|
6 P% K% K5 G7 L, \( [
( D8 a+ S" o2 v9 r# q4 GLinuxCBT Classic Edition 75小时全程演练Red Hat Linux 9,该视频全套分10个模块,从基础到高级,从桌面应用到服务器应用全面讲解快速有效的布置和管理RedHat 9,共10CD,ISO格式,大小2.7GB4 T2 Z( r! V4 c
文件比较大,使用FTP发布,请大家使用迅雷等能重复连接的下载工具下载,耐心连接!
- M8 ?& l3 d2 ~5 _5 o K5 ]. `Traditional training outlets do not compare because they tend to deliver canned certification courses, which means little to serious IT-professionals and savvy hiring managers. Our Linux training solution, LinuxCBT, is unparalleled in content, depth and expertise. LinuxCBT prepares you or your organization for successfully deploying and managing business-critical RedHat® Linux-based desktop and server solutions. Let LinuxCBT teach you what traditional training outlets and other CBTs do not; real RedHat® Linux skills!
/ @! V( B' v2 B4 N* L+ K! ?LinuxCBT Classic Edition includes both Client Management and Server Management Components./ l6 d; {$ v! G$ [
LinuxCBT Classic Edition - GNU/Linux Basics - Module 1
3 b; c" b" Q- h$ e5 W6 n1 ~3 ^/ w2 U下载:迅雷专用高速下载 LinuxCBT.Classic.Edition.CD1
' @3 `/ `3 h3 g2 C2 p * Introduction to the GNU/Linux operating system - Basics
7 U8 N/ \3 Z* G) B3 q# E; z% D o Discussion of the Free Software Foundation's efforts to deliver ubiquitous UNIX!! { U5 v3 H( r# P
o Emphasize the role and importance of the GNU project
. h7 h4 ]: M8 X+ g( K+ V o Identification of various Linux distributors including Debian, Mandrake, RedHat®, etc.
6 @: m. ]( H! { o Introduction to the widely-used RedHat® Linux distribution# S0 N2 }/ D0 t. H
o Explore Linux system documentation (man, info, GNOME, etc.)5 w2 E5 b/ C! F, }; P- m0 V
o Explain the Filesystem Hierarchy Standard (FHS) - UNIX is one big directory!
5 _4 u; u8 Y: q2 x( A8 J; _2 b- Y o Explore the Linux file system! l( a, ?. I9 a2 b
o Identify the various interfaces to Linux' P$ b$ I" Y h7 a4 N4 h2 U( e8 f
o Discuss the role and release rules of the Linux Kernel. u5 j$ z* K: [7 r: Q6 W4 K
o Demonstrate usage of file & directory tools (pwd, ls, cd, touch, cp, mkdir, mv, rm, which, rpm), f$ r2 t5 c3 X' K' a8 s3 ~! f
o Basic BASH shell navigation & PATH & variable manipulation (set,unset,env,export,etc.)
" H8 I2 }, c4 @. b7 \9 r+ e o Explore usage of common user-tools (cat, echo, find, locate)
6 F; b$ s$ T; o( @. P, M% } o Demonstrate typical usage of vi/vim ASCII text editors
, `( X& a4 x9 h% ~ \* i2 C o Installation & implemenation of pine mail reader and pico text editor
1 U/ [& s" e2 Y- i* U, M2 Q o Demonstrate typical usage of the king of all UNIX/Linux editors; EMACS. c' C; f- K* v" B/ n
o Explain & demonstrate standard in, standard out, redirection & pipes
8 y- S+ _. _' d. L3 {9 s o Demonstrate usage of backup/restore tools (tar, gzip, gunzip)' M: G7 b. ?9 z( C. T
o Identify basic utilities and package memberships
8 x5 u A) j5 }* Y! K0 H* X o Demonstrate usage of system monitoring tools (uptime, free, top, vmstat, meminfo, cpuinfo, ps, kill, watch), ?. k* X' _# N& y/ @
o Identify the various types of files on Linux systems
. q( p/ j1 c1 `0 x* L" `; P/ P o Identify Filesystem tools (fsck, fdisk, mkfs, parted)
2 C ~# t4 Y1 ?& W1 Y0 ]+ c2 m6 v o Mounting/unmounting basic Linux floppy, CD & ISO files
; }, s _8 U8 a o Identification of major online open source repositories (sourceforge, freshmeat, etc.)
% t! I* P# C P- P, l" JLinuxCBT Classic Edition Client Installations - Module 2
* y! N) x+ O: X- p9 J5 G' ]$ m下载:迅雷专用高速下载 LinuxCBT.Classic.Edition.CD2
" v" W7 T0 `( O: F * Perform client Installations - Disc 2" n/ v; |( K1 T; w6 T: D
o Planning the installation - identify software, hardware requirements & disk partitioning defaults7 I" F; }7 |5 s
o Demonstrate complete upgrade, ?0 L' T" v- N# [- b! b
o Demonstrate complete client installation from bootable CD) T' O, \- C) M0 N Z& K$ R. i: i
o Create network-based source-tree on a centralized server for installation1 T" m+ [4 a0 ]. Y8 O
o Prepare for network-based FTP installation - create bootable media/obtain patches/etc.9 Q+ p0 U5 ]2 Z; R% n( k- c
o Demonstrate complete client installation from FTP server
4 `4 Y: H$ [" {$ ~. N. o! { o Prepare for network-based Kickstart automated installation via Network File System (NFS)5 X1 ?6 ^ U% B! n
o Create Kickstart installation source tree8 w' g Z/ o" k0 ~7 e; a
o Perform Kickstart automated installation via NFS
+ \( ^; ~4 m# T R8 T6 L; ~/ V/ sLinuxCBT Classic Edition Desktop/Workstation Environment - Module 3# O& M; q; z# t" N1 i0 {5 E
下载:迅雷专用高速下载 LinuxCBT.Classic.Edition.CD3. M8 a( C2 B1 M$ F% u" r
* Post client installation acclimation, exploration and configuration - Disc 3
/ G' l! d1 x _$ | Y! Y& p$ k o Discuss X-Windows client/server concepts, applications & security) S0 d1 X0 |$ K f3 R2 S- U
o Learn how to configure X-Windows to support your hardware
4 k( _# ^+ W& I/ P4 W: U" |: i& A o Discussion of window managment concepts and applications
C" y, D. r- ^: ` o Customize desktop environment for GNOME & usage) P t$ t# z) g- c5 I
o Customize desktop environment for KDE & usage
* C# Q& D/ g1 q9 U o Explore the shell interface including common tools, utilities, semantics, etc.
- _7 n; }4 m: g! @, U* `" _ o Implement Mozilla web browser; \% f+ H$ g" ^9 ?( e
o Confiure the Java JRE as a plug-in for the Mozilla web browser and evaluate results- Z; O% b* D! v" F7 l0 J/ s# P# s6 s
o Implement Java Runtime Environment (JRE/J2SE) for system-wide access to Java applets/etc.
4 j, d- r, m( }7 @ o Implement Macromedia Flash plug-in and configure support in Mozilla and evaluate results
2 e, k2 ~, ~- ~5 T/ E o Download & Install Netscape web browser
/ p. n) I- v* |4 p0 c8 a o Configure Java & Flash support for Netsacpe and evaluate results" ]$ L+ l1 V" d. M# `5 Z
o Implement Ximian Evolution POP3/IMAP/Microsoft Exchange email client+ }7 w i- ^( P2 ?: E: ?
o Implement & explore RDESKTOP terminal services desktop connectivity to Windows 2003/2000/XP servers running Remote Desktop Protocol (RDP)
1 ~9 ?# i$ ?- c8 b o Demonstrate typical RDESKTOP Windows usage for productivity, multitasking and connectivity: `& h+ N, a6 g3 r n, I
o Upgrade RDESKTOP to version 1.3.1 & Remove RDESKTOP 1.2.x# e& M4 {' r7 H- l% C
o Demonstrate some of the new capabilities of RDESKTOP 1.3.x
8 \/ [) ]3 w/ g o Troubleshoot common X-Windows and client-related problems
/ f% Z/ B6 a& l' }, [ o Implement AT&T's VNC server screen emulation program for multiple remote desktop access 2 @( J2 V0 E& ^& C1 W5 ]
LinuxCBT Classic Edition Client Network Concepts and Applications - Module 4
) Q2 D+ q) P5 y下载:迅雷专用高速下载 LinuxCBT.Classic.Edition.CD4
5 ~: \1 @5 }' j( ~ * Linux client network administration essential concepts and applications - Disc 4# K8 R8 |! D* f( j3 k' Q
o User and group creation & management concepts - passwd, shadow, group, gshadow files
" [9 a$ k# v4 R4 u! O o Compile and install John The Ripper Password Cracking tool
( u& i6 L, B' d/ H1 j o Validate password integrity with John The Ripper Password Cracking Tool6 S6 x# s D, d- ?" C
o Explain UNIX/Linux file security & permissions (-rwxrwxrwx/777) rules & concepts L( p D, j+ K2 H
o Discuss and demonstrate the client/server paradigm and distributed computing concepts
7 Q% X4 U; n# ]/ u$ E o Identify & demonstrate usage of common client/server tools(SSH/HTTP/FTP/IMAP/POP3/SAMBA/etc.)
. a B+ W. ~2 C0 m o Demonstrate LFTP (Sophisticated FTP Client Software) usage
3 l; l7 O' N/ I9 o2 ?# H- ` o Use LFTP to connect to FTP & HTTP servers
8 P0 U0 h5 A! u8 N$ c1 e$ Q, e C o Use LFTP to recover broken uploaded/downloaded transmissions
- M% T/ C; |" z6 e) W o Use LFTP to mirror & reverse mirror the content of local and remote servers
9 v: U7 f' K7 @* G/ o o Linux networking primer - Identify key Linux networking components
; p+ ]* C" w) r& w+ E% g, o o Implement DHCP IP addressing with Cisco PIX Firewall DHCP Server integration
' C* C7 Y9 Q! }2 h2 Z& m o Configure Linux client for DHCP configuration from a Cisco PIX firewall
5 y3 U6 K0 X4 @ o Configure Linux client with static TCP/IP parameters for network communication! d1 M/ l0 A- n: q! z+ I; ^7 X
o Test network connectivity internally and externally via ICMP & TCP-Port querying methodologies
% B# s$ J) W; G o Explore all graphical redhat-* & redhat-config-* configuration tools( a z1 t! i+ B) g; I J4 ?
o Configure Network Time Protocol (NTP) via GUI & Shell interface to perform time synchronization8 P5 q0 m5 d1 ]7 j
o Discuss and implement Samba(SMB) connectivity to Windows 2003 Server
4 {: D& C, h; A, s" O( ] J4 [" y o Implement client printing services via Common UNIX Printing System (CUPS) to Windows 2003 Server & HP JetDirect-enabled printer.
; B; V1 q: B0 m4 { }& i o Discuss and implement NFS connectivity to Linux hosts and Windows 2003(NFS)
5 k+ J1 z2 V4 Q. A" p+ E! y2 p o Evaluate RedHat® Package Manager (RPM) to add/upgrade/remove applications
& q* D6 W( `* w& w o Discuss & demonstrate Backup & Restoration procedures) P L5 P1 [; d4 v0 g8 l
o Discuss scenarios and create Linux Rescue disk for emergency system recovery 9 u( m3 c4 i% \% v( a% X$ k2 A
LinuxCBT Classic Edition Server Installations - Discs 5
1 `: u! w( H; M! g( O5 g6 E' P下载:迅雷专用高速下载 LinuxCBT.Classic.Edition.CD51 n8 Z* b6 ?9 v
* Perform Server Installations of RedHat® Linux - Module 55 j7 k$ z; s6 `' ^' c
o Prepare for server installation - verify system BIOS parameters/support
: ` S$ E, g4 S7 P" ^8 g o Demonstrate complete server installation from bootable CD-ROM1 Y. h# W+ q4 A; T! u
o Demonstrate creation of installation source tree for network-based installations
/ J' c; Y: l) r: Z3 _, \ o Demonstrate complete server installation from an Apache HTTP Web server
' r, G& l1 i! X: W0 i g o Demonstrate complete custom server installation from HTTP Windows 2003 IIS server* `% R: q' g0 M @& g. q4 g3 f
o Demonstrate complete custom server installation from FTP server; c" g5 k0 W0 e# T# X8 r- D0 F4 u
o Demonstrate complete custom server installation from NFS server
* W0 p" D* N5 H2 ^ o Prepare for an automated Kicstart installation - identify requirements: o9 `; G0 t. s Z3 c
o Demonstrate complete server Kickstart automated installation from HTTP Apache Web server/ }4 D3 E: W* K H: C4 r+ n
o Demonstrate complete server Kickstart automated installation from FTP Apache Web server
$ s) y- k% z8 c" [ o Connect system via serial communications to Sun Fire V100 SPARC box
) z0 S/ b/ }- k+ n6 ?, k o Recap installation methods including caveats ; G; [/ |8 j* V" M% f8 f2 h5 p
LinuxCBT Classic Edition Server Management - Module 6' m; R; U) m: L" B4 S
下载:迅雷专用高速下载 LinuxCBT.Classic.Edition.CD6
0 N- g5 t9 V- t$ o. P5 I * Linux Systems Management Concepts & Applications - Disc 69 S9 b. v& O* J* e
o Explain Linux Boot process and contrast boot managers - GRUB & LILO
6 y9 p8 k: g$ }) P o Discuss the role of the init grandfather process and illustrate logical boot flow
; O. U' ]5 q+ x2 P& [- Q4 P1 z- i o Explain and demonstrate Runlevel (0 - 6) concepts & applications
3 R3 f% I4 M8 m) q3 e; |0 F o Demonstrate Daemon/Service management with (chkconfig/ntsysv/redhat-config-services)* j& e6 f1 q8 ]" B7 c$ Y! \, C
o User profile implementation logic and concepts - (Bash profile/etc/skel/aliases/PATH/etc.)1 p% c7 z. e$ N& L5 W
o Quota management - user-based, group-based and disk-based quota implementation B1 ]* Y' i( a3 z3 `
o Introduce, partition using FDISK and create an EXT3 journaling file system of 100GB of additional system storage. Identify paritions in /proc virtual file system
% f" _2 F3 j: |! t * Discuss RedHat® Package Manager (RPM) concepts, features and applications
5 S* Y4 Z. X$ Y3 F5 { o Demonstrate usage of RPM to ascertain available packages- Z: l; y+ M* v" P- z( v( F
o Demonstrate usage of RPM to import public keys of package publishers1 X' G2 Q9 L$ a7 e
o Demonstrate usage of RPM to verify the integrity of downloaded packages" U1 E- R, P! D9 D' ]
o Demonstrate usage of RPM to add new packages locally9 w* D- G& m9 c3 Y7 _2 c
o Demonstrate usage of RPM to add new packages from a Windows 2003 FTP server6 y" _! ]0 F& _7 n+ I, o5 `
o Demonstrate usage of RPM to add new packages from an HTTP server7 F+ a( v$ M4 {( x
o Demonstrate usage of RPM to upgrade packages
. j/ L) m: T3 P o Demonstrate usage of RPM to freshen packages4 q. I- {; R9 v7 c B
o Demonstrate usage of RPM to remove packages 4 T( {2 h& {8 i5 I5 p6 b
* Introduction to SYSLOG concepts2 M8 W: ^' y$ ^4 z2 o y
o Explanation of syslog facilities & levels3 V6 n3 }9 s0 T( R% r# w5 Q
o Demonstrate syslog administration
8 V# g5 V" L9 K o Demonstrate Cisco to Linux SYSLOG functionality* a2 Y) j% u/ ?: t$ {
o Discuss & demonstrate automatic log rotation and customization 5 ?2 m0 n) h4 _1 j- Y2 a
* Kernel Management
" e% d. { G- b+ p) M/ ?6 A9 M( l o Demonstrate Linux Kernel upgrade procedures3 z) |. a# X7 g7 e6 j( D6 L
o Use RPM to install multiple kernels and verify functionality
6 T' n$ V3 [; l) e2 m o Use RPM to remove outdated kernels
; S2 _( ~$ l8 ~) k- gLinuxCBT Classic Edition Network Administration - Module 7
q6 _7 m( l) K5 P- I3 a下载:迅雷专用高速下载 LinuxCBT.Classic.Edition.CD7
+ z0 U% M b) J1 o! S7 U$ ?) _ * Linux Network Administration Essentials - Module 71 e( F8 m- t6 A& M
o Discuss & demonstrate the usage of commonly used networking tools:
. ]0 F& n6 z/ b# j% d o PING - Demonstrate PING flooding of remote hosts - ICMP Attack Techniques5 ^) `# s9 R5 |7 T; C$ }
o PING - Cisco PIX Integration & Debugging of ICMP Echo Requests/Echo Replies9 x& E9 Z8 A7 j
o Traceroute - Cisco PIX Integration & provisioning of ICMP traffic types3 d1 f; L& Z6 ~/ U# o" @
o MTR (PING & Traceroute functionality) plus Cisco PIX debugging of ICMP data flow! Z6 W6 T5 s: H% U
o ARP4 e; |+ \: C; d9 |+ u# B0 |, h3 o9 e0 @
o NETSTAT/LSOF
1 P4 ]! o5 K- q( d9 L o IFCONFIG+ ]- h+ J' K' [" R& k
o Route; v' k& x2 p+ J. k }0 q" F+ r* i
o DIG & NSLOOKUP
/ \2 T9 _, C2 I& _$ d o Whois: K6 k `( J4 J+ J1 v( }; D0 Y
o Who, w, wc, last, cat, grep, vi, pico, head, tail, etc.( H& {1 {: V3 O" E" v. S
o Message of the day banners (MOTD), /etc/issue file (pre-login banner/display info.) p' R6 b. h; i* D/ g! E
* Implement Dynamic Host Configuration Protocol (DHCP) services; {; P* _% F7 I/ s4 n- B
o Explain the various steps of the DHCP process
0 t4 q! o: @+ N1 S o Configure global & scope-level DHCP options
* j$ r W5 \. L; m+ I$ ^" [ o Configure IP reservations based on layer 2 MAC addresses
$ e$ z& C' [; C& I3 f% Y o Disable Cisco PIX DHCP services# |( I7 x5 g* e! ~& v5 A
o Enable Linux DHCP services# o4 ?4 j6 w3 ~( O4 c
o Configure Windows 2003/XP/Linux clients to receive dynamic addresses from Linux 8 L, k+ F k& H% F, X- b
* Discuss Xinetd super server concepts and applications4 J( s: x+ M8 G$ ~! v
o Identify services controlled by Xinetd
6 v- d3 K& s6 a ^ o Enable & disable Xinetd-controlled services & examine results
( }; W& N( y9 l1 T+ g ?8 j: P o Implement access control on Xinetd controlled services5 @, t( g- }3 p% K/ z9 K
o Implement Xinetd IP and port-level daemon redirection
# A: {1 n% W1 F o Discuss Xinetd & TCP Wrappers relationship and dual-layer security benefits ; X6 k* l: k) j5 g
* Implement Very Secure VSFTPD File Transfer Protocol (FTP) services- W) D; S2 A* {( Q/ H( w1 C
o Implement anonymous FTPD
$ @ ]6 R: k3 D. w v! @/ d o Implement user-level FTPD access# \- o9 T& g! F; r) z
o Implement FTPD banners2 `! {- u0 g/ I; i, d: T0 E
o Disable anonymous access
% i& }6 C/ j, J# I o Configure VSFTPD to run under the auspices of Xinetd super server for increased security5 ~8 @- r4 U1 {
o Implement bandwidth rate-limiting to control bandwidth usage
( @! V/ X9 g6 K+ M * Discuss Linux & Windows Integration via Samba0 T/ q: H1 E) Q- Z: \1 E! K
o Install Samba support
& W) B& a! K3 H& l2 ] o Install Samba Web-based Administration Tool (SWAT)- G- A5 V# \0 v' o: f6 a
o Configure Samba file & print sharing, o% T! o1 t+ ~! d5 G: H* o9 U
o Evaluate access to Samba file & print server
$ e3 Q" g9 V/ S9 j o Configure Samba Windows Internet Name Server (WINS) support! _ H1 _8 N8 v
o Evaluate Windows XP/2003 client access to Samba-WINS server9 O' Y% V; t) F, i) ~3 Z2 S
* Discuss the Network File System (NFS) concepts and Linux support4 ]* N* }: \, o; p
o Implement the NFS daemon
/ g. Z& U, z. R- f o Review /etc/exports parameters and options
9 z& T) H3 i' }; u1 z5 d/ N o Evaluate access to NFS exports9 _3 F j! o5 Y
o Implement NFS connectivity across a WAN connection via IPSEC VPN-connectivity
" _% y' k8 H( M; A# u * Discuss the CRON scheduling system concepts and application
1 }6 f( I# F" g) N: X4 g8 y2 C o Identify various predefined CRON entries and schedules
- I* Y- g% w* c4 {5 @* p! h2 _ o Define custom cron jobs system-wide
* }' z$ b; ?$ f+ v o Define custom cron jobs user-wide. a5 [, C) x! m$ X3 G6 a. R
o Evaluate results of cron jobs
( a4 b( f5 Y, v3 V * Implement the Berkeley Internet Daemon (BIND) Domain Name Server (DNS)9 g5 D6 F3 M2 [! M5 p1 t( o. U
o Implement BIND 9.x
& ? q! M% t7 V o Configure BIND as a caching-only DNS server
- K% Z9 ^& G g6 |2 N4 r o Test caching-only name resolution from Windows 2003 & Linux hosts: a, I" j- t- L2 z2 g( h
o Secure access to caching-only/recursive name server via ACLs
2 Y+ M, e* O1 \5 y1 I2 J o Configure BIND as a primary DNS server
: ~8 x' d; a' N- f/ y o Test primary name resolution from Windows 2003 & Linux hosts0 } g5 v, J* ~, u, c% a: ?
o Configure BIND as a secondary(slave) DNS server
7 W* ]1 X a$ } o Restrict communications between primary & secondary DNS servers G, _: r; f8 R! {
o Implement updates between master and secondary DNS servers via IPSEC VPN
$ y0 E; ~' M; [5 z1 f+ ? o Configure DNS zones on Linux BIND & Windows 2003 DNS - activate replication/ o G U4 m/ }0 g, g2 l
o Implement poor man's load balancing using DNS round robin
0 u+ V( P9 X" e+ H o Evaluate results of BIND configuration using DIG1 v' Y, H- t9 a5 W% U1 i1 ?
o Configure DNS zones! f3 M! Y$ b- p* ~6 ?
o Configure zone transfers
7 O5 j( r- h# N0 i o Configure secure-zone transfers7 E6 h) T* n/ P( X. L8 I
o Evaluate BIND's configuration files named.conf & named.custom
1 y; \% z8 B# X0 Z. o) M7 r/ d o Configure BIND sub-domain delegation. i.e. internal.linuxcbt.net# N7 Q) g# \* I1 c7 Q
o Configure BIND to support reverse domains
" S$ t; q6 v3 z0 K6 k" _ o Configure Linux/Windows 2003 clients to use Linux BIND DNS server+ b, _! O; `8 {7 h+ b8 T+ O
o DNS Transaction Signatures (TSIG) implemenation% x, [+ R& Y4 {4 M/ V, U* O
o Identify BIND logging information for troubleshooting purposes
: z. e2 ~7 x1 O. D5 T5 X; ? o Configure BIND DNS with IP Aliasing (Sub-Interfaces) to host DNS on separate IP address $ H" S( Q8 N/ ^0 p/ N( c
* Implement Network Monitoring & Graphing tools using SNMP, etc.. _. W' m1 D: l7 \1 Z- \% C5 B
o Implement Multi Router Traffic Grapher (MRTG)6 M, x) [( D7 ]* {
o Graph Cisco Firewall with MRTG6 S. ], n _6 `
o Implement Cacti Network Graphing Tool
* j8 ]( w. {% h8 G o Download and Install Cacti and required components (RRDTool, MySqL, etc.), @5 n; I, E H( B
o Explore Cacti Interface, options, etc.: {, |7 h- F% J- e: {
o Graph Cisco, Linux & Windows 2003 resources with Cacti using SNMP & Scripts ) l! W6 N& i- I. t o
* Implement Network Time Protocol (NTP) & Time Synchronization services for local subnets, ^' i' X( B: }6 F) e
o Discuss features and distributed nature of the hierarchial NTP service3 j2 r; g& w% r2 F- O
o Ascertain and select optimal Stratum 1 NTP servers for synchronization6 j8 b0 U. T0 B0 \' q7 A* K$ Q
o Review default NTP configuration9 h1 P$ z" k A/ g
o Configure NTP to synchronize with NTP servers
' [8 \. R. @" B% ^& p3 {7 m! N o Configure internal Linux clients to syncrhonize with internal Stratum 2 NTP server% S2 o/ z$ q" b, J( z1 y; w7 i7 A
o Configure Cisco PIX firewall to synchronize with internal Stratum 2 NTP server
4 z; P3 v) h8 Y. q5 u) B o Use NTP-related tools such as NTPQ, NTPTRACE to ascertain NTP-related information
0 [: O" U, N. E: o pLinuxCBT Classic Edition Linux Apache MySQL PHP (LAMP) - Module 8
6 S8 P8 D0 T1 S下载:迅雷专用高速下载 LinuxCBT.Classic.Edition.CD8; K* ?! a3 [$ \& Z y$ J D6 a$ H
* Linux Web Services - Apache/Tomcat/CGI/WebLogic - Module 8- d% \ R: k+ z8 ?) E
o Discuss Apache Web Server's history, ubiquity (netcraft stats) and reliability1 y" P0 ]: m# b$ j0 h# f+ \
o Explain Apache Web Server's capabilities (Virtual directories, modules, WebDav, etc.)
, h( H. w( E7 G2 a( N1 Q8 A" o3 D o Implementation of Apache Web Server 2.x
K! [3 P3 {1 V6 W o Evaluate installation/implementation results of Apache Web Server 2.x
$ }- h6 b1 [# j o Demonstrate implementation of aliases & redirects via mod_alias: i; M' {# J1 N+ e; J2 _
o Restrict access to aliases and test access from Linux & Windows 2003 nodes: G& h8 F6 _4 j4 u {5 t+ f6 o: Y1 \
o Examine implications of alias & redirect access on access & error logs from multiple hosts
" N, ~8 `; p" ]3 i4 d o Demonstrate implementation of virtual directories
H8 r1 t* W/ o+ b/ y$ P o Demonstrate configuration of several virtual hosts
$ D5 L) j1 h" i" X) y o Discuss and implement Apache 2.x logging system per virtual host
$ d# P0 A; N3 X$ [9 b o Configure basic authentication to virtual hosts containers via .htaccess & Directory directives7 N* u7 M" Z! g$ u. Y$ c1 ?7 z, J
o Configure digest authentication to virtual hosts containers via Directory & .htaccess directives/ c* K$ \! o- S- m) b% A
o Configure SSL support for the virtual hosts, t8 R6 \4 U3 }' d. a
o Demonstrate SSL support without certificate provided by Certificate Authority
3 K* k* M# t; w( g2 q' b2 ]1 e o Implementation of Webalizer Log Analysis software$ o- B. c6 q3 Y' a" t
o Customization of Webalizer to automatically generate reports for multiple virtual hosts! P! d* W) ^' L2 E5 ?- b/ n3 `
o Implementation of AWSTATS Log Analysis software
6 Z/ W q5 X) Y Y o Customization of AWSTATS to automatically generate reports for multiple virtual hosts 3 ?# I( J6 c8 r; v! @: U* _* l
* Dynamic web sites - Common Gateway Interface(CGI) & scripting engine discussion & implementation
4 S' d% c$ ~( J3 Q: i Y: k o Implement CGI access to Linux via Apache & PERL scripts* G& c% }: P) Z! \. A
o Discuss benefits of PHP Dynamic Web Access Scripting Engine' p3 Q: [# N: g2 T! s+ n) x
o Implementation of PHP Dynamic Web Access Scripting Engine# I7 F1 M7 }/ s d: s4 L) W
o Evaluate PHP Dynamic Web Access Scripting Engine installation results
( z4 u, Q$ k A4 @% n o Execute sample PHP web pages on Apache Web Server 2.x
: I# m) G5 u/ \. i T * Application Servers - Java J2EE Platform integration with Linux4 X) z; }: C' y' g) F! R( i( l
o Discuss benefits of Apache Tomcat Dynamic Web Scripting(JSP)/Java Servlet Engine! a6 c9 m; q6 x" h/ {* z
o Implementation of Sun's Java Development Kit (JDK) 1.4.x for Apache Tomcat support
' e$ S/ `6 U# d5 y3 R' g4 ~- D o Implementation of Apache Tomcat Dynamic Web Scripting(JSP)/Java Servlet Engine, j5 ?; H6 r& _1 w: S
o Evaluate Apache Tomcat Dynamic Web Scripting(JSP)/Java Servlet Engine installation results
/ Z% \" D" D4 }# }$ R, n o Execute sample Apache Tomcat Dynamic Web Scripting(JSP)/Java Servlet applications
8 h4 ] m& v3 |% b' Q% }, o5 B o Discuss benefits of BEA Weblogic JSP/Servlet/Enterprise Java Beans Engine3 w' |1 P; W. Q& H) W! y
o Implementation of BEA Weblogic JSP/Servlet/Enterprise Java Beans Engine0 e4 Y* C/ L# L" R8 g3 x u
o Evaluation of BEA Weblogic JSP/Servlet/Enterprise Java Beans Engine results1 M/ f/ i2 v/ Y( f' W, |
o Execute sample applications on BEA Weblogic JSP/Servlet/Enterprise Java Beans Engine
7 p4 K$ A" r' u( s! x* s5 R o Discuss benefits of Jboss J2EE JSP/Servlet/Enterprise Java Beans Engine
: ~0 R, s" M% \& _7 C. _) Y& v o Implementation of Jboss JSP/Servlet/Enterprise Java Beans Engine; J0 s$ l7 W5 g6 [0 L
o Evaluation of Jboss JSP/Servlet/Enterprise Java Beans Engine results7 P4 C* j$ z; W1 g9 Z& o s# p+ _
o Execute sample applications on Jboss JSP/Servlet/Enterprise Java Beans Engine 7 A" V" c9 E7 m& b1 \# N: M
LinuxCBT Classic Edition Messaging Applications - Module 9
) i6 ` W% {" |% J% i下载:迅雷专用高速下载 LinuxCBT.Classic.Edition.CD9
X& U* ?( [. g X * Linux Messaging Essentials & applications - Module 9, _+ N H8 M0 ?+ I& O" | A6 f
* Discussion of messaging concepts and applications
" [2 O/ z9 Z9 _ * Sendmail MTA Essentials
9 A' G, W9 N, a$ g7 I o Introduction to Sendmail Message Transfer Agent (MTA)- U r; }9 K7 d3 V7 E3 ]
o Implementation of Sendmail
' m& s3 |: F& J6 `, M0 }1 Z5 z o Configure Sendmail to relay messages for remote hosts
6 D2 t5 \# ^4 l4 \ o/ d o Configure Sendmail to support virtual hosts/multiple domains8 @5 @" U! }: I9 R. |9 z, a
o Evaluate results of routing messages to multiple domains using Sendmail7 e( _9 x, j$ l* a0 t; M& m, h
o Sendmail logging capabilities) u& T, l0 c$ h0 \8 M( b
o Implement AWSTATS log reporting engine to generate HTML sendmail reports . l$ S: R1 R0 e/ o: u$ C
* Postfix MTA Essentials
3 r }$ |% Y' T& C o Introduction to the Postfix Message Transfer Agent (MTA)2 d+ M1 ]! y7 B- b
o Install Postfix! [! `/ V) l, J; [6 ]
o Install Mail Transfer Agent (MTA) administrative switching tools
" ? v$ Z2 o K; D o Switch system from Sendmail to Postfix as default MTA
9 `' g' J) @7 n, D o Explore Postfix configuration files and directory structure7 h* I4 c+ A; ]0 C* M C7 |9 ^. S
o Implement outbound messages via Postfix" X0 n$ g1 c7 ~( i& m# r9 Q% \
o Confirm receipt of outbound messages on publicly-accessible systems
5 R {6 C4 |6 I) {4 G o Configure Postfix to support virtual domains- M5 y0 y" \, D% ~ o0 s) k
o Build Postfix virtual user mappings for virtual domains support1 O) b9 [1 I. R# E; |* k% H$ t
o Test virtual domains via external messaging sources 2 E( L( P# J+ n1 e- a: T4 g9 s+ r) ]
* Post Office Protocol Version 3 Essentials9 |3 }$ z' @6 C, T6 c/ Y" n7 {) t
o Discuss the capabilities and limitations of POP3' B+ u* @: s/ b3 |' P
o Implement POP3 services
$ R. J R2 W8 P$ o/ X: e o Implement secure POP3 services8 o( `8 G9 K3 I4 X7 X1 o
o Demonstrate access to POP3 services from the client perspective; [4 B2 d) m* z$ z9 ^4 P3 w" `
o Implement Secure POP3 services using SSL with self-signed certificate : T# A/ l8 w: n9 e5 u
* Internet Messaging Access Protocol (IMAP)* L4 ]& V, s$ X/ s( P4 T" t7 D ?* q% l
o Discuss the capabilities and limitations of IMAP
, m7 o3 T3 t0 P: m' S$ V o Implement IMAP services m0 R1 H7 s( K( j6 ~
o Demonstrate access to IMAP services from the client perspective
: E" ^; ^6 y% y o Implement Secure IMAP services using SSL with self-signed certificate
5 | w9 v; b ~0 j* y * Web-based Mail Implementation using Squirrel-mail) {7 x$ y, e/ d% V4 @% k, L
o Describe required squirrel mail components for web-mail integration4 T Q# v5 i# p* q* q+ f1 ~
o Install squirrel mail on Internet production system' L% a4 R& `6 R, e( Q; g
o Configure squirrel mail defaults for linuxcbt.net domain# {% k& Z- C$ ?' G; r; t X
o Verify Sendmail virtual hosting configuration for linuxcbt.net domain' B; ?/ ]5 C$ u6 ]! T: y
o Verify IMAP configuration
7 j" F- i# m$ Z7 m- B5 d o Configure Apache alias for squirrel mail integration
) Q L* s! N+ z0 ^- S3 Y, o o Configure Apache Virtual Host for squirrel mail integration$ }4 @7 g; r. A8 o* |
o Configure BIND DNS services for squirrel mail integration% F+ q/ W! [- }! ]3 t# E
o Explore squirrel mail's web-based interface: _4 h3 P$ V2 R$ }
o Generate mail from various remote domains (hotmail.com, etc.) and retrieve with squirrel mail
2 v5 B/ S1 M/ W5 pLinux Concepts/Offensive/Defensive Security Implementation Techniques - Module 10
) n8 h; a: n* T; m( w! V下载:迅雷专用高速下载 LinuxCBT.Classic.Edition.CD10
. G/ R9 G3 d: f3 {% g4 v * Secure Shell (SSH) Concepts & Implementation
" _, R3 L; y, \- i2 e5 n o SSH client concepts - replacement for clear-text-based Telnet, RCP, FTP protocols.8 _" v4 \8 S a& ?# ?& V% q$ D+ q8 ^
o Identification of required OpenSSH/OpenSSL components
; Q1 K* o3 ^8 o; H o Demonstrate SSH connectivity & public key registration; x( U' p: l [9 n9 k7 b
o Implement globally-shared public keys, b& O0 L& Y6 C, C+ c7 V5 B' }. r5 e
o Generate RSA & DSA public key/private key pairs% s, H: p8 K- J3 k' t: c
o Configure SSH client and SSHD to authenticate via public/private key pairs* n, m+ t. K& J9 m* u
o Authenticate to remote hosts using public/private key pairs# d# @- j7 ?, {7 b! X- p! `+ \
o Use Secure Copy (SCP) to move files
6 A. x- J: p; X- b6 z) \/ R o Port Forwarding implementation+ J! y# u$ h, {' H& Q
o Port Forwarding integration with Linux & Windows 2003 Server
; w0 V: k: V; x8 N7 {7 u o X11 Forwarding demonstration
9 b" n8 {; N6 `! B2 A o Use Secure File Transfer Protocol (SFTP) to move files % x g; g" t, @0 `
* Linux Defensive Security Implementation Techniques/ v- D1 s D# u- K! H9 g4 {
o Implement NMAP port scanner and demostrate usage to ascertain open doors
0 d" b- f. T; J; O( E% Y o Discuss & demonstrate operating system fingerprinting techniques with NMAP( I0 q) }( [! U3 u2 ?* T2 m3 x( `+ o) p
o Demonstrate IP-spoofing & packet forging with NMAP
" I, a- `0 ?; ^* W* N9 C o Discuss the benefits of the NESSUS Security & vulnerability scanner! ^% u0 u$ a" l" Z0 a
o Implement Nessus client/server Security vulnerability scanner& E. B8 i o8 C+ w2 w+ `0 C
o Demonstrate parallel security scanning of local & remote subnets
& U' D' }2 x8 M+ c. V% u o Explore Nessus's reporting capabilities (NBE/XML/HTML/etc.)$ v& F- b1 Q( \# [
o Demonstrate Nessus class-based access for corporate usage( H7 Q: Q1 \( p7 B5 |
o Implement Ethereal network sniffer3 {, M8 ]: i2 H2 ~2 S/ G
o Demonstrate telnet clear-text password theft with Ethereal
0 s* w& C% q/ n. |. z; g o Demonstrate alternative SSH encrypted sessions with Ethereal
% A2 Z) u+ _3 ` o Demonstrate FTP clear-text password theft with Ethereal" b- M8 [- H6 ]
o Demonstrate alternative SFTP encrypted sessions with Ethereal8 k0 A. i$ m# `- [3 v& M
o Implement HPING highly customizable packet forging tool( P. b9 k4 c/ L s5 [ L
o Compare & contrast PING with HPING
; B( Y& o5 z1 V1 x! r# [& O o Demonstrate IP packet spoofing with HPING & Cisco PIX firewall integration
( j& b# z4 X, a8 s; D o Demonstrate HPING's ability to communicate with ICMP-filtered Internet servers) }- i: C6 c+ ?5 r8 x! y
o Demonstrate using HPING to setup a trojan horse backdoor for executing arbritary code
5 W0 x: L" B" ~ o Implement John the Ripper password cracking tool
+ N$ ~& s7 ^" x# T* ^$ S o Discuss file and directory security+ D p) F' o5 w) h0 G6 i
o Implement chmod,chown,umask,SUID,SGID,etc. e7 L- f9 G, f _
* Linux Defensive Security Implementation Techniques
4 F" N- j) G. N" F* ^, K" q o Implement Multi-Router Traffic Grapher (MRTG) to establish network performance baseline
- Z' S# M9 q4 m- U. _ o Configure Cisco PIX firewall for MRTG support via Simple Network Management Protocol (SNMP)$ y8 g" d3 r% g; P9 _* A( y6 N
o Configure MRTG to generate perfomance & badwidth-related graphs for Cisco PIX firewall6 \$ ]6 @- x& X h8 P5 o3 J
o Implement IP Tables Host-based firewall support
" j8 n* V. C$ t o Configure IP Tables to restrict access to necessary services" N7 w/ x: S8 Z8 s, r7 u
o Introduce, discuss & plan the implementation of Snort 2.x Intrustion Detection System (IDS)
3 \ u9 _5 f( g u% B o Discuss Snort intrustion detection concepts related to hubs & switches
# X6 Z5 u; I) U o Install Snort 2.0 Network-based Intrusion Detection System/ u# Z% U2 X. g4 g+ u
o Implement Snort 2.0 network sniffing functionality
F9 _/ } E/ I g" |+ q. D6 d/ } o Implement Snort 2.0 sniffing & packet-logging functionality% ]* J7 i# t6 H7 u# V2 \
o Demonstrate Snort's ability to monitor traffic between designated hosts
# h% d5 {7 A! s$ x* f* ] o Demonstrate password theft using Snort & FTP connections
+ s5 f" w# V8 y o Demonstrate password theft using Snort & Apache HTTP basic authentication connections
( F. I# a7 E5 a5 W: M o Implement Snort 2.0 Network-based Intrusion Detection System
5 a+ C: [; C3 x9 g* B, F4 j o Implement SnortSnarf for web-based reporting of Snort 2.0 logs8 j6 v. t# V. \5 ~$ ~) V# V
o Examine SnortSnarf reports via SSL-enabled web session
. B* O+ |& d$ p o Demonstrate how to implement port mirroring on Cisco Catalyst switches x7 x5 j' I) u0 g" C$ u- K
o Implement Network Address Translation (NAT)2 U3 P+ L4 C. E8 x6 h3 |4 S
o Discuss & Implement Port Address Translation (PAT)
! D4 I8 |# M; K( |0 o6 I9 A o Implement TCP Wrappers4 [3 R C- }7 G2 B+ p; A# j+ k
o Configure Xinetd to suppress access to the system from port-scanners3 |4 x/ Z" T9 W- O
o Discuss & Disable Portmap services
: H, t u4 e/ C1 d( H
$ j+ }$ J* _9 A" |" K2 y[ 本帖最后由 crazyboy 于 2008-9-6 10:09 编辑 ] |
|