnet
- Implement Dynamic Domain Name System (DDNS) Zones (Forward/Reverse)
- Explain DHCP and DNS update integration options
- Integrate DHCP with DNS via Encypted Transaction Signatures (TSigs)
- Evaluate results of BIND configuration using DIG & host
- Implement DNS sub-domains (Third-level domains)
FTP Service
- Install FTP Server
- Explore common options
- Test anonymous and authenticated connectivity
- Disable anonymous access
- CHROOT authenticated users | debug where required
Software Repository
- Examine existing configuration
- Provision HTTP repository | confirm HTTP access
- Add Repos to configuration | evaluate
Apache HTTPD Server
- Install Apache HTTPD
- Confirm content delivery
- Enable IP-based Virtual Hosts
- Test access to various content
- Transition to Name-based Virtual Hosts
- Contrast with IP-based Virtual Hosts
Network Reconnaissance
- Install NMap
- Explore common features
- Ascertain local resources
- Contrast discrepancies
- Find subnet-wide hosts
- Perform comprehensive scan of subnet-wide hosts
GPG Content Protection
- Discuss features
- Generate usage keys
- Share public keys
- Encrypt and share content
- Decrypt and confirm integrity
Packet Capturing
- Discuss features
- Capture various traffic
- Store captures for analysis
- Read captures with various filters
- Capture using various BPFs
WireShark | Packet Analysis
- Discuss Usage
- Install WireShark
- Analyze TCPDump captures
- Reconstruct streams
- Identify interesting packet characteristics
SuSE Firewall
- Discuss features
- Explore defaults
- Apply custom rules
- Apply rules to internal zone
- Examine behavior
发布日期: 2015-08-12