UNIX / LINUX Network Administration and Security

Duration

40 hours, 5-day training workshop

Delivery

Face to face training or online training

Course Inclusive

Training materials & certificate of completion

Description

This training program helps the participants to configure multiple parts of a Linux system with the goal to optimize its functionality, reliability, performance and security.

Course Content

  • MODULE I: Introduction to Network Services
    1. Linux Network Components
    2. Connecting Networks
    3. Service Management
    4. chkconfig
    5. xinetd Services
    6. The xinetd Daemon
    7. Fault Analysis
  • MODULE II: Organizing Networked Systems
    1. DNS Basics
    2. Internet DNS Hierarchy
    3. Name Server Hierarchy
    4. Client-side DNS
    5. Server-side DNS
    6. Berkeley Internet Name Domain (BIND)
    7. Configuring BIND
    8. Configuration File Basics
    9. Address Match Lists and acl
    10. rndc
    11. Zone Files
    12. Main Record Types
    13. Delegating Subdomains
    14. Caching-only Name Server
    15. BIND Utilities
    16. BIND Syntax Utilities
    17. Configuring the DHCP server
  • MODULE III: Network File Sharing Services
    1. Configuring NFS services
    2. Configuring FTP services
    3. Samba Services
    4. Samba Daemons
    5. Configuring Samba
    6. Configuring File and Directory Sharing
    7. Printing to the Samba Server
    8. Authentication Methods
    9. Samba Client Tools: smbclient and smbmount
  • MODULE IV: Electronic Mail Services
    1. sendmail Features
    2. Security and "Anti-Spam" Features
    3. An Email Review
    4. Simple Operational Overview
    5. Main Configuration Files
    6. sendmail Configuration with the m4 Macro Language
    7. sendmail Client Configuration
    8. Blacklisting Recipients
    9. Debugging sendmail
    10. Postfix
    11. Using Postfix
    12. Additional postfix Configuration Files
    13. procmail Local Delivery
  • MODULE V: The HTTP Service
    1. Apache Features
    2. Apache Configuration
    3. Apache Server Configuration
    4. Virtual Hosts
    5. Apache Namespace Configuration
    6. CGI
    7. Apache Encrypted Web Server
    8. Squid Web Proxy Cache
  • MODULE VI: Security Concerns and Policy
    1. Security Terms
    2. Basic Network Security
    3. Which Services Are Running?
    4. Remote Service Detection
    5. Definitions of Security
    6. Security Policy
    7. Backup Policies
  • MODULE VII: Authentication Services
    1. Authentication Basics
    2. Service Profile: PAM
    3. PAM Operation
    4. Core PAM Modules
    5. Authentication Modules
    6. Password Security
    7. Password Policy
    8. Resource Limits
    9. User Access Control
    10. Single User Mode
    11. Authentication Troubleshooting
    12. NIS Overview
    13. NIS Server Topology
    14. Configuring an NIS Server
    15. NIS Client Configuration
    16. NIS Troubleshooting
  • MODULE VIII: System Monitoring
    1. Introduction to System Monitoring
    2. File System Analysis
    3. Set User and Group ID Permissions
    4. Typical Problematic Permissions
    5. EXT2 Filesystem Attributes
    6. Monitoring Data Integrity with tripwire
    7. Configuring tripwire
    8. System Log Files
    9. syslogd and klogd configuration
    10. Advanced syslogd configuration
    11. Log File Analysis
    12. Monitoring and Limiting Processes
    13. Monitoring Processes with top
    14. Monitoring Processes Graphically
    15. System Activity Reporting
    16. Process Accounting Tools
  • MODULE IX: Securing Networks
    1. Packet Filtering Capabilities
    2. Netfilter Architecture
    3. Netfilter Packet Flow
    4. Chain Operations
    5. Rule targets
    6. Rule Matching
    7. Network Address Translation(NAT)
    8. Connection Tracking
    9. Rule persistence
    10. The "Bastion Host"
  • ODULE X: Securing Services
    1. SystemV Startup Control
    2. Securing the Service
    3. tcp_wrappers Configuration
    4. Daemon Specification
    5. Client Specification
    6. Advanced Syntax
    7. xinetd-based security
    8. xinetd Access Control
    9. Host Patterns
    10. Advanced Security Options
  • MODULE XI: Securing Data
    1. The Need For Encryption
    2. Cryptographic Building Blocks
    3. Random Numbers
    4. One-Way Hashes
    5. Symmetric Encryption
    6. Asymmetric Encryption
    7. Public Key Infrastructures
    8. Digital Certificates
    9. Generating Digital Certificates
    10. OpenSSH Overview
    11. The OpenSSH
    12. OpenSSH Authentication
    13. Protecting Your Keys
    14. Applications: RPM
    • MAKATI
    • 333 Sen. Gil Puyat Ave., Makati City 1200, Philippines

    • Contact No.
    • +63 2 8891 0713
      +63 2 8751 6482

    • Email Address
    • inquiries@mapua.edu.ph

    • INTRAMUROS
    • 658 Muralla St., Intramuros, Manila 1002, Philippines

    • Contact No.
    • +63 2 8524-5572


    • Email Address
    • ccesc@mapua.edu.ph