Course Outline: Linux Professional Institute-LPI 202. Learning Method: Instructor-led Classroom Learning. Duration: 5.00 Day(s)/ 40 hrs.

Similar documents
RedHat Certified Engineer

Linux Administration

LPIC-2 Linux Engineer

LPI202 - LPIC-2 Exam Prep (Course 2) (LPI202) HL966S

"Charting the Course... RHCE Rapid Track Course. Course Summary

LPI102 EXAM PREPARATION LPIC-1 (LINUX PROFESSIONAL INSTITUTE)

SA3 E7 Advanced Linux System Administration III Internet Network Services and Security

NE-2277 Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Enterprise Linux Network Services (GL275) H7092S

"Charting the Course... Enterprise Linux Security Administration Course Summary

This course provides students with the knowledge and skills to administer Windows Server 2012.

2 SCANNING, PROBING, AND MAPPING VULNERABILITIES

Kerberos-enabled applications. Core services for UNIX shell programs and applications. Kerberos environment. Centrify DirectControl Service Library

Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus

Lecture 08: Networking services: there s no place like

MOC 20411B: Administering Windows Server Course Overview

Web Server rpm. Web Server. #rpm q apache apache sis. package apache not installed CD-ROM

Linux for UNIX Administrators

Overview. Last Lecture. This Lecture. Next Lecture. Scheduled tasks and log management. DNS and BIND Reference: DNS and BIND, 4 th Edition, O Reilly

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT

HP-UX Security I. Ideal candidate for this course Experienced system and network administrators responsible for securing and monitoring HP-UX systems

Open Source Operating Systems: Advanced Network Services Administration

How to Configure Authentication and Access Control (AAA)

Administering. Windows Server 2012 R2. Exam Wiley. Patrick Regan

Table of Contents 1 V3 & V4 Appliance Quick Start V4 Appliance Reference...3

Certified Vulnerability Assessor

User Manual. SSV Remote Access Gateway. Web ConfigTool

Preface to the First Edition Preface to the Second Edition Acknowledgments UNIX Operating System Environment p. 1 UNIX: Past and Present p.

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year!

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

1Z Oracle Linux 5 and 6 System Administration Exam Summary Syllabus Questions

PASS4TEST 専門 IT 認証試験問題集提供者

10 Defense Mechanisms

At Course Completion: Course Outline: Course 20742: Identity with Windows Server Learning Method: Instructor-led Classroom Learning

Linux for IT Managers and System Administrators Training Workshop

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Introduction p. 1 Self-Assessment p. 9 Networking Fundamentals p. 17 Introduction p. 18 Components and Terms p. 18 Topologies p. 18 LAN Technologies

NetExtender for SSL-VPN

LINUX ADMINISTRATION TYBSC-IT SEM V

IPCop Installation and Management. By: Kritsada Pinato (Bugfly)

Networking with Windows Server 2016 (741)

MOC 6419B: Configuring, Managing and Maintaining Windows Server based Servers

Barracuda Link Balancer

review of the potential methods

Barracuda Firewall Release Notes 6.6.X

GNU/Linux advanced administration

RHCE BOOT CAMP BIND. Wednesday, November 28, 12

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

MCSA Windows Server A Success Guide to Prepare- Microsoft Administering Windows Server edusum.com

Citrix NetScaler Essentials and Unified Gateway

Microsoft Server Administrator

pass4sure LPI LPIC-3 Exam 303: Security Version 1.0

Exam Objectives for MCSA Networking with Windows Server 2016

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Oracle Linux 5 & 6 System Administration

Radius, LDAP, Radius used in Authenticating Users

Server : Manage and Administer 3 1 x

Fundamentals of Network Security v1.1 Scope and Sequence

Sair 3X Linux Security, Privacy and Ethics (Level 1)

Configuring OpenVPN on pfsense

DNS & DHCP CONFIGURATION

1/7. Day 3 IT Network Systems Administration Trade 39 WSC 2011 London

The primary audience for this course includes Network Administrators, Network Engineers,

ASACAMP - ASA Lab Camp (5316)

Software Development & Education Center Security+ Certification

Definition of firewall

Certified SonicWALL Security Administrator (CSSA) Instructor-led Training

"Charting the Course... MOC A Planning, Deploying and Managing Microsoft Forefront TMG Course Summary

Contents at a Glance COPYRIGHTED MATERIAL. Introduction...1 Part I: Becoming Familiar with Enterprise Linux...7

DNS. Introduction To. everything you never wanted to know about IP directory services

70-411: Administrating Windows Server 2012

Replacing Windows Servers with Linux

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

Securing Linux Systems Before Deployment

Oracle Linux System AdministrationNEW

Computer Oriented Project

Oracle Linux 5 & 6 System Administration TOD

Advanced Network Administration. 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices

Hands-On TCP/IP Networking

R5: Configuring Windows Server 2008 R2 Network Infrastructure

Certification. The HTTP Service

Vendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10 for App and Desktop Solutions. Version: Demo

Configuring Request Authentication and Authorization

Apple 9L Mac OS X Security and Mobility Download Full Version :

MOC 6421B: Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0

Realms and Identity Policies

Application Layer: OSI and TCP/IP Models

CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

Designing and Implementing a Server 2012 Infrastructure

Setting Up Identity Management

UNIVERSITY OF MUMBAI OCTOBER 2014 LINUX ADMINISTRATION

LOMBA KETERAMPILAN SISWA

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Admin Guide ( Unix System Administration )

Designing and Implementing a Server Infrastructure

SA2 v6 Linux System Administration II Net Configuration, Software, Troubleshooting

Transcription:

Course Outline: Linux Professional Institute-LPI 202 Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: The LPI certification is a vendor-neutral Linux credential that measures critical Linux system and Network administration skills. LPI prides itself on delivering statistically valid exams and provides a quality testing experience for candidates around the globe. The LPIC Level II certification consists of two exams, LPI 201 and LPI 202.This 5-day course focuses on the LPI 202 exam and addresses the following knowledge areas Network configuration Mail and news DNS Web Services Network Client Management System Security Who Should Attend: This course is intended for individuals who are employed as a Systems Administrator, Systems Engineer and IT Manager. Outline: Module 1: Networking Configuring the network interface The Loopback interface Ethernet interfaces Routing through a gateway Virtual Private Networks What is a VPN? VPN types SSH and PPP The Server The Client IPSEC Authentication over PPP Secrets files The CHAP secrets file Troubleshooting Implementing DNS Services Module 2: DNS The options statement The directory statement The forwarders statement The forward statement The version statement The dialup statement The logging statement Predefined zone statements Converting BIND configurations The named Name Server Daemon The ndc program Signals to named

Controlling named with a Start/Stop script Zones and reverse zones The db.local file The db.127 file The hints file Zone definitions in named.conf The $TTL statement Resource records SOA record A record CNAME record NS record HINFO record _MX record MXing a domain Reverse zone files PTR record Master and slave servers. Configuring a master Configuring a slave Creating sub domains Delegating a DNS zone DNS utilities dig host nslookup Internal DNS Limiting negotiations Split DNS: stand-alone internal master Configuring the master on privdns Configuring DNS on liongate Alternatives Split DNS: two DNS servers on one machine Two name servers on one machine Configuring the internal name server Configuring the visibile name server Module 3: DNS Security DNS security strategies Making information harder to obtain Hiding the version number Limiting access Limiting queries Limiting zone transfers Controlling requests Turning of glue Mitigating the effects of an intrusion Running BIND with less privileges Running BIND in a chroot jail Preparing a chroot jail Running BIND chrooted Configuration for a chrooted BIND Combining special user and chroot Securing name server connections Using the dnskeygen command Generated key files Using the key Module 4: DHCP and NIS What is DHCP? Configuring the server Global parameters Shared-network declarations Subnet declarations Group declarations Host declaration Sample DHCP scenario Available network services Subnet independent services Subnet dependent services Building the DHCP server's configuration file The global parameters for services The company's shared networks and subnets Static hosts Static BOOTP hosts Controlling the DHCP server's behavior leases Interfaces Restarting the DHCP server after making changes DHCP relaying Configuring a system as a NIS client Setting up NIS Master and Slave servers

Configuring Master and Slave servers Creating NIS maps NIS related commands NIS related files nis.conf. nsswitch.conf. ypserv.conf Pluggable authentication modules Authentication. Authentication via /etc/passwd and /etc/shadow. account. auth. password. session. Configuring authentication via NIS. Configuring authentication via LDAP Module 5: Mail and news Majordomo Creating a mailing list Aliases. Majordomo files Maintaining a mailing list Configuring sendmail Mail aliases Procmail Recipes Internet News Installing INN Configuring INN Creating news groups Newsfeeds Module 6: LDAP Installing and configuring an LDAP Server Obtaining the software Configuring a directory hierarchy Editing the Idif file Adding data to the hierarchy Changing data in the hierarchy Additional information Module 7: Web services: Apache and Squid Installing the Apache Web Server Configuring Apache server options Modularity Run-time loading of modules (DSO) Apache extension (APXS) support tool Encrypted web servers: SSL Public key cryptography Various Apache and SSL related projects Apache-SSL. Apache with mod_ssl Monitoring Apache Load and Performance Restricting Access The access_log file Restricting Client User Access Configuring authentication. User files Group files Configuring mod_perl and mod_php. mod_perl. mod_php Virtual hosting Name-based virtual hosting IP-based virtual hosting Setting up multiple daemons Setting up a single daemon Customizing file access How to create a SSL server certificate Proxy Servers: Squid The squid.conf file Sections in the squid.conf file. http_port. cache_dir. http_access, acl. authenticate_program Redirectors Authentication Security issues Access policies Memory usage Module 8: System security Denial of Service (DoS) attacks Protecting against DoS attacks routed Sentry tools and PortSentry: preventing port scans

Securing FTP servers Installing ftpd Creating an ftp user for Anonymous FTP Welcome message for all FTP users Successful login messages Directory specific messages Preventing all FTP connections Preventing specific users from using FTP Restricting specific users to their home directories Restricting groups The Washington University FTP server creating an FTP user for anonymous FTP Welcome message for all FTP users Login message for all non-chrooted users Directory specific messages Preventing all FTP connections Preventing specific users or groups from using FTP Restricting specific users to their home directories Additional precautions TCP wrappers Configuring TCP Wrappers Testing for Open Mail relays Keeping track of security alerts Subscribing to the Bugtraq mailing list Cert Subscribing to the Cert Advisory Mailing List CIAC Subscribing to the mailing list Module 9: Security programs Kerberos Preparing the installation Kerberos realms Mapping hostnames on to Kerberos realms Ports for the KDC and administrative services Slave KDCs Hostnames for the Master and Slave KDCs Database propagation Installing and configuring the Master KDC Edit the configuration files Create the database Add administrators to the ACL file Add administrators to the Kerberos database Create a kadmind Keytab Start the Kerberos daemons on the Master KDC Install and configure the slave KDCs Create host keys for the Slave KDCs Extract host keytabs for the KDCs Setup the Slave KDCs for database propagation Back on the Master KDC Propagate the database to each Slave KDC Finish installing the Slave KDCs Create stash files on the Slave KDCs Start the krbskdc daemon on each KDC Add Kerberos principals to the database Limiting access to the KDCs Switching Master and Slave KDCs Snort rules Tripwire The Tripwire configuration file twcfg.txt Required variables Other variables The Tripwire Policy file Comments Using the n map command Module 10: Secure shell Configuring sshd

Allow or deny root logins Allow or deny non-root logins Enabling or disabling X forwarding Keys and their purpose Creating public and private user keys with ssh-keygen using the keys Configuring the ssh-agent ssh-add Enabling X-sessions Tunneling with ssh and port Mapping The.rhosts and.shosts files Module 11: IPCHAINS and IPTABLES Private network addresses IP masquerading with IPCHAINS IP forwarding with IPCHAINS Port redirection with IPCHAINS The firm's network with IPCHAINS IPTABLES Tables and chains The MANGLE table The NAT table The FILTER table Connection tracking: stateful firewalling Adding extra functionality Adding targets Adding matching modules The firm's network with IPTABLES Creating the firewall Saving and restoring firewall rules Module 12: Troubleshooting Troubleshooting network issues Cost effectiveness Getting help Troubleshooting tools netstat. hostname. dmesg. lsdev lsmod. modprobe. insmod. uname. /proc. strace. ltrace. strings. fuser. lsof