知道美河 | 上传资料 | VIP申请 | 精品课程 | 资料搜索 | 问题反馈 | 会员手册 | 积分消费 | 积分充值 | 帐号保护
美河学习学习在线赞助VIP

美河学习在线(主站) eimhe.com

 找回密码
 建立账号
查看: 16770|回复: 13

LinuxCBT Classic Edition 视频教程 全10CD完整版 iso格式

[复制链接]
发表于 2008-9-6 10:08:24 | 显示全部楼层 |阅读模式
6 P% K% K5 G7 L, \( [
1.jpg
( D8 a+ S" o2 v9 r# q4 GLinuxCBT Classic Edition 75小时全程演练Red Hat Linux 9,该视频全套分10个模块,从基础到高级,从桌面应用到服务器应用全面讲解快速有效的布置和管理RedHat 9,共10CD,ISO格式,大小2.7GB4 T2 Z( r! V4 c
文件比较大,使用FTP发布,请大家使用迅雷等能重复连接的下载工具下载,耐心连接!

- M8 ?& l3 d2 ~5 _5 o  K5 ]. `Traditional training outlets do not compare because they tend to deliver canned certification courses, which means little to serious IT-professionals and savvy hiring managers. Our Linux training solution, LinuxCBT, is unparalleled in content, depth and expertise. LinuxCBT prepares you or your organization for successfully deploying and managing business-critical RedHat® Linux-based desktop and server solutions. Let LinuxCBT teach you what traditional training outlets and other CBTs do not; real RedHat® Linux skills!
/ @! V( B' v2 B4 N* L+ K! ?LinuxCBT Classic Edition includes both Client Management and Server Management Components./ l6 d; {$ v! G$ [
LinuxCBT Classic Edition - GNU/Linux Basics - Module 1
3 b; c" b" Q- h$ e5 W6 n1 ~3 ^/ w2 U下载:迅雷专用高速下载   LinuxCBT.Classic.Edition.CD1
' @3 `/ `3 h3 g2 C2 p    * Introduction to the GNU/Linux operating system - Basics
7 U8 N/ \3 Z* G) B3 q# E; z% D          o Discussion of the Free Software Foundation's efforts to deliver ubiquitous UNIX!! {  U5 v3 H( r# P
          o Emphasize the role and importance of the GNU project
. h7 h4 ]: M8 X+ g( K+ V          o Identification of various Linux distributors including Debian, Mandrake, RedHat®, etc.
6 @: m. ]( H! {          o Introduction to the widely-used RedHat® Linux distribution# S0 N2 }/ D0 t. H
          o Explore Linux system documentation (man, info, GNOME, etc.)5 w2 E5 b/ C! F, }; P- m0 V
          o Explain the Filesystem Hierarchy Standard (FHS) - UNIX is one big directory!
5 _4 u; u8 Y: q2 x( A8 J; _2 b- Y          o Explore the Linux file system! l( a, ?. I9 a2 b
          o Identify the various interfaces to Linux' P$ b$ I" Y  h7 a4 N4 h2 U( e8 f
          o Discuss the role and release rules of the Linux Kernel. u5 j$ z* K: [7 r: Q6 W4 K
          o Demonstrate usage of file & directory tools (pwd, ls, cd, touch, cp, mkdir, mv, rm, which, rpm), f$ r2 t5 c3 X' K' a8 s3 ~! f
          o Basic BASH shell navigation & PATH & variable manipulation (set,unset,env,export,etc.)
" H8 I2 }, c4 @. b7 \9 r+ e          o Explore usage of common user-tools (cat, echo, find, locate)
6 F; b$ s$ T; o( @. P, M% }          o Demonstrate typical usage of vi/vim ASCII text editors
, `( X& a4 x9 h% ~  \* i2 C          o Installation & implemenation of pine mail reader and pico text editor
1 U/ [& s" e2 Y- i* U, M2 Q          o Demonstrate typical usage of the king of all UNIX/Linux editors; EMACS. c' C; f- K* v" B/ n
          o Explain & demonstrate standard in, standard out, redirection & pipes
8 y- S+ _. _' d. L3 {9 s          o Demonstrate usage of backup/restore tools (tar, gzip, gunzip)' M: G7 b. ?9 z( C. T
          o Identify basic utilities and package memberships
8 x5 u  A) j5 }* Y! K0 H* X          o Demonstrate usage of system monitoring tools (uptime, free, top, vmstat, meminfo, cpuinfo, ps, kill, watch), ?. k* X' _# N& y/ @
          o Identify the various types of files on Linux systems
. q( p/ j1 c1 `0 x* L" `; P/ P          o Identify Filesystem tools (fsck, fdisk, mkfs, parted)
2 C  ~# t4 Y1 ?& W1 Y0 ]+ c2 m6 v          o Mounting/unmounting basic Linux floppy, CD & ISO files
; }, s  _8 U8 a          o Identification of major online open source repositories (sourceforge, freshmeat, etc.)
% t! I* P# C  P- P, l" JLinuxCBT Classic Edition Client Installations - Module 2
* y! N) x+ O: X- p9 J5 G' ]$ m下载:迅雷专用高速下载   LinuxCBT.Classic.Edition.CD2
" v" W7 T0 `( O: F    * Perform client Installations - Disc 2" n/ v; |( K1 T; w6 T: D
          o Planning the installation - identify software, hardware requirements & disk partitioning defaults7 I" F; }7 |5 s
          o Demonstrate complete upgrade, ?0 L' T" v- N# [- b! b
          o Demonstrate complete client installation from bootable CD) T' O, \- C) M0 N  Z& K$ R. i: i
          o Create network-based source-tree on a centralized server for installation1 T" m+ [4 a0 ]. Y8 O
          o Prepare for network-based FTP installation - create bootable media/obtain patches/etc.9 Q+ p0 U5 ]2 Z; R% n( k- c
          o Demonstrate complete client installation from FTP server
4 `4 Y: H$ [" {$ ~. N. o! {          o Prepare for network-based Kickstart automated installation via Network File System (NFS)5 X1 ?6 ^  U% B! n
          o Create Kickstart installation source tree8 w' g  Z/ o" k0 ~7 e; a
          o Perform Kickstart automated installation via NFS
+ \( ^; ~4 m# T  R8 T6 L; ~/ V/ sLinuxCBT Classic Edition Desktop/Workstation Environment - Module 3# O& M; q; z# t" N1 i0 {5 E
下载:迅雷专用高速下载   LinuxCBT.Classic.Edition.CD3. M8 a( C2 B1 M$ F% u" r
    * Post client installation acclimation, exploration and configuration - Disc 3
/ G' l! d1 x  _$ |  Y! Y& p$ k          o Discuss X-Windows client/server concepts, applications & security) S0 d1 X0 |$ K  f3 R2 S- U
          o Learn how to configure X-Windows to support your hardware
4 k( _# ^+ W& I/ P4 W: U" |: i& A          o Discussion of window managment concepts and applications
  C" y, D. r- ^: `          o Customize desktop environment for GNOME & usage) P  t$ t# z) g- c5 I
          o Customize desktop environment for KDE & usage
* C# Q& D/ g1 q9 U          o Explore the shell interface including common tools, utilities, semantics, etc.
- _7 n; }4 m: g! @, U* `" _          o Implement Mozilla web browser; \% f+ H$ g" ^9 ?( e
          o Confiure the Java JRE as a plug-in for the Mozilla web browser and evaluate results- Z; O% b* D! v" F7 l0 J/ s# P# s6 s
          o Implement Java Runtime Environment (JRE/J2SE) for system-wide access to Java applets/etc.
4 j, d- r, m( }7 @          o Implement Macromedia Flash plug-in and configure support in Mozilla and evaluate results
2 e, k2 ~, ~- ~5 T/ E          o Download & Install Netscape web browser
/ p. n) I- v* |4 p0 c8 a          o Configure Java & Flash support for Netsacpe and evaluate results" ]$ L+ l1 V" d. M# `5 Z
          o Implement Ximian Evolution POP3/IMAP/Microsoft Exchange email client+ }7 w  i- ^( P2 ?: E: ?
          o Implement & explore RDESKTOP terminal services desktop connectivity to Windows 2003/2000/XP servers running Remote Desktop Protocol (RDP)
1 ~9 ?# i$ ?- c8 b          o Demonstrate typical RDESKTOP Windows usage for productivity, multitasking and connectivity: `& h+ N, a6 g3 r  n, I
          o Upgrade RDESKTOP to version 1.3.1 & Remove RDESKTOP 1.2.x# e& M4 {' r7 H- l% C
          o Demonstrate some of the new capabilities of RDESKTOP 1.3.x
8 \/ [) ]3 w/ g          o Troubleshoot common X-Windows and client-related problems
/ f% Z/ B6 a& l' }, [          o Implement AT&T's VNC server screen emulation program for multiple remote desktop access 2 @( J2 V0 E& ^& C1 W5 ]
LinuxCBT Classic Edition Client Network Concepts and Applications - Module 4
) Q2 D+ q) P5 y下载:迅雷专用高速下载   LinuxCBT.Classic.Edition.CD4
5 ~: \1 @5 }' j( ~    * Linux client network administration essential concepts and applications - Disc 4# K8 R8 |! D* f( j3 k' Q
          o User and group creation & management concepts - passwd, shadow, group, gshadow files
" [9 a$ k# v4 R4 u! O          o Compile and install John The Ripper Password Cracking tool
( u& i6 L, B' d/ H1 j          o Validate password integrity with John The Ripper Password Cracking Tool6 S6 x# s  D, d- ?" C
          o Explain UNIX/Linux file security & permissions (-rwxrwxrwx/777) rules & concepts  L( p  D, j+ K2 H
          o Discuss and demonstrate the client/server paradigm and distributed computing concepts
7 Q% X4 U; n# ]/ u$ E          o Identify & demonstrate usage of common client/server tools(SSH/HTTP/FTP/IMAP/POP3/SAMBA/etc.)
. a  B+ W. ~2 C0 m          o Demonstrate LFTP (Sophisticated FTP Client Software) usage
3 l; l7 O' N/ I9 o2 ?# H- `          o Use LFTP to connect to FTP & HTTP servers
8 P0 U0 h5 A! u8 N$ c1 e$ Q, e  C          o Use LFTP to recover broken uploaded/downloaded transmissions
- M% T/ C; |" z6 e) W          o Use LFTP to mirror & reverse mirror the content of local and remote servers
9 v: U7 f' K7 @* G/ o          o Linux networking primer - Identify key Linux networking components
; p+ ]* C" w) r& w+ E% g, o          o Implement DHCP IP addressing with Cisco PIX Firewall DHCP Server integration
' C* C7 Y9 Q! }2 h2 Z& m          o Configure Linux client for DHCP configuration from a Cisco PIX firewall
5 y3 U6 K0 X4 @          o Configure Linux client with static TCP/IP parameters for network communication! d1 M/ l0 A- n: q! z+ I; ^7 X
          o Test network connectivity internally and externally via ICMP & TCP-Port querying methodologies
% B# s$ J) W; G          o Explore all graphical redhat-* & redhat-config-* configuration tools( a  z1 t! i+ B) g; I  J4 ?
          o Configure Network Time Protocol (NTP) via GUI & Shell interface to perform time synchronization8 P5 q0 m5 d1 ]7 j
          o Discuss and implement Samba(SMB) connectivity to Windows 2003 Server
4 {: D& C, h; A, s" O( ]  J4 [" y          o Implement client printing services via Common UNIX Printing System (CUPS) to Windows 2003 Server & HP JetDirect-enabled printer.
; B; V1 q: B0 m4 {  }& i          o Discuss and implement NFS connectivity to Linux hosts and Windows 2003(NFS)
5 k+ J1 z2 V4 Q. A" p+ E! y2 p          o Evaluate RedHat® Package Manager (RPM) to add/upgrade/remove applications
& q* D6 W( `* w& w          o Discuss & demonstrate Backup & Restoration procedures) P  L5 P1 [; d4 v0 g8 l
          o Discuss scenarios and create Linux Rescue disk for emergency system recovery 9 u( m3 c4 i% \% v( a% X$ k2 A
LinuxCBT Classic Edition Server Installations - Discs 5
1 `: u! w( H; M! g( O5 g6 E' P下载:迅雷专用高速下载   LinuxCBT.Classic.Edition.CD51 n8 Z* b6 ?9 v
    * Perform Server Installations of RedHat® Linux - Module 55 j7 k$ z; s6 `' ^' c
          o Prepare for server installation - verify system BIOS parameters/support
: `  S$ E, g4 S7 P" ^8 g          o Demonstrate complete server installation from bootable CD-ROM1 Y. h# W+ q4 A; T! u
          o Demonstrate creation of installation source tree for network-based installations
/ J' c; Y: l) r: Z3 _, \          o Demonstrate complete server installation from an Apache HTTP Web server
' r, G& l1 i! X: W0 i  g          o Demonstrate complete custom server installation from HTTP Windows 2003 IIS server* `% R: q' g0 M  @& g. q4 g3 f
          o Demonstrate complete custom server installation from FTP server; c" g5 k0 W0 e# T# X8 r- D0 F4 u
          o Demonstrate complete custom server installation from NFS server
* W0 p" D* N5 H2 ^          o Prepare for an automated Kicstart installation - identify requirements: o9 `; G0 t. s  Z3 c
          o Demonstrate complete server Kickstart automated installation from HTTP Apache Web server/ }4 D3 E: W* K  H: C4 r+ n
          o Demonstrate complete server Kickstart automated installation from FTP Apache Web server
$ s) y- k% z8 c" [          o Connect system via serial communications to Sun Fire V100 SPARC box
) z0 S/ b/ }- k+ n6 ?, k          o Recap installation methods including caveats ; G; [/ |8 j* V" M% f8 f2 h5 p
LinuxCBT Classic Edition Server Management - Module 6' m; R; U) m: L" B4 S
下载:迅雷专用高速下载   LinuxCBT.Classic.Edition.CD6
0 N- g5 t9 V- t$ o. P5 I    * Linux Systems Management Concepts & Applications - Disc 69 S9 b. v& O* J* e
          o Explain Linux Boot process and contrast boot managers - GRUB & LILO
6 y9 p8 k: g$ }) P          o Discuss the role of the init grandfather process and illustrate logical boot flow
; O. U' ]5 q+ x2 P& [- Q4 P1 z- i          o Explain and demonstrate Runlevel (0 - 6) concepts & applications
3 R3 f% I4 M8 m) q3 e; |0 F          o Demonstrate Daemon/Service management with (chkconfig/ntsysv/redhat-config-services)* j& e6 f1 q8 ]" B7 c$ Y! \, C
          o User profile implementation logic and concepts - (Bash profile/etc/skel/aliases/PATH/etc.)1 p% c7 z. e$ N& L5 W
          o Quota management - user-based, group-based and disk-based quota implementation  B1 ]* Y' i( a3 z3 `
          o Introduce, partition using FDISK and create an EXT3 journaling file system of 100GB of additional system storage. Identify paritions in /proc virtual file system
% f" _2 F3 j: |! t    * Discuss RedHat® Package Manager (RPM) concepts, features and applications
5 S* Y4 Z. X$ Y3 F5 {          o Demonstrate usage of RPM to ascertain available packages- Z: l; y+ M* v" P- z( v( F
          o Demonstrate usage of RPM to import public keys of package publishers1 X' G2 Q9 L$ a7 e
          o Demonstrate usage of RPM to verify the integrity of downloaded packages" U1 E- R, P! D9 D' ]
          o Demonstrate usage of RPM to add new packages locally9 w* D- G& m9 c3 Y7 _2 c
          o Demonstrate usage of RPM to add new packages from a Windows 2003 FTP server6 y" _! ]0 F& _7 n+ I, o5 `
          o Demonstrate usage of RPM to add new packages from an HTTP server7 F+ a( v$ M4 {( x
          o Demonstrate usage of RPM to upgrade packages
. j/ L) m: T3 P          o Demonstrate usage of RPM to freshen packages4 q. I- {; R9 v7 c  B
          o Demonstrate usage of RPM to remove packages 4 T( {2 h& {8 i5 I5 p6 b
    * Introduction to SYSLOG concepts2 M8 W: ^' y$ ^4 z2 o  y
          o Explanation of syslog facilities & levels3 V6 n3 }9 s0 T( R% r# w5 Q
          o Demonstrate syslog administration
8 V# g5 V" L9 K          o Demonstrate Cisco to Linux SYSLOG functionality* a2 Y) j% u/ ?: t$ {
          o Discuss & demonstrate automatic log rotation and customization 5 ?2 m0 n) h4 _1 j- Y2 a
    * Kernel Management
" e% d. {  G- b+ p) M/ ?6 A9 M( l          o Demonstrate Linux Kernel upgrade procedures3 z) |. a# X7 g7 e6 j( D6 L
          o Use RPM to install multiple kernels and verify functionality
6 T' n$ V3 [; l) e2 m          o Use RPM to remove outdated kernels
; S2 _( ~$ l8 ~) k- gLinuxCBT Classic Edition Network Administration - Module 7
  q6 _7 m( l) K5 P- I3 a下载:迅雷专用高速下载   LinuxCBT.Classic.Edition.CD7
+ z0 U% M  b) J1 o! S7 U$ ?) _    * Linux Network Administration Essentials - Module 71 e( F8 m- t6 A& M
          o Discuss & demonstrate the usage of commonly used networking tools:
. ]0 F& n6 z/ b# j% d          o PING - Demonstrate PING flooding of remote hosts - ICMP Attack Techniques5 ^) `# s9 R5 |7 T; C$ }
          o PING - Cisco PIX Integration & Debugging of ICMP Echo Requests/Echo Replies9 x& E9 Z8 A7 j
          o Traceroute - Cisco PIX Integration & provisioning of ICMP traffic types3 d1 f; L& Z6 ~/ U# o" @
          o MTR (PING & Traceroute functionality) plus Cisco PIX debugging of ICMP data flow! Z6 W6 T5 s: H% U
          o ARP4 e; |+ \: C; d9 |+ u# B0 |, h3 o9 e0 @
          o NETSTAT/LSOF
1 P4 ]! o5 K- q( d9 L          o IFCONFIG+ ]- h+ J' K' [" R& k
          o Route; v' k& x2 p+ J. k  }0 q" F+ r* i
          o DIG & NSLOOKUP
/ \2 T9 _, C2 I& _$ d          o Whois: K6 k  `( J4 J+ J1 v( }; D0 Y
          o Who, w, wc, last, cat, grep, vi, pico, head, tail, etc.( H& {1 {: V3 O" E" v. S
          o Message of the day banners (MOTD), /etc/issue file (pre-login banner/display info.)   p' R6 b. h; i* D/ g! E
    * Implement Dynamic Host Configuration Protocol (DHCP) services; {; P* _% F7 I/ s4 n- B
          o Explain the various steps of the DHCP process
0 t4 q! o: @+ N1 S          o Configure global & scope-level DHCP options
* j$ r  W5 \. L; m+ I$ ^" [          o Configure IP reservations based on layer 2 MAC addresses
$ e$ z& C' [; C& I3 f% Y          o Disable Cisco PIX DHCP services# |( I7 x5 g* e! ~& v5 A
          o Enable Linux DHCP services# o4 ?4 j6 w3 ~( O4 c
          o Configure Windows 2003/XP/Linux clients to receive dynamic addresses from Linux 8 L, k+ F  k& H% F, X- b
    * Discuss Xinetd super server concepts and applications4 J( s: x+ M8 G$ ~! v
          o Identify services controlled by Xinetd
6 v- d3 K& s6 a  ^          o Enable & disable Xinetd-controlled services & examine results
( }; W& N( y9 l1 T+ g  ?8 j: P          o Implement access control on Xinetd controlled services5 @, t( g- }3 p% K/ z9 K
          o Implement Xinetd IP and port-level daemon redirection
# A: {1 n% W1 F          o Discuss Xinetd & TCP Wrappers relationship and dual-layer security benefits ; X6 k* l: k) j5 g
    * Implement Very Secure VSFTPD File Transfer Protocol (FTP) services- W) D; S2 A* {( Q/ H( w1 C
          o Implement anonymous FTPD
$ @  ]6 R: k3 D. w  v! @/ d          o Implement user-level FTPD access# \- o9 T& g! F; r) z
          o Implement FTPD banners2 `! {- u0 g/ I; i, d: T0 E
          o Disable anonymous access
% i& }6 C/ j, J# I          o Configure VSFTPD to run under the auspices of Xinetd super server for increased security5 ~8 @- r4 U1 {
          o Implement bandwidth rate-limiting to control bandwidth usage
( @! V/ X9 g6 K+ M    * Discuss Linux & Windows Integration via Samba0 T/ q: H1 E) Q- Z: \1 E! K
          o Install Samba support
& W) B& a! K3 H& l2 ]          o Install Samba Web-based Administration Tool (SWAT)- G- A5 V# \0 v' o: f6 a
          o Configure Samba file & print sharing, o% T! o1 t+ ~! d5 G: H* o9 U
          o Evaluate access to Samba file & print server
$ e3 Q" g9 V/ S9 j          o Configure Samba Windows Internet Name Server (WINS) support! _  H1 _8 N8 v
          o Evaluate Windows XP/2003 client access to Samba-WINS server9 O' Y% V; t) F, i) ~3 Z2 S
    * Discuss the Network File System (NFS) concepts and Linux support4 ]* N* }: \, o; p
          o Implement the NFS daemon
/ g. Z& U, z. R- f          o Review /etc/exports parameters and options
9 z& T) H3 i' }; u1 z5 d/ N          o Evaluate access to NFS exports9 _3 F  j! o5 Y
          o Implement NFS connectivity across a WAN connection via IPSEC VPN-connectivity
" _% y' k8 H( M; A# u    * Discuss the CRON scheduling system concepts and application
1 }6 f( I# F" g) N: X4 g8 y2 C          o Identify various predefined CRON entries and schedules
- I* Y- g% w* c4 {5 @* p! h2 _          o Define custom cron jobs system-wide
* }' z$ b; ?$ f+ v          o Define custom cron jobs user-wide. a5 [, C) x! m$ X3 G6 a. R
          o Evaluate results of cron jobs
( a4 b( f5 Y, v3 V    * Implement the Berkeley Internet Daemon (BIND) Domain Name Server (DNS)9 g5 D6 F3 M2 [! M5 p1 t( o. U
          o Implement BIND 9.x
& ?  q! M% t7 V          o Configure BIND as a caching-only DNS server
- K% Z9 ^& G  g6 |2 N4 r          o Test caching-only name resolution from Windows 2003 & Linux hosts: a, I" j- t- L2 z2 g( h
          o Secure access to caching-only/recursive name server via ACLs
2 Y+ M, e* O1 \5 y1 I2 J          o Configure BIND as a primary DNS server
: ~8 x' d; a' N- f/ y          o Test primary name resolution from Windows 2003 & Linux hosts0 }  g5 v, J* ~, u, c% a: ?
          o Configure BIND as a secondary(slave) DNS server
7 W* ]1 X  a$ }          o Restrict communications between primary & secondary DNS servers  G, _: r; f8 R! {
          o Implement updates between master and secondary DNS servers via IPSEC VPN
$ y0 E; ~' M; [5 z1 f+ ?          o Configure DNS zones on Linux BIND & Windows 2003 DNS - activate replication/ o  G  U4 m/ }0 g, g2 l
          o Implement poor man's load balancing using DNS round robin
0 u+ V( P9 X" e+ H          o Evaluate results of BIND configuration using DIG1 v' Y, H- t9 a5 W% U1 i1 ?
          o Configure DNS zones! f3 M! Y$ b- p* ~6 ?
          o Configure zone transfers
7 O5 j( r- h# N0 i          o Configure secure-zone transfers7 E6 h) T* n/ P( X. L8 I
          o Evaluate BIND's configuration files named.conf & named.custom
1 y; \% z8 B# X0 Z. o) M7 r/ d          o Configure BIND sub-domain delegation. i.e. internal.linuxcbt.net# N7 Q) g# \* I1 c7 Q
          o Configure BIND to support reverse domains
" S$ t; q6 v3 z0 K6 k" _          o Configure Linux/Windows 2003 clients to use Linux BIND DNS server+ b, _! O; `8 {7 h+ b8 T+ O
          o DNS Transaction Signatures (TSIG) implemenation% x, [+ R& Y4 {4 M/ V, U* O
          o Identify BIND logging information for troubleshooting purposes
: z. e2 ~7 x1 O. D5 T5 X; ?          o Configure BIND DNS with IP Aliasing (Sub-Interfaces) to host DNS on separate IP address $ H" S( Q8 N/ ^0 p/ N( c
    * Implement Network Monitoring & Graphing tools using SNMP, etc.. _. W' m1 D: l7 \1 Z- \% C5 B
          o Implement Multi Router Traffic Grapher (MRTG)6 M, x) [( D7 ]* {
          o Graph Cisco Firewall with MRTG6 S. ], n  _6 `
          o Implement Cacti Network Graphing Tool
* j8 ]( w. {% h8 G          o Download and Install Cacti and required components (RRDTool, MySqL, etc.), @5 n; I, E  H( B
          o Explore Cacti Interface, options, etc.: {, |7 h- F% J- e: {
          o Graph Cisco, Linux & Windows 2003 resources with Cacti using SNMP & Scripts ) l! W6 N& i- I. t  o
    * Implement Network Time Protocol (NTP) & Time Synchronization services for local subnets, ^' i' X( B: }6 F) e
          o Discuss features and distributed nature of the hierarchial NTP service3 j2 r; g& w% r2 F- O
          o Ascertain and select optimal Stratum 1 NTP servers for synchronization6 j8 b0 U. T0 B0 \' q7 A* K$ Q
          o Review default NTP configuration9 h1 P$ z" k  A/ g
          o Configure NTP to synchronize with NTP servers
' [8 \. R. @" B% ^& p3 {7 m! N          o Configure internal Linux clients to syncrhonize with internal Stratum 2 NTP server% S2 o/ z$ q" b, J( z1 y; w7 i7 A
          o Configure Cisco PIX firewall to synchronize with internal Stratum 2 NTP server
4 z; P3 v) h8 Y. q5 u) B          o Use NTP-related tools such as NTPQ, NTPTRACE to ascertain NTP-related information
0 [: O" U, N. E: o  pLinuxCBT Classic Edition Linux Apache MySQL PHP (LAMP) - Module 8
6 S8 P8 D0 T1 S下载:迅雷专用高速下载   LinuxCBT.Classic.Edition.CD8; K* ?! a3 [$ \& Z  y$ J  D6 a$ H
    * Linux Web Services - Apache/Tomcat/CGI/WebLogic - Module 8- d% \  R: k+ z8 ?) E
          o Discuss Apache Web Server's history, ubiquity (netcraft stats) and reliability1 y" P0 ]: m# b$ j0 h# f+ \
          o Explain Apache Web Server's capabilities (Virtual directories, modules, WebDav, etc.)
, h( H. w( E7 G2 a( N1 Q8 A" o3 D          o Implementation of Apache Web Server 2.x
  K! [3 P3 {1 V6 W          o Evaluate installation/implementation results of Apache Web Server 2.x
$ }- h6 b1 [# j          o Demonstrate implementation of aliases & redirects via mod_alias: i; M' {# J1 N+ e; J2 _
          o Restrict access to aliases and test access from Linux & Windows 2003 nodes: G& h8 F6 _4 j4 u  {5 t+ f6 o: Y1 \
          o Examine implications of alias & redirect access on access & error logs from multiple hosts
" N, ~8 `; p" ]3 i4 d          o Demonstrate implementation of virtual directories
  H8 r1 t* W/ o+ b/ y$ P          o Demonstrate configuration of several virtual hosts
$ D5 L) j1 h" i" X) y          o Discuss and implement Apache 2.x logging system per virtual host
$ d# P0 A; N3 X$ [9 b          o Configure basic authentication to virtual hosts containers via .htaccess & Directory directives7 N* u7 M" Z! g$ u. Y$ c1 ?7 z, J
          o Configure digest authentication to virtual hosts containers via Directory & .htaccess directives/ c* K$ \! o- S- m) b% A
          o Configure SSL support for the virtual hosts, t8 R6 \4 U3 }' d. a
          o Demonstrate SSL support without certificate provided by Certificate Authority
3 K* k* M# t; w( g2 q' b2 ]1 e          o Implementation of Webalizer Log Analysis software$ o- B. c6 q3 Y' a" t
          o Customization of Webalizer to automatically generate reports for multiple virtual hosts! P! d* W) ^' L2 E5 ?- b/ n3 `
          o Implementation of AWSTATS Log Analysis software
6 Z/ W  q5 X) Y  Y          o Customization of AWSTATS to automatically generate reports for multiple virtual hosts 3 ?# I( J6 c8 r; v! @: U* _* l
    * Dynamic web sites - Common Gateway Interface(CGI) & scripting engine discussion & implementation
4 S' d% c$ ~( J3 Q: i  Y: k          o Implement CGI access to Linux via Apache & PERL scripts* G& c% }: P) Z! \. A
          o Discuss benefits of PHP Dynamic Web Access Scripting Engine' p3 Q: [# N: g2 T! s+ n) x
          o Implementation of PHP Dynamic Web Access Scripting Engine# I7 F1 M7 }/ s  d: s4 L) W
          o Evaluate PHP Dynamic Web Access Scripting Engine installation results
( z4 u, Q$ k  A4 @% n          o Execute sample PHP web pages on Apache Web Server 2.x
: I# m) G5 u/ \. i  T    * Application Servers - Java J2EE Platform integration with Linux4 X) z; }: C' y' g) F! R( i( l
          o Discuss benefits of Apache Tomcat Dynamic Web Scripting(JSP)/Java Servlet Engine! a6 c9 m; q6 x" h/ {* z
          o Implementation of Sun's Java Development Kit (JDK) 1.4.x for Apache Tomcat support
' e$ S/ `6 U# d5 y3 R' g4 ~- D          o Implementation of Apache Tomcat Dynamic Web Scripting(JSP)/Java Servlet Engine, j5 ?; H6 r& _1 w: S
          o Evaluate Apache Tomcat Dynamic Web Scripting(JSP)/Java Servlet Engine installation results
/ Z% \" D" D4 }# }$ R, n          o Execute sample Apache Tomcat Dynamic Web Scripting(JSP)/Java Servlet applications
8 h4 ]  m& v3 |% b' Q% }, o5 B          o Discuss benefits of BEA Weblogic JSP/Servlet/Enterprise Java Beans Engine3 w' |1 P; W. Q& H) W! y
          o Implementation of BEA Weblogic JSP/Servlet/Enterprise Java Beans Engine0 e4 Y* C/ L# L" R8 g3 x  u
          o Evaluation of BEA Weblogic JSP/Servlet/Enterprise Java Beans Engine results1 M/ f/ i2 v/ Y( f' W, |
          o Execute sample applications on BEA Weblogic JSP/Servlet/Enterprise Java Beans Engine
7 p4 K$ A" r' u( s! x* s5 R          o Discuss benefits of Jboss J2EE JSP/Servlet/Enterprise Java Beans Engine
: ~0 R, s" M% \& _7 C. _) Y& v          o Implementation of Jboss JSP/Servlet/Enterprise Java Beans Engine; J0 s$ l7 W5 g6 [0 L
          o Evaluation of Jboss JSP/Servlet/Enterprise Java Beans Engine results7 P4 C* j$ z; W1 g9 Z& o  s# p+ _
          o Execute sample applications on Jboss JSP/Servlet/Enterprise Java Beans Engine 7 A" V" c9 E7 m& b1 \# N: M
LinuxCBT Classic Edition Messaging Applications - Module 9
) i6 `  W% {" |% J% i下载:迅雷专用高速下载   LinuxCBT.Classic.Edition.CD9
  X& U* ?( [. g  X    * Linux Messaging Essentials & applications - Module 9, _+ N  H8 M0 ?+ I& O" |  A6 f
    * Discussion of messaging concepts and applications
" [2 O/ z9 Z9 _    * Sendmail MTA Essentials
9 A' G, W9 N, a$ g7 I          o Introduction to Sendmail Message Transfer Agent (MTA)- U  r; }9 K7 d3 V7 E3 ]
          o Implementation of Sendmail
' m& s3 |: F& J6 `, M0 }1 Z5 z          o Configure Sendmail to relay messages for remote hosts
6 D2 t5 \# ^4 l4 \  o/ d          o Configure Sendmail to support virtual hosts/multiple domains8 @5 @" U! }: I9 R. |9 z, a
          o Evaluate results of routing messages to multiple domains using Sendmail7 e( _9 x, j$ l* a0 t; M& m, h
          o Sendmail logging capabilities) u& T, l0 c$ h0 \8 M( b
          o Implement AWSTATS log reporting engine to generate HTML sendmail reports . l$ S: R1 R0 e/ o: u$ C
    * Postfix MTA Essentials
3 r  }$ |% Y' T& C          o Introduction to the Postfix Message Transfer Agent (MTA)2 d+ M1 ]! y7 B- b
          o Install Postfix! [! `/ V) l, J; [6 ]
          o Install Mail Transfer Agent (MTA) administrative switching tools
" ?  v$ Z2 o  K; D          o Switch system from Sendmail to Postfix as default MTA
9 `' g' J) @7 n, D          o Explore Postfix configuration files and directory structure7 h* I4 c+ A; ]0 C* M  C7 |9 ^. S
          o Implement outbound messages via Postfix" X0 n$ g1 c7 ~( i& m# r9 Q% \
          o Confirm receipt of outbound messages on publicly-accessible systems
5 R  {6 C4 |6 I) {4 G          o Configure Postfix to support virtual domains- M5 y0 y" \, D% ~  o0 s) k
          o Build Postfix virtual user mappings for virtual domains support1 O) b9 [1 I. R# E; |* k% H$ t
          o Test virtual domains via external messaging sources 2 E( L( P# J+ n1 e- a: T4 g9 s+ r) ]
    * Post Office Protocol Version 3 Essentials9 |3 }$ z' @6 C, T6 c/ Y" n7 {) t
          o Discuss the capabilities and limitations of POP3' B+ u* @: s/ b3 |' P
          o Implement POP3 services
$ R. J  R2 W8 P$ o/ X: e          o Implement secure POP3 services8 o( `8 G9 K3 I4 X7 X1 o
          o Demonstrate access to POP3 services from the client perspective; [4 B2 d) m* z$ z9 ^4 P3 w" `
          o Implement Secure POP3 services using SSL with self-signed certificate : T# A/ l8 w: n9 e5 u
    * Internet Messaging Access Protocol (IMAP)* L4 ]& V, s$ X/ s( P4 T" t7 D  ?* q% l
          o Discuss the capabilities and limitations of IMAP
, m7 o3 T3 t0 P: m' S$ V          o Implement IMAP services  m0 R1 H7 s( K( j6 ~
          o Demonstrate access to IMAP services from the client perspective
: E" ^; ^6 y% y          o Implement Secure IMAP services using SSL with self-signed certificate
5 |  w9 v; b  ~0 j* y    * Web-based Mail Implementation using Squirrel-mail) {7 x$ y, e/ d% V4 @% k, L
          o Describe required squirrel mail components for web-mail integration4 T  Q# v5 i# p* q* q+ f1 ~
          o Install squirrel mail on Internet production system' L% a4 R& `6 R, e( Q; g
          o Configure squirrel mail defaults for linuxcbt.net domain# {% k& Z- C$ ?' G; r; t  X
          o Verify Sendmail virtual hosting configuration for linuxcbt.net domain' B; ?/ ]5 C$ u6 ]! T: y
          o Verify IMAP configuration
7 j" F- i# m$ Z7 m- B5 d          o Configure Apache alias for squirrel mail integration
) Q  L* s! N+ z0 ^- S3 Y, o          o Configure Apache Virtual Host for squirrel mail integration$ }4 @7 g; r. A8 o* |
          o Configure BIND DNS services for squirrel mail integration% F+ q/ W! [- }! ]3 t# E
          o Explore squirrel mail's web-based interface: _4 h3 P$ V2 R$ }
          o Generate mail from various remote domains (hotmail.com, etc.) and retrieve with squirrel mail
2 v5 B/ S1 M/ W5 pLinux Concepts/Offensive/Defensive Security Implementation Techniques - Module 10
) n8 h; a: n* T; m( w! V下载:迅雷专用高速下载   LinuxCBT.Classic.Edition.CD10
. G/ R9 G3 d: f3 {% g4 v    * Secure Shell (SSH) Concepts & Implementation
" _, R3 L; y, \- i2 e5 n          o SSH client concepts - replacement for clear-text-based Telnet, RCP, FTP protocols.8 _" v4 \8 S  a& ?# ?& V% q$ D+ q8 ^
          o Identification of required OpenSSH/OpenSSL components
; Q1 K* o3 ^8 o; H          o Demonstrate SSH connectivity & public key registration; x( U' p: l  [9 n9 k7 b
          o Implement globally-shared public keys, b& O0 L& Y6 C, C+ c7 V5 B' }. r5 e
          o Generate RSA & DSA public key/private key pairs% s, H: p8 K- J3 k' t: c
          o Configure SSH client and SSHD to authenticate via public/private key pairs* n, m+ t. K& J9 m* u
          o Authenticate to remote hosts using public/private key pairs# d# @- j7 ?, {7 b! X- p! `+ \
          o Use Secure Copy (SCP) to move files
6 A. x- J: p; X- b6 z) \/ R          o Port Forwarding implementation+ J! y# u$ h, {' H& Q
          o Port Forwarding integration with Linux & Windows 2003 Server
; w0 V: k: V; x8 N7 {7 u          o X11 Forwarding demonstration
9 b" n8 {; N6 `! B2 A          o Use Secure File Transfer Protocol (SFTP) to move files % x  g; g" t, @0 `
    * Linux Defensive Security Implementation Techniques/ v- D1 s  D# u- K! H9 g4 {
          o Implement NMAP port scanner and demostrate usage to ascertain open doors
0 d" b- f. T; J; O( E% Y          o Discuss & demonstrate operating system fingerprinting techniques with NMAP( I0 q) }( [! U3 u2 ?* T2 m3 x( `+ o) p
          o Demonstrate IP-spoofing & packet forging with NMAP
" I, a- `0 ?; ^* W* N9 C          o Discuss the benefits of the NESSUS Security & vulnerability scanner! ^% u0 u$ a" l" Z0 a
          o Implement Nessus client/server Security vulnerability scanner& E. B8 i  o8 C+ w2 w+ `0 C
          o Demonstrate parallel security scanning of local & remote subnets
& U' D' }2 x8 M+ c. V% u          o Explore Nessus's reporting capabilities (NBE/XML/HTML/etc.)$ v& F- b1 Q( \# [
          o Demonstrate Nessus class-based access for corporate usage( H7 Q: Q1 \( p7 B5 |
          o Implement Ethereal network sniffer3 {, M8 ]: i2 H2 ~2 S/ G
          o Demonstrate telnet clear-text password theft with Ethereal
0 s* w& C% q/ n. |. z; g          o Demonstrate alternative SSH encrypted sessions with Ethereal
% A2 Z) u+ _3 `          o Demonstrate FTP clear-text password theft with Ethereal" b- M8 [- H6 ]
          o Demonstrate alternative SFTP encrypted sessions with Ethereal8 k0 A. i$ m# `- [3 v& M
          o Implement HPING highly customizable packet forging tool( P. b9 k4 c/ L  s5 [  L
          o Compare & contrast PING with HPING
; B( Y& o5 z1 V1 x! r# [& O          o Demonstrate IP packet spoofing with HPING & Cisco PIX firewall integration
( j& b# z4 X, a8 s; D          o Demonstrate HPING's ability to communicate with ICMP-filtered Internet servers) }- i: C6 c+ ?5 r8 x! y
          o Demonstrate using HPING to setup a trojan horse backdoor for executing arbritary code
5 W0 x: L" B" ~          o Implement John the Ripper password cracking tool
+ N$ ~& s7 ^" x# T* ^$ S          o Discuss file and directory security+ D  p) F' o5 w) h0 G6 i
          o Implement chmod,chown,umask,SUID,SGID,etc.   e7 L- f9 G, f  _
    * Linux Defensive Security Implementation Techniques
4 F" N- j) G. N" F* ^, K" q          o Implement Multi-Router Traffic Grapher (MRTG) to establish network performance baseline
- Z' S# M9 q4 m- U. _          o Configure Cisco PIX firewall for MRTG support via Simple Network Management Protocol (SNMP)$ y8 g" d3 r% g; P9 _* A( y6 N
          o Configure MRTG to generate perfomance & badwidth-related graphs for Cisco PIX firewall6 \$ ]6 @- x& X  h8 P5 o3 J
          o Implement IP Tables Host-based firewall support
" j8 n* V. C$ t          o Configure IP Tables to restrict access to necessary services" N7 w/ x: S8 Z8 s, r7 u
          o Introduce, discuss & plan the implementation of Snort 2.x Intrustion Detection System (IDS)
3 \  u9 _5 f( g  u% B          o Discuss Snort intrustion detection concepts related to hubs & switches
# X6 Z5 u; I) U          o Install Snort 2.0 Network-based Intrusion Detection System/ u# Z% U2 X. g4 g+ u
          o Implement Snort 2.0 network sniffing functionality
  F9 _/ }  E/ I  g" |+ q. D6 d/ }          o Implement Snort 2.0 sniffing & packet-logging functionality% ]* J7 i# t6 H7 u# V2 \
          o Demonstrate Snort's ability to monitor traffic between designated hosts
# h% d5 {7 A! s$ x* f* ]          o Demonstrate password theft using Snort & FTP connections
+ s5 f" w# V8 y          o Demonstrate password theft using Snort & Apache HTTP basic authentication connections
( F. I# a7 E5 a5 W: M          o Implement Snort 2.0 Network-based Intrusion Detection System
5 a+ C: [; C3 x9 g* B, F4 j          o Implement SnortSnarf for web-based reporting of Snort 2.0 logs8 j6 v. t# V. \5 ~$ ~) V# V
          o Examine SnortSnarf reports via SSL-enabled web session
. B* O+ |& d$ p          o Demonstrate how to implement port mirroring on Cisco Catalyst switches  x7 x5 j' I) u0 g" C$ u- K
          o Implement Network Address Translation (NAT)2 U3 P+ L4 C. E8 x6 h3 |4 S
          o Discuss & Implement Port Address Translation (PAT)
! D4 I8 |# M; K( |0 o6 I9 A          o Implement TCP Wrappers4 [3 R  C- }7 G2 B+ p; A# j+ k
          o Configure Xinetd to suppress access to the system from port-scanners3 |4 x/ Z" T9 W- O
          o Discuss & Disable Portmap services
: H, t  u4 e/ C1 d( H
$ j+ }$ J* _9 A" |" K2 y[ 本帖最后由 crazyboy 于 2008-9-6 10:09 编辑 ]
发表于 2008-11-13 08:54:58 | 显示全部楼层
感谢楼主分享~正需要这个呢~呵呵~谢谢咯~
发表于 2008-11-13 09:55:05 | 显示全部楼层
原帖由 crazyboy 于 2008-9-6 10:08 发表 0 L- z9 s' W2 v6 E
6 R; z$ a8 u0 g1 w5 P( ^) j$ z. W
23491
0 R* Y2 ^8 Q  A( K- C8 m7 eLinuxCBT Classic Edition 75小时全程演练Red Hat Linux 9,该视频全套分10个模块,从基础到高级,从桌面应用到服务器应用全面讲解快速有效的布置和管理RedHat 9,共10CD,ISO格式,大小2.7GB, |/ d- b7 [; z7 E# `
文件比较大 ...
& p/ j# _8 N1 b. k
好样的……
发表于 2009-1-1 23:15:29 | 显示全部楼层
汗.是英文的.有点听不懂哎
发表于 2009-1-23 22:28:53 | 显示全部楼层
不错的东西哦  谢谢楼主了 收下了
发表于 2009-6-25 10:39:50 | 显示全部楼层
感謝
发表于 2009-7-9 17:16:25 | 显示全部楼层
中文的还是英文讲课啊
发表于 2009-7-10 11:51:18 | 显示全部楼层
不错
发表于 2009-7-17 14:04:05 | 显示全部楼层
谢谢楼主分享啊
发表于 2009-7-28 10:19:51 | 显示全部楼层
代表党中央感谢楼主
发表于 2009-7-28 12:53:14 | 显示全部楼层
都是英文,听起来有点费劲,呵呵
发表于 2009-8-16 00:31:41 | 显示全部楼层
好像是英文讲课啊
发表于 2009-10-29 10:25:01 | 显示全部楼层
英文的,有的学了
发表于 2009-12-14 03:17:14 | 显示全部楼层
好东西,xiexie
您需要登录后才可以回帖 登录 | 建立账号

本版积分规则

 
QQ在线咨询

QQ|小黑屋|手机版|Archiver|美河学习在线 ( 浙网备33020302000026号 )

GMT+8, 2025-6-18 12:24

Powered by Discuz!

© 2001-2025 eimhe.com.

快速回复 返回顶部 返回列表