Скачать LinuxCBT Enterprise Linux 4 Editiоn [ ISO, HuntR, PDU ] ( 2010 ) без смс |
Title: LinuxCBT Enterprise Linux 4 Year: 2010 Version: 4 Edition Architecture: i386 + x86_64 Language: Eng Treatment: not required Multi-User License: Select During Checkout Content Size: 3.13 GB LinuxCBT Enterprise Linux 4 Edition Overview LinuxCBT Enterprise Linux 4 Edition focuses on the RedHat® Enterprise 4 GNU/Linux operating system. It is the successor to LinuxCBT Classic Edition. Recommended Prerequisites for: LinuxCBT EL-4 Edition Open mind & determination to master Linux and related open-source applications Basic MS Windows skills Basic understanding of networking concepts Access to a PC to perform all of the installations and exercises Workstation Focus - Module 1: Installations and Usage on Dell PowerEdge Hardware Discuss features of RedHat® Enterprise Linux 4 Prepare images for network installation Install RedHat Enterprise 4 Workstation on Dell Power Edge Server Explore GNOME graphical environment Introduction to Bourne Again Shell (BASH) - Globes/environment Input (STDIN), output (STDOUT) and standard error (STDERR) redirection Pipes Command chaining BASH for loops Common BASH Shell commands - Command Line Interface (CLI) pwd, touch, stat, ls - explore useful Linux system commands echo, cat - expose ASCII text and integrate with files cp - copy files mv - move files throughout the file system tar - explore features and advantages of tarballs gzip, bzip2 - intetgrate with tar and examine Internet archive diff - compare and contrast between 2 or 3 files - diff3 file - discuss logic used to ascertain file type find - single and multiple expressions and criteria slocate - Compare and contrast with find and create system-wide DB w, wall, watch, whereis, which, who - Important w commands ps & pstree- explore process lists free & top - explore process management with top seq, top, jobs, fg, kill, killall, bg - Manage processes using standard tools Use grep to process lines Use awk to process fields - 30 Common Network Clients & Utilities: nano editor Convert Unix text files to Windows format using unix2dos Convert Windows text files to Unix format using dos2unix Retrieve local and remote mail with mutt Mail User Agent (MUA) mount - Mount CDs and ISO images - create ISOs with mkisofs FTP - explore the standard File Transfer Protocol (FTP) client gFTP - Usge GNOME FTP to interact with remote FTP server LFTP - basic usage, job control LFTP - mirror and reverse mirror content - resume transmission LFTP - batch, non-interactive, scripted mode Introduction to SSH concepts, implementation, etc. Use SSH Client to connect to remote Linux Systems using password authentication Identify key SSH-client files (.known_hosts, public/private key pairs,etc.) Authenticate to remote Linux systems using alternate credentials Use Secure Copy Protocol (SCP) to move data between systems non-interactively Use Secure File Transfer Protocol (SFTP) to move data between systems interactively Demonstrate how to generate Public/Private key (RSA/DSA) pairs using SSH-Keygen Demonstrate using SSH to authenticate to remote Linux hosts without passwords Install RedHat Enterprise Workstation on Dell Laptop using HTTP Generate Public Key/Private Key pairs for use with file and E-mail encryption Demonstrate using E-mail client with GNU Privacy Guard (GPG) Open PGP for E-Mail encryption Use Remote Desktop to connect to RDP & VNC remote Linux and Windows hosts System Configuration - Module 2: Installation on Dell Poweredge Server Prepare Sources on Apache HTTP server Burn bootable CD with network drivers for network-based installation Remove hardware-based RAID 0 configuration Configure hardware-based RAID 5 logical storage Commence software installation Create custom partitions and mount points during installation Configure X11 and confirm installation System Initialization Explore GRUB Explore system recovery mode Explore INIT System V Linux Runlevel implementation Identify key startup files, including scripts (inittab,Sscripts,Kscripts,etc.) Explain GNU/Linux System V Init Runlevel (0 - 6) concepts applications chkconfig ntsysv Identify startup log files entries using DMESG exploration Manage Users and Groups Permissions User and group creation management concepts - passwd, shadow, group, gshadow files Use system-config-users to create and manage users and groups chmod/chown/chgrp SETGID - Group collaboration Explore Hard and Symbolic links including across disparate file systems File System Management: FDISK Create Standard Linux Partition Make EXT2 File System & mount for general usage Use tune2fs to upgrade EXT2 to EXT3 File System Remove EXT2 partition and create EXT3-based parition FSTAB - explore File System Table Use FDISK to create a swap partition Create Swap partition using MKSWAP & SWAPON Provision additional swap space using swapon & swapoff Explore GNU Parted as a partition and file-system management tool Use Parted to create EXT?-based and Swap partitions Logical Volume Management (LVM) - Discuss concepts and applications Allocate partitions for usage with LVM Create Physical Volumes Create Volume Groups based on Physical Volumes Create Logical Volumes based on Volume Groups Prepare EXT3-based file systems on LVM-managed storage Mount and use LVM Volumes Resize LVM Volumes Kickstart-based RAID Installation Use Kickstart tool to configure automated kickstart process Installation via HTTP using Kickstart Discuss RAID concepts and configuration Configure RAID disk partitions RPM Package Management Tool Concepts & Usage Query existing packages & file-based packages Identify offline and online package repositories Install packages Upgrade packages Freshen packages Remove packages Kernel Concepts and Management Identify and discuss kernel implementation Use kernel utils to identify modules and supported hardware Discuss proper kernel update procedures Download and Install the latest SMP-based kernel Confirm results Remove outdated kernel and confirm results Download and Install the latest Uniprocessor-based kernel Examine changes to GRUB and other key directory trees SYSCTL - use to view and modify run-time variables Core Networking Services - Module 3: Network - Physical & Logical Configuration Identify key directories & files for static & dynamic communications Configure Linux client with static TCP/IP parameters for network communication Explore hotplug -> hwup -> ifup logic Use ifconfig to ascertain logical TCP/IP configuration Use hwinfo to ascertain installed hardware Configure Aliased Ethernet Interfaces to faciliate multiple IP addresses Explore System Logging via SYSLOG and Logrotate Explore Boot log & System Log Explore dmesg Explanation of syslog facilities levels Demonstrate syslog administration Enable SYSLOG network listener Demonstrate Cisco PIX Firewall to Linux SYSLOG functionality Explore automatic log rotation and customization via Logrotate Configure Logrotate to rotate compress sample log files Implement Network Time Protocol (NTP) Client/Server Configure Network Time Protocol (NTP) to perform client/server time synchronization Synchronize SUSE Enterprise Linux NTP with additional Linux Stratum 2 NTP server Synchronize against Stratum 1 NTP servers Dynamic Host Configuration Protocol (DHCP) Explain DHCP Concepts Applications Explore DHCP confiuration files Configure DHCP subnet with applicable options Configure DHCP Reservation based on layer-2 address Domain Name System (DNS) Configure BIND as a caching-only DNS server Implement Master DNS Zone Configure Reverse Zone for local subnet Implement Dynamic Domain Name System (DDNS) Zones (Forward/Reverse) Explain DHCP and DNS update integration options Integrate DHCP with DNS via Encypted Transaction Signatures (TSigs) Configure Windows 2003 Active Directory to publish DNS Records to Linux Server Examine Windows 2003 SRV Records Configure Master/Slave Zones with Linux Server Evaluate results of BIND configuration using DIG & host Implement DNS sub-domains (Third-level domains) CRON - System Scheduler Explore Cron Implementation Explain scheduling options Global and scope-based Cron options Schedules jobs to run & examine the output Configure individual Crontab entries Samba Implementation Implement Linux & Windows Integration via Samba Explore Samba Configuration files Implement SMBFS integration with SUSE Enterprise Linux File System Mount Windows shares seamlessly using Samba File System (SMBFS) Configure FSTAB to support repetitive mounts Implement secure SMBFS credentials for mounting Install Samba Server support Install Samba Web-based Administration Tool (SWAT) Configure Samba file sharing Configure Samba with multiple NETBIOS aliases Install Active Directory (AD) on Windows 2003 Host Configure Samba-Active Directory Integration Very Secure VSFTPD File Transfer Protocol (FTP) services Implement anonymous FTPD Implement user-level FTPD access Implement FTPD banners Disable anonymous access Configure VSFTPD to chroot jail users into their home directories Implement bandwidth rate-limiting to control bandwidth usage Network File System (NFS) Implementation Implement NFS Server Export shares and discuss options Mount NFS exports on remote Linux Host Implement AutoFS Trivial File Transfer Protocol (TFTP) Implementation Install TFTP server Backup Cisco PIX firewall configuration using TFTP Update Cisco PIX firewall configuration using TFTP Apache - MySQL - PHP (LAMP) - Disc 4: Apache Web Server Implementation Discuss Apache server's features and concepts Examine Apache-RedHat HTTPD CONF hierarchy Examine various configuration files Implement Apache Mod Alias and ScriptAlias Follow SYMLINKS Discuss and implement the Directory directive Restrict access to content based on IPs and subnets Implement user home (public_html) directories for personal web-publishing Configure .htacess file with directives Configure IP-based Virtual Hosts Configure Name-based Virtual Hosts Implement Basic and digest authentication schemes Explore Apache logging semantics Implement Apache logging system per virtual host Webalizer Log Analysis software Implementation Generate web reports using Webalizer Perl CGI - Implementation MySQL Relational Database Management System Install MySQL Relational Database Management System Secure access to MySQL Explore MySQL monitor shell-based interface Create sample MySQL databases Load external data-set from Linux Load external data-set from Windows PHPMyAdmin - MySQL Web-based Management Interface Install PHPMyAdmin for web-based management of MySQL instances Explain Secure access to PHPMyAdmin Explore PHPMyAdmin's interface Postfix Message Transfer Agent (MTA) Introduction to Sendmail Implementation Configure Postfix as default MTA Introduction to Postfix Message Transfer Agent (MTA) Explore the directives in the Postfix configuration files Define default values for the FQDN Alter myorigin and examine results Configure Postfix to route messages using a Smarthost Examine how Postfix delivers mail locally Configure SMTP Relaying in Postfix Use Mutt to demonstrate outbound mail handling using Postfix Define SMTP Virtual domains for hosting multiple DNS domains Configure Postfix with a production LinuxCBT DNS domain Examine Virtual domain routing with production and non-production DNS domains Internet Messaging Access Protocol (IMAP) - Dovecot Explain IMAP concepts and applications in comparison to POP3 Implement IMAP services Connect to IMAP services from remote Windows Outlook Express client Implement IMAPS Generate new self-signed SSL certificate for use with IMAPS Squirrel-mail Web-based Mail Interface Implementation Describe required squirrel mail components for web-mail integration Install squirrel mail on SUSE Enterprise Linux system Configure Apache virtual directory for squirrel mail integration Configure Apache Virtual Host for squirrel mail integration Configure BIND DNS services for squirrel mail integration Explore squirrel mail's web-based interface XMPP - Enterprise Instant Messenger - Jive Messenger Download and Install Jive Messenger Configure Jive Messenger for usage Evaluate IM-connectivity from Linux Jabber-compliant client Evaluate IM-connectivity from Windows Jabber-compliant client Security Implementation Techniques - Module 5: System Audit & Lockdown Identify tools to perform system audit Ascertain and document current system state Close all superflous services Bind necessary services (daemons) to necessary interfaces and logical addresses Establish security configuration baseline NMAP - Port Scanner and Vulnerability Assessment Tool Obtain, and install current version of NMAP Identify commonly used NMAPoptions/switches/parameters Explain typical TCPhandshake protocol while using NMAP Identifiy key NMAP configuration files Use NMAP to perform operating system fingerprinting Peform subnet-wide ethical scans Perform default TCPSYN-based ethical scans of local and remote resources Examine the results of scans on remote Cisco firewall with debugging mode enabled Perform default TCPConnect-based ethical scans of local and remote resources Examine the results of scans on remote Cisco PIXFirewall with debugging mode enabled Use NMAPto scan using aliased and spoofed IP addresses Peform local ethical scans Explore NMAP Front-End Graphical User Interface (GUI) Discuss NMAP's features and applications Perform Connect/Syn/Fin and various ethical port-scans Perform service exposure scans XINETD (Enhanced & Secure INETD Super Server Implementation) Identify key XINETD configuration files Explain the contents and structure of xinetd.conf Restrict access to various daemons/services based on hosts & subnets Lockdown XINETD-controlled services Configure XINETD to restrict number of spawned instances of daemons/services Configure XINETD to bind daemons/services to specific sub-interfaces (Virtual IP addresses) XINETD logging Explore additional XINETD features TCP Wrappers concepts & applications Identify primary package and key TCP Wrappers configuration files Demonstrate disabled TCP Wrappers configurations by attempting connectivity Examine pre and post TCP Wrappers configuration effects Implement TCP Wrappers for common services Test local & remote access to TCP Wrappers-protected host & services IPTABLES (Netfilter Linux Kernel-based Firewall) Discuss IPTABLES/Netfilter Concepts Explore default tables and chains Define and test INPUT chains Define and test OUTPUT chains Create user-defined chain and evaluate results Explain IPTABLES default chains/filters and policies Examine TCP/ICMP communications pre-IPTABLES chains Implement ICMP inbound filtration based on various hosts Use Cisco PIX Firewall to verify ICMP debugging Filter traffic based on Layer-4 TCP/UDP (Source/Destination Ports) information Restrict access to various daemons (SSH/FTP/HTTP/etc.) Test connectivity locally and remotely (RedHat/Windows/etc.) Implement IP Forwarding between disparate subnets Implement Network Address Translation (NAT) Nessus Vulnerability Scanner Download and Install Nessus Vulnerability Scanner Install missing system dependencies Generate self-signed SSL certificates Perform basic Nessus system configuration and start the daemon Use Nessus Linux client to connect to Nessus Server and perform scans Examine resuls of scanning Windows 2003 Host Examine resuls of scanning Cisco PIX Firewall Appliance Secure Shell Daemon - Secure Communications Implementation Explore SSHD key configuration files Restrict access to SSHD Explore SSHD logging Configure PVPNs with local port forwarding Configure PVPNs with remote port forwarding Execute remote commands in non-interactive mode using SSH Discuss forced-commands framework Configure SUSE Enterprise to accomodate forced-commands Test forced-commands for pre-configured accounts for push/pull secure transactions Integrate SSHD with Windows 2003 Server and PuTTY SSH client Implement PKI with PuTTY SSH Use PSCP and PSFTP to communicate securely from Windows® 2003 to SUSE® Linux Snort 2.x Network Intrusion Detection System (NIDS) Obtain, and install pre-requisites (libpcap/libpcre/etc.) Obtain, compile and install the Snort® Network Intrusion Detection System (NIDS) Identify and explain key operating modes (Sniffer/Logger/NIDS) Explore in network sniffer mode Explain OSI Model and relevant sniffing options Explore Snort® in ASCII and Binary (TCPDUMP) logging modes Output logs to ASCII text format and examine the results Output logs to binary format and examine the results Implement Snort® with BPF to filter traffic Generate traffic from remote Windows 2003 and Linux hosts Use Snort with Berkeley Packet Filter (BPF) to parse logs Implement Snort in NIDS modes Explore the snort.conf file and discuss rules Explain Logging and Alerting output options Perform port-scans from remote Linux systems and analyze Alerts Configure Snort to log to SYSLOG System Requirements: Web Browser with Flash support Duration: 65 hours on 1-DVD MD5SUM: 644f839a7470fea8c68635033c644ae7 SHA1SUM: 43aae194d8fc87a604b3921ddc86b1ca88106e97 Cкaчaть Sms4file.com:Скачать одним файлом. Cкaчaть XLget.com:Скачать одним файлом. Cкaчaть TurboBit.net: Cкaчaть Fileserve.com: |
Похожие файлы на сайте для бесплатной скачки:
Здравствуйте! Вы зашли на сайт новых и бесплатных фильмов, музыки и программ hyperwarez.ru как незарегистрированный пользователь. Чтобы скачать быстро и без смс, как это сделало уже 314 пользователей нашего сайта, которые нашли для себя последние, а также самые скачиваемые файлы и только полные HD фильмы. Мы рекомендуем Вам зарегистрироваться и качать на максимальной скорости интересное кино в хорошем качестве, либо войти на сайт лучших игр hyperwarez.ru под своим именем что-бы Вы смогли оставить комментарий на новость и скачать бесплатно LinuxCBT Enterprise Linux 4 Editiоn [ ISO, HuntR, PDU ] ( 2010 ). Данный файл, оформлял для вас журналист нашего сайта: Dikeikei. Также мы ждем Ваших пожеланий, просите автора оформлять для Вас те файлы, которые Вы считаете самыми лучшими. Не забывайте про то что Вы всегда можете скачать любую программу бесплатно, а главное без смс, так-как наши журналисты закачивают для Вас информацию одним файлом на популярные файлообменники, такие как letitbit / летитбит, а так же специально для любителей скачивать одним файлом мы используем обменник vip file / вип файл, с которого можно скачать фильмы платно. Если Вы заметите мёртвую ссылку на странице, то обязательно оставьте комментарий с просьбой перезалить новость, так-как наши журналисты не успевают проверять все ссылки к файлам на работоспособность. Каждый любитель халявы найдет на нашем сайте бесплатной скачки тот файл, который он давно искал и бесплатно скачает, без регистрации, без смс например новинки фильмов.
br>
КОММЕНТАРИИ к LinuxCBT Enterprise Linux 4 Editiоn [ ISO, HuntR, PDU ] ( 2010 ) "ВКОНТАКТЕ API"
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.
Вы находитесь в категории Программы. В данной категории вы можете бесплатно и без регистрации скачать много софта, программы для дизайна, офисные, мультимедийные, 3D, системные, операционные системы.