CG数据库 >> LinuxCBT SLES-12x Edition

LinuxCBT SLES-12x Edition的图片1

LinuxCBT SLES-12x Edition

English | 2015 | mp4 | H264 1356x764 | AAC 2 ch | 16 hrs 3 min | 1.98 GB

eLearning

Course Objective

Installations

- Identify and obtain ISO images

- Prep VM GUEST

- Perform Desktop installation

- Tweak Desktop environment

- Publish repository via HTTP

- Perform Server installation via HTTP

- Confirm setup and tweak

- Discuss various installation methods

- Perform SSH-based installation

- Perform VNC-based installation

- Confirm installation images

- Evaluate SystemD Target

- Clone GUEST installation

- Evaluate results of various installation methods

Basic Linux Skills - Command Line Interface (CLI) - BASH

- Introduction to GNOME Terminal

- Demonstrate usage of the following useful commands & concepts

- ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami, man, info

- alias, cat, file, chmod, chown, history

- Standard in/out, UNIX Pipes, Redirection, Command Chaining

- ps, df, free, vmstat, top, kill

- less & more, head & tail, diff

- which & whereis, w, who

- Explore BASH configuration files

- Use grep and awk to process text files

- Archival & Compression Utilities: tar, gzip, bzip2, zip

- Explore important facets of BASH environment

Common Network Clients

- File Transfer Protocol (FTP) client

- Install and use LFTP - FTP Client to connect to FTP resources

- Mirror and reverse mirror using LFTP to synchronize data

- Wget - HTTP/HTTPS/FTP connectivity

- Explore SSH clients - Discuss features

- Identify key SSH-client files (.known_hosts, public/private key pairs,etc.)

- Use Secure Copy Protocol (SCP) to move data between systems non-interactively

- Use Secure File Transfer Protocol (SFTP) to move data between systems interactively

- Demonstrate how to generate Public/Private key (RSA/DSA) pairs using ssh-keygen

- Copy public keys to remote systems using: ssh-copy-id

- Demonstrate using SSHto authenticate to remote Linux hosts without passwords

- Authenticate to remote Linux systems using alternate credentials

- Generate Public Key/Private Key pairs for use with file and E-mail encryption

- Demonstrate using E-mail client with GNU Privacy Guard (GPG) Open PGP for E-Mail encryption

- Use ping, netstat, arp, telnet, traceroute, ifconfig - network diagnostics

- Use dig, host, nslookup, whois name resolution clients

Users, Groups & Permissions

- User and group creation & management concepts - passwd, shadow, group, gshadow files

- Use lastlog to determine system-access to various terminals

- Use YaST to create and manage users and groups

- Use stat to ascertain file information

- SETUID | SETGID | Sticky Bit

- Discuss and Implement Hard and Symbolic links

SYSLOG | LOG ROTATE

- Explore Boot log & System Log

- Explanation of syslog facilities & levels

- Discuss rSYSLOG features & enhancements

- Demonstrate syslog administration

- Enable rSYSLOG network listener

- Explore automatic log rotation and customization via Logrotate

- Configure Logrotate to rotate & compress sample log files

Storage Administration

- Provision additional SWAP storage paritions and files

- Identify allocated swap space to the kernel

- Committ changes to /etc/fstab for persistence

- Disable swapping with swapoff as necessary

- Introduction to BTRFS File System

- Explore BTRFS defaults

- Administer important aspects of BTRFS

- Discuss features and benefits of LVM

- Implement Logical Volume Management (LVM)

- Manage LVM via GUI and CLI

- Evaluate results

Network - Physical & Logical Configuration

- Identify key management tool

- Explore interfaces across systems

- Provision IP aliases and evaluate

- Add network routes as needed

- Confirm interface configuration

CRON - System Scheduler

- Explore Cron Implementation

- Explain scheduling options

- Global and scope-based Cron options

- Schedules jobs to run & examine the output

- Configure individual Crontab entries

Implement Network Time Protocol Daemon (NTPD) Client/Server

- Configure Network Time Protocol (NTP) to perform client/server time synchronization

- Identify NTP bounded UDP interfaces

- Synchronize with various NTP instancs

- Confirm synchronization status

Dynamic Host Configuration Protocol (DHCP)

- Provision dedicated broadcast domain

- Configure DHCP scope

- Discuss various options

- Confirm functional configuration

- Add reservations and test

Domain Name System (DNS)

- Explore SUSE DNS configuration via YaST

- Configure BIND as a caching-only DNS server

- Implement Master DNS Zone

- Configure Reverse Zone for local subnet

- Implement Dynamic Domain Name System (DDNS) Zones (Forward/Reverse)

- Explain DHCP and DNS update integration options

- Integrate DHCP with DNS via Encypted Transaction Signatures (TSigs)

- Evaluate results of BIND configuration using DIG & host

- Implement DNS sub-domains (Third-level domains)

FTP Service

- Install FTP Server

- Explore common options

- Test anonymous and authenticated connectivity

- Disable anonymous access

- CHROOT authenticated users | debug where required

Software Repository

- Examine existing configuration

- Provision HTTP repository | confirm HTTP access

- Add Repos to configuration | evaluate

Apache HTTPD Server

- Install Apache HTTPD

- Confirm content delivery

- Enable IP-based Virtual Hosts

- Test access to various content

- Transition to Name-based Virtual Hosts

- Contrast with IP-based Virtual Hosts

Network Reconnaissance

- Install NMap

- Explore common features

- Ascertain local resources

- Contrast discrepancies

- Find subnet-wide hosts

- Perform comprehensive scan of subnet-wide hosts

GPG Content Protection

- Discuss features

- Generate usage keys

- Share public keys

- Encrypt and share content

- Decrypt and confirm integrity

Packet Capturing

- Discuss features

- Capture various traffic

- Store captures for analysis

- Read captures with various filters

- Capture using various BPFs

WireShark | Packet Analysis

- Discuss Usage

- Install WireShark

- Analyze TCPDump captures

- Reconstruct streams

- Identify interesting packet characteristics

SuSE Firewall

- Discuss features

- Explore defaults

- Apply custom rules

- Apply rules to internal zone

- Examine behavior

LinuxCBT SLES-12x Edition的图片2

LinuxCBT SLES-12x Edition的图片3

发布日期: 2015-08-12