LinuxCBT - EL-4 Edition

Član
Učlanjen(a)
31.12.2011
Poruka
4.869
224333e2b8aa6f6c71a9eeabc6d0202c.jpg

LinuxCBT-EL-4 Edition-d3x
Size: 4.49 GB


Category: Linux

Duration: 65 Hours

Course Objective

Installations and Usage on Dell PowerEdge Hardware
Discuss features of RedHat® Enterprise Linux 4
Prepare images for network installation
Install RedHat Enterprise 4 Workstation on Dell Power Edge Server

Explore GNOME graphical environment
Introduction to Bourne Again Shell (BASH) – Globes/environment
Input (STDIN), output (STDOUT) and standard error (STDERR) redirection
Pipes
Command chaining
BASH for loops

Common BASH Shell commands – Command Line Interface (CLI)
pwd, touch, stat, ls – explore useful Linux system commands
echo, cat – expose ASCII text and integrate with files
cp – copy files
mv – move files throughout the file system
tar – explore features and advantages of tarballs
gzip, bzip2 – intetgrate with tar and examine Internet archive
diff – compare and contrast between 2 or 3 files – diff3
file – discuss logic used to ascertain file type
find – single and multiple expressions and criteria
slocate – Compare and contrast with find and create system-wide DB
w, wall, watch, whereis, which, who – Important w commands
ps & pstree- explore process lists
free & top – explore process management with top
seq, top, jobs, fg, kill, killall, bg – Manage processes using standard tools
Use grep to process lines
Use awk to process fields – 30

Common Network Clients & Utilities
nano editor
Convert Unix text files to Windows format using unix2dos
Convert Windows text files to Unix format using dos2unix
Retrieve local and remote mail with mutt Mail User Agent (MUA)
mount – Mount CDs and ISO images – create ISOs with mkisofs
FTP – explore the standard File Transfer Protocol (FTP) client
gFTP – Usge GNOME FTP to interact with remote FTP server
LFTP – basic usage, job control
LFTP – mirror and reverse mirror content – resume transmission
LFTP – batch, non-interactive, scripted mode
Introduction to SSH concepts, implementation, etc.
Use SSH Client to connect to remote Linux Systems using password authentication
Identify key SSH-client files (.known_hosts, public/private key pairs,etc.)
Authenticate to remote Linux systems using alternate credentials
Use Secure Copy Protocol (SCP) to move data between systems non-interactively
Use Secure File Transfer Protocol (SFTP) to move data between systems interactively
Demonstrate how to generate Public/Private key (RSA/DSA) pairs using SSH-Keygen
Demonstrate using SSH to authenticate to remote Linux hosts without passwords
Install RedHat Enterprise Workstation on Dell Laptop using HTTP
Generate Public Key/Private Key pairs for use with file and E-mail encryption
Demonstrate using E-mail client with GNU Privacy Guard (GPG) Open PGP for E-Mail encryption
Use Remote Desktop to connect to RDP & VNC remote Linux and Windows hosts

top

Installation on Dell Poweredge Server
Prepare Sources on Apache HTTP server
Burn bootable CD with network drivers for network-based installation
Remove hardware-based RAID 0 configuration
Configure hardware-based RAID 5 logical storage
Commence software installation
Create custom partitions and mount points during installation
Configure X11 and confirm installation

System Initialization
Explore GRUB
Explore system recovery mode
Explore INIT

System V Linux Runlevel implementation
Identify key startup files, including scripts (inittab,Sscripts,Kscripts,etc.)
Explain GNU/Linux System V Init Runlevel (0 – 6) concepts & applications
chkconfig & ntsysv
Identify startup log files & entries using DMESG & exploration

Manage Users and Groups & Permissions
User and group creation & management concepts – passwd, shadow, group, gshadow files
Use system-config-users to create and manage users and groups
chmod/chown/chgrp
SETGID – Group collaboration
Explore Hard and Symbolic links including across disparate file systems

File System Management
FDISK
Create Standard Linux Partition
Make EXT2 File System & mount for general usage
Use tune2fs to upgrade EXT2 to EXT3 File System
Remove EXT2 partition and create EXT3-based parition
FSTAB – explore File System Table
Use FDISK to create a swap partition
Create Swap partition using MKSWAP & SWAPON
Provision additional swap space using swapon & swapoff
Explore GNU Parted as a partition and file-system management tool
Use Parted to create EXT?-based and Swap partitions

Logical Volume Management (LVM) – Discuss concepts and applications
Allocate partitions for usage with LVM
Create Physical Volumes
Create Volume Groups based on Physical Volumes
Create Logical Volumes based on Volume Groups
Prepare EXT3-based file systems on LVM-managed storage
Mount and use LVM Volumes
Resize LVM Volumes

Kickstart-based RAID Installation
Use Kickstart tool to configure automated kickstart process
Installation via HTTP using Kickstart
Discuss RAID concepts and configuration
Configure RAID disk partitions

RPM Package Management Tool Concepts & Usage
Query existing packages & file-based packages
Identify offline and online package repositories
Install packages
Upgrade packages
Freshen packages
Remove packages

Kernel Concepts and Management
Identify and discuss kernel implementation
Use kernel utils to identify modules and supported hardware
Discuss proper kernel update procedures
Download and Install the latest SMP-based kernel
Confirm results
Remove outdated kernel and confirm results
Download and Install the latest Uniprocessor-based kernel
Examine changes to GRUB and other key directory trees
SYSCTL – use to view and modify run-time variables

top

Network – Physical & Logical Configuration
Identify key directories & files for static & dynamic communications
Configure Linux client with static TCP/IP parameters for network communication
Explore hotplug -> hwup -> ifup logic
Use ifconfig to ascertain logical TCP/IP configuration
Use hwinfo to ascertain installed hardware
Configure Aliased Ethernet Interfaces to faciliate multiple IP addresses

Explore System Logging via SYSLOG and Logrotate
Explore Boot log & System Log
Explore dmesg
Explanation of syslog facilities & levels
Demonstrate syslog administration
Enable SYSLOG network listener
Demonstrate Cisco PIX Firewall to Linux SYSLOG functionality
Explore automatic log rotation and customization via Logrotate
Configure Logrotate to rotate & compress sample log files

Implement Network Time Protocol (NTP) Client/Server
Configure Network Time Protocol (NTP) to perform client/server time synchronization
Synchronize SUSE Enterprise Linux NTP with additional Linux Stratum 2 NTP server
Synchronize against Stratum 1 NTP servers

Dynamic Host Configuration Protocol (DHCP)
Explain DHCP Concepts & Applications
Explore DHCP confiuration files
Configure DHCP subnet with applicable options
Configure DHCP Reservation based on layer-2 address

Domain Name System (DNS)
Configure BIND as a caching-only DNS server
Implement Master DNS Zone
Configure Reverse Zone for local subnet
Implement Dynamic Domain Name System (DDNS) Zones (Forward/Reverse)
Explain DHCP and DNS update integration options
Integrate DHCP with DNS via Encypted Transaction Signatures (TSigs)
Configure Windows 2003 Active Directory to publish DNS Records to Linux Server
Examine Windows 2003 SRV Records
Configure Master/Slave Zones with Linux Server
Evaluate results of BIND configuration using DIG & host
Implement DNS sub-domains (Third-level domains)

CRON – System Scheduler
Explore Cron Implementation
Explain scheduling options
Global and scope-based Cron options
Schedules jobs to run & examine the output
Configure individual Crontab entries

Samba Implementation
Implement Linux & Windows Integration via Samba
Explore Samba Configuration files
Implement SMBFS integration with SUSE Enterprise Linux File System
Mount Windows shares seamlessly using Samba File System (SMBFS)
Configure FSTAB to support repetitive mounts
Implement secure SMBFS credentials for mounting
Install Samba Server support
Install Samba Web-based Administration Tool (SWAT)
Configure Samba file sharing
Configure Samba with multiple NETBIOS aliases
Install Active Directory (AD) on Windows 2003 Host
Configure Samba-Active Directory Integration

Very Secure VSFTPD File Transfer Protocol (FTP) services
Implement anonymous FTPD
Implement user-level FTPD access
Implement FTPD banners
Disable anonymous access
Configure VSFTPD to chroot jail users into their home directories
Implement bandwidth rate-limiting to control bandwidth usage

Network File System (NFS) Implementation
Implement NFS Server
Export shares and discuss options
Mount NFS exports on remote Linux Host
Implement AutoFS

Trivial File Transfer Protocol (TFTP) Implementation
Install TFTP server
Backup Cisco PIX firewall configuration using TFTP
Update Cisco PIX firewall configuration using TFTP

top

Apache Web Server Implementation
Discuss Apache server’s features and concepts
Examine Apache-RedHat HTTPD CONF hierarchy
Examine various configuration files
Implement Apache Mod Alias and ScriptAlias
Follow SYMLINKS
Discuss and implement the Directory directive
Restrict access to content based on IPs and subnets
Implement user home (public_html) directories for personal web-publishing
Configure.htacess file with directives
Configure IP-based Virtual Hosts
Configure Name-based Virtual Hosts
Implement Basic and digest authentication schemes
Explore Apache logging semantics
Implement Apache logging system per virtual host
Webalizer Log Analysis software Implementation
Generate web reports using Webalizer
Perl CGI – Implementation

MySQL® Relational Database Management System
Install MySQL® Relational Database Management System
Secure access to MySQL®
Explore MySQL® monitor shell-based interface
Create sample MySQL® databases
Load external data-set from Linux
Load external data-set from Windows

PHPMyAdmin – MySQL® Web-based Management Interface
Install PHPMyAdmin for web-based management of MySQL instances
Explain & Secure access to PHPMyAdmin
Explore PHPMyAdmin’s interface

Postfix Message Transfer Agent (MTA)
Introduction to Sendmail Implementation
Configure Postfix as default MTA
Introduction to Postfix Message Transfer Agent (MTA)
Explore the directives in the Postfix configuration files
Define default values for the FQDN
Alter myorigin and examine results
Configure Postfix to route messages using a Smarthost
Examine how Postfix delivers mail locally
Configure SMTP Relaying in Postfix
Use Mutt to demonstrate outbound mail handling using Postfix
Define SMTP Virtual domains for hosting multiple DNS domains
Configure Postfix with a production LinuxCBT DNS domain
Examine Virtual domain routing with production and non-production DNS domains

Internet Messaging Access Protocol (IMAP) – Dovecot
Explain IMAP concepts and applications in comparison to POP3
Implement IMAP services
Connect to IMAP services from remote Windows Outlook Express client
Implement IMAPS
Generate new self-signed SSL certificate for use with IMAPS

Squirrel-mail Web-based Mail Interface Implementation
Describe required squirrel mail components for web-mail integration
Install squirrel mail on SUSE Enterprise Linux system
Configure Apache virtual directory for squirrel mail integration
Configure Apache Virtual Host for squirrel mail integration
Configure BIND DNS services for squirrel mail integration
Explore squirrel mail’s web-based interface

XMPP – Enterprise Instant Messenger – Jive Messenger
Download and Install Jive Messenger
Configure Jive Messenger for usage
Evaluate IM-connectivity from Linux Jabber-compliant client
Evaluate IM-connectivity from Windows Jabber-compliant client

top

System Audit & Lockdown
Identify tools to perform system audit
Ascertain and document current system state
Close all superflous services
Bind necessary services (daemons) to necessary interfaces and logical addresses
Establish security configuration baseline

NMAP – Port Scanner and Vulnerability Assessment Tool
Obtain, and install current version of NMAP
Identify commonly used NMAPoptions/switches/parameters
Explain typical TCPhandshake protocol while using NMAP
Identifiy key NMAP configuration files
Use NMAP to perform operating system fingerprinting
Peform subnet-wide ethical scans
Perform default TCPSYN-based ethical scans of local and remote resources
Examine the results of scans on remote Cisco firewall with debugging mode enabled
Perform default TCPConnect-based ethical scans of local and remote resources
Examine the results of scans on remote Cisco PIXFirewall with debugging mode enabled
Use NMAPto scan using aliased and spoofed IP addresses
Peform local ethical scans
Explore NMAP Front-End Graphical User Interface (GUI)
Discuss NMAP’s features and applications
Perform Connect/Syn/Fin and various ethical port-scans
Perform service exposure scans

XINETD (Enhanced & Secure INETD Super Server Implementation)
Identify key XINETD configuration files
Explain the contents and structure of xinetd.conf
Restrict access to various daemons/services based on hosts & subnets
Lockdown XINETD-controlled services
Configure XINETD to restrict number of spawned instances of daemons/services
Configure XINETD to bind daemons/services to specific sub-interfaces (Virtual IP addresses)
XINETD logging
Explore additional XINETD features

TCP Wrappers concepts & applications
Identify primary package and key TCP Wrappers configuration files
Demonstrate disabled TCP Wrappers configurations by attempting connectivity
Examine pre and post TCP Wrappers configuration effects
Implement TCP Wrappers for common services
Test local & remote access to TCP Wrappers-protected host & services

IPTABLES (Netfilter Linux Kernel-based Firewall)
Discuss IPTABLES/Netfilter Concepts
Explore default tables and chains
Define and test INPUT chains
Define and test OUTPUT chains
Create user-defined chain and evaluate results
Explain IPTABLES default chains/filters and policies
Examine TCP/ICMP communications pre-IPTABLES chains
Implement ICMP inbound filtration based on various hosts
Use Cisco PIX Firewall to verify ICMP debugging
Filter traffic based on Layer-4 TCP/UDP (Source/Destination Ports) information
Restrict access to various daemons (SSH/FTP/HTTP/etc.)
Test connectivity locally and remotely (RedHat/Windows/etc.)
Implement IP Forwarding between disparate subnets
Implement Network Address Translation (NAT)

Nessus Vulnerability Scanner
Download and Install Nessus Vulnerability Scanner
Install missing system dependencies
Generate self-signed SSL certificates
Perform basic Nessus system configuration and start the daemon
Use Nessus Linux client to connect to Nessus Server and perform scans
Examine resuls of scanning Windows 2003 Host
Examine resuls of scanning Cisco PIX Firewall Appliance

Secure Shell Daemon – Secure Communications Implementation
Explore SSHD key configuration files
Restrict access to SSHD
Explore SSHD logging
Configure PVPNs with local port forwarding
Configure PVPNs with remote port forwarding
Execute remote commands in non-interactive mode using SSH
Discuss forced-commands framework
Configure SUSE Enterprise to accomodate forced-commands
Test forced-commands for pre-configured accounts for push/pull secure transactions
Integrate SSHD with Windows 2003 Server and PuTTY SSH client
Implement PKI with PuTTY SSH
Use PSCP and PSFTP to communicate securely from Windows® 2003 to SUSE® Linux

Snort® 2.x Network Intrusion Detection System (NIDS)
Obtain, and install pre-requisites (libpcap/libpcre/etc.)
Obtain, compile and install the Snort® Network Intrusion Detection System (NIDS)
Identify and explain key operating modes (Sniffer/Logger/NIDS)
Explore in network sniffer mode
Explain OSI Model and relevant sniffing options
Explore Snort® in ASCII and Binary (TCPDUMP) logging modes
Output logs to ASCII text format and examine the results
Output logs to binary format and examine the results
Implement Snort® with BPF to filter traffic
Generate traffic from remote Windows 2003 and Linux hosts
Use Snort® with Berkeley Packet Filter (BPF) to parse logs
Implement Snort® in NIDS modes
Explore the snort.conf file and discuss rules
Explain Logging and Alerting output options
Perform port-scans from remote Linux systems and analyze Alerts
Configure Snort® to log to SYSLOG

With a Premium account you can download files having Fullspeed !
Download from Uploaded
Kod:
http://uploaded.net/file/xsrh7ctp/LinuxCBT.EL-4.Edition.part01.rar
http://uploaded.net/file/03ni6i0h/LinuxCBT.EL-4.Edition.part02.rar
http://uploaded.net/file/2eqpxfwi/LinuxCBT.EL-4.Edition.part03.rar
http://uploaded.net/file/v94tu2ii/LinuxCBT.EL-4.Edition.part04.rar
http://uploaded.net/file/oc7nt129/LinuxCBT.EL-4.Edition.part05.rar
http://uploaded.net/file/xoq923x2/LinuxCBT.EL-4.Edition.part06.rar
http://uploaded.net/file/ioznqb5f/LinuxCBT.EL-4.Edition.part07.rar
http://uploaded.net/file/sbzf594c/LinuxCBT.EL-4.Edition.part08.rar
http://uploaded.net/file/oyxzrtrj/LinuxCBT.EL-4.Edition.part09.rar
http://uploaded.net/file/hxd7a2w3/LinuxCBT.EL-4.Edition.part10.rar
http://uploaded.net/file/001ppdmt/LinuxCBT.EL-4.Edition.part11.rar
http://uploaded.net/file/nm0r1p9w/LinuxCBT.EL-4.Edition.part12.rar
Download from Lumfile
Kod:
http://lumfile.com/hmwx1s8mw0vj/LinuxCBT.EL-4.Edition.part01.rar
http://lumfile.com/pkl8al9wh76f/LinuxCBT.EL-4.Edition.part02.rar
http://lumfile.com/zv160msdh3s3/LinuxCBT.EL-4.Edition.part03.rar
http://lumfile.com/f94mfpgwz1t4/LinuxCBT.EL-4.Edition.part04.rar
http://lumfile.com/95wf1nz5rrii/LinuxCBT.EL-4.Edition.part05.rar
http://lumfile.com/9nf8b2zlebpv/LinuxCBT.EL-4.Edition.part06.rar
http://lumfile.com/81agvba56wnw/LinuxCBT.EL-4.Edition.part07.rar
http://lumfile.com/d9vnx83h7w2c/LinuxCBT.EL-4.Edition.part08.rar
http://lumfile.com/i2ljgjha6me1/LinuxCBT.EL-4.Edition.part09.rar
http://lumfile.com/qgokfdkaedp3/LinuxCBT.EL-4.Edition.part10.rar
http://lumfile.com/iiurdtg3arzk/LinuxCBT.EL-4.Edition.part11.rar
http://lumfile.com/i154v0kqvrd8/LinuxCBT.EL-4.Edition.part12.rar
 
Natrag
Top