Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

LinuxCBT Deb7x Edition

Posted By: serpmolot
LinuxCBT Deb7x Edition

LinuxCBT Deb7x Edition
English | mp4 | H264 1356x766 | AAC 1 ch | 40 hrs 4 min | 6.93 GB
eLearning

Course Objective

Features Discussion and Various Installations
- Enumerate relevant features
- Discuss platform support
- Installation preparation
- Obtain relevant ISO image
- Prepare VMWare environment to support Debian
- Install and evaluate
- Update network configuration
- Prepare environment for rapid implementation
- Clone instance and modify accordingly
- Evaluate cloned resource as needed
- Prepare Debian for Xen VM installation
- Provision resources for Xen
- Install on Xen as HVM and evaluate

Basic Debian GNU/Linux Skills
Explore usage of the following useful commands

- ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami, tty
- cat, file, chmod, chown, history
- STDIN, STDOUT, STDERR, UNIX Pipes, Redirection, Command Chaining
- ps, df, free, top, kill
- less & more, head & tail, find
- stat, which, w, who
- dig (Domain Information Groper) - used to query DNS servers
- Tar and compression utilities with tar|gzip|bzip2
- Use checksum programs to confirm content integrity
- Explain UNIX/Linux file security & permissions
- Symlinks | Hard Links | Soft Links | Special Bits

Storage Management
- Explore disk topology with FDISK
- Provision EXT4 File Systems as needed
- Provision additional Storage partitions using Parted
- Provision additional Swap storage
- Use MKSWAP & SWAPON to enable additional Swap storage
- Update File System Table (FSTAB) to reflect system changes
- Explore Logical Volume Management (LVM) Configuration
- Create volume sets using: Logical Volume Management (LVM)

Package Management
- Explain classes of Debian GNU/Linux Packages
- Identify Debian GNU/Linux Package Management Tools
- Inventory currently installed DEB packages
- Identify key Advanced Package Tool (APT) configuration files
- Search for Debian GNU/Linux packages using Advanced Package Tool (APT)
- Install/Update/Remove software using APT
- Configure APT to query multiple sources for packages
- Peruse package repository using 'dpkg'
- Configure APT to install packages from varying versions of Debian GNU/Linux
- Use Aptitude to manage Debian GNU/Linux packages
- Discuss various package management options
- Explore package management repositories
- Use DPKG to install a .deb package
- Install packages using 'apt-get'
- Manage packages using 'aptitude'

System Control
- Peruse key directories used by Kernel
- Discuss hierarchy as applied to functioning system
- Identify supported settings
- Influence settings real time and evaluate
- Committ settings for persistence
- Confirm persistence of directives
- Discuss various possible system tweaks

Screen TTYs | PTYs
- Discuss TTY | PTY limitations
- Identify opportunites to benefit from Screen
- Identify configuration environment
- Invoke and use screen natively
- Confirm persistence of TTYs | PTYs across sessions
- Share Screen sessions
- Confirm overall efficacy of Screen

Explore the CRON scheduling daemon & configuration
- Identify key Cron configuration scopes (Global & User)
- Explain Crontab file format and applicable options
- Define global cron jobs
- Define custom cron jobs user-wide
- Evaluate results of cron jobs

Core Network Services
- System Logging via RSyslog and Logrotate
– Discuss Syslog Facilities | Levels
– Explore default configuration
– Receive Syslog data via network
– Mirror Syslog log as needed
– Trap Infrastructure device logs and evaluate
– Explore log rotation and customization via Logrotate
– Discuss key log rotation use cases
– Configure Logrotate to rotate sample log files
– Evaluate results
- Common Network Utilities
– PING
– TELNET
– NETSTAT
– ARP
– TRACEPATH
– DIG

- Interface Configuration
– Explore network configuration tree
– Alter settings and evaluate
– Provision aliased interfaces as needed
– Confirm communications via various interfaces
– Committ configuration for persistence
– Provision interface configuration on various nodes
– Evaluate accordingly

- RSYNC Transmissions
– Discuss features and benefits
– Generate and move data between nodes as needed
– Confirm results
– Explore various rsync options
– Synchronize content as needed
– Evaluate rsync applicability

- Network Time Protocol Configuration
– Discuss applicability
– Install and explore default configuration
– Re-configure environment to suit internal requirements
– Confirm ntp strata assignments
– Ensure time synchronization across nodes

- Very Secure File Transfer Protocol Daemon (VSFTPD)
– Explain features and applicability
– Peruse default configuration
– Test anonymous FTP connectivity
– Secure configuration per general requirements
– Use various FTP clients to communicate with VSFTPD
– Enable local user access
– Jail users to $HOME - added security
– Evaluate results

- BIND Domain Name Server - DNS Implementation
– Implement BIND 9x
– Configure BIND as a caching-only DNS server
– Test caching-only name resolution from various nodes
– Configure primary DNS services
– Replicate primary content to secondary DNS node
– Confirm replication information
– Disable primary and evaluate secondary behaviour
– Vary TTLs of records and evaluate responsiveness
– Configure reverse DNS zone - IPv4
– Provision forward and reverse IPv6 records
– Confirm IPv[4|6] record resolution

- Windows Integration via Samba
– Explore default Samba footprint
– Use Samba clients to ascertain NETBIOS (SMB|CIFS) information
– Install Samba Server
– Configure User-level security and evaluate access
– Provision bridge user and test access
– Rationalize ineffectiveness of User-level security
– Contrast User | ADS security levels
– Install ADS support via Winbind and Kerberos
– Install Samba SWAT for streamlined web-based administration
– Connect Samba node to Active Directory Services (ADS)
– Confirm enumeration of ADS resources
– Test connectivity via: NETBIOS and SSH
– Evaluate results

- Apache HTTPD - Web Services
– Implement Apache Web Server
– Explore configuration hierarchy
– Discuss key directives
– Peruse Apache logging templates and defaults
– Vary logged information as needed
– Provision IP-Based Virtual Hosts (VHosts)
– Confirm distinct IP-Based connectivity to various sites
– Contrast IP-Based sites with default sites
– Conserve IP resources with Name-Based VHosts
– Contrast various VHost types
– Secure communications with Apache SSL | TLS
– Test connectivity to various SSL|TLS-enabled sites

- MySQL Installation | Administration
– Install MySQL Relational Database Management System
– Explore default client | server environment
– Use Terminal Monitor Client to ascertain DBMS details
– Secure DBMS - Remove superfluous accounts
– Create simple MySQL database with 'mysql' and 'ssh'
– Install PHPMyAdmin for web-based management of MySQL
– Use PHPMyAdmin to ascertain DBMS details
– Test connectivity as various users
– Explore PHPMyAdmin's interface
– Evaluate accordingly

- PHP Intro | CLI Script
– Explore default implementation
– Ensure proper PHP stack is installed
– Expose useful debug variables - Apache | PHP
– Write simple data copy CLI script - normalize file delimiters
– Evaluate results

- Postfix MTA
– Install Postfix MTA
– Introduction to Postfix Message Transfer Agent (MTA)
– Use Mutt to demonstrate outbound mail handling using Postfix
– Explore Postfix Configuration

- Post Office Protocol Version 3 (POP3)
– Explain POP3 concepts and applications
– Implement POP3 daemon
– Test basic $SHELL-based connectivity
– Use Mutt to send SMTP-based messages to POP3 account
– Configure MUA to interact with POP3 server
– Contrast clear-text and encrypted communications

- Internet Messaging Access Protocol (IMAP)
– Contrast IMAP with POP3
– Install IMAP server
– Fetch mail from IMAP server and evaluate
– Confirm secure communications
- Web-based Mail Implementation using Squirrel-mail
– Describe required squirrel mail components for web-mail integration
– Install squirrel mail on Debian GNU/Linux system
– Configure Apache virtual directory for squirrel mail integration
– Configure Apache Virtual Host for squirrel mail integration
– Configure BIND DNS services for squirrel mail integration
– Explore squirrel mail's web-based interface

- Improve Security Posture
– Update and Upgrade install Packages
– Identify changes across Nodes
– Secure content with GNU Privacy Guard (GPG)
– Explore benefits of various Secure Shell clients
– Peruse Secure Shell Server security
– Disable superfluous services
– Explore and tighten System Policy
– Login Definitions
– Evaluate Results

- NMap Security Scanner
– Obtain, compile and install current version of NMAP
– Identify commonly used NMAP options/switches/parameters
– Perform default TCP SYN-based ethical scans of local and remote resources
– Explain typical TCP handshake protocol while using NMAP
– Perform default TCP Connect-based ethical scans of local and remote resources
– Peform local ethical scans
– Identifiy key NMAP configuration files
– Use NMAP to perform operating system fingerprinting and versioning
– Peform subnet-wide ethical scans

- TCPDump Introduction | Usage
– Identify key tools
– Use TCPDump to capture traffic
– Apply Berkeley Packet Filters accordingly
– Capture and analyze traffic with Wireshark
– Evaluate Results

- IPTABLES (Netfilter Linux Kernel-based Firewall)
– Discuss features and benefits
– Explore IPTABLES default chains/filters and policies
– Filter traffic as desired
– Log filtered traffic and evaluate
– Filter traffic based on Layer-4 TCP/UDP (Source/Destination Ports) information
– Summarize rules with filtered groups of interesting traffic
– Restrict access to various daemons (SSH/FTP/HTTP/etc.)
– Test connectivity locally and remotely
– Ensure rules persistence across restarts

- Secure Key Services
– Identify remaining services
– Generate SSL | TLS Usage Keys
– Configure FTP Server with SSL | TLS
– Test secure communications with LFTP and FileZilla
– MySQL with Secure Shell Security
– MySQL with SSL | TLS Security
– Evaluate Results

- Snort® NIDS Introduciton | Usage
– Discuss features and benefits
– Explore online sources
– Install Snort Network Intrusion Detection System Packages
– Use Snort to intercept interesting traffic as Sniffer
– Log for archival purposes
– Apply BPFs as needed
– Parse captured traffic with common tools
– Explore NIDS configuration mode
– Evaluate results

Screenshots:

LinuxCBT Deb7x Edition

LinuxCBT Deb7x Edition

LinuxCBT Deb7x Edition

NO MIRRORS PLEASE

WANT MORE? VISIT MY BLOG!


LinuxCBT Deb7x Edition