UNIX / LINUX Network Administration and Security

Course Content

  1. Linux Network Components
  2. Connecting Networks
  3. Service Management
  4. chkconfig
  5. xinetd Services
  6. The xinetd Daemon
  7. Fault Analysis
  1. DNS Basics
  2. Internet DNS Hierarchy
  3. Name Server Hierarchy
  4. Client-side DNS
  5. Server-side DNS
  6. Berkeley Internet Name Domain (BIND)
  7. Configuring BIND
  8. Configuration File Basics
  9. Address Match Lists and acl
  10. rndc
  11. Zone Files
  12. Main Record Types
  13. Delegating Subdomains
  14. Caching-only Name Server
  15. BIND Utilities
  16. BIND Syntax Utilities
  17. Configuring the DHCP server
  1. Configuring NFS services
  2. Configuring FTP services
  3. Samba Services
  4. Samba Daemons
  5. Configuring Samba
  6. Configuring File and Directory Sharing
  7. Printing to the Samba Server
  8. Authentication Methods
  9. Samba Client Tools: smbclient and smbmount
  1. sendmail Features
  2. Security and "Anti-Spam" Features
  3. An Email Review
  4. Simple Operational Overview
  5. Main Configuration Files
  6. sendmail Configuration with the m4 Macro Language
  7. sendmail Client Configuration
  8. Blacklisting Recipients
  9. Debugging sendmail
  10. Postfix
  11. Using Postfix
  12. Additional postfix Configuration Files
  13. procmail Local Delivery
  1. Apache Features
  2. Apache Configuration
  3. Apache Server Configuration
  4. Virtual Hosts
  5. Apache Namespace Configuration
  6. CGI
  7. Apache Encrypted Web Server
  8. Squid Web Proxy Cache
  1. Security Terms
  2. Basic Network Security
  3. Which Services Are Running?
  4. Remote Service Detection
  5. Definitions of Security
  6. Security Policy
  7. Backup Policies
  1. Authentication Basics
  2. Service Profile: PAM
  3. PAM Operation
  4. Core PAM Modules
  5. Authentication Modules
  6. Password Security
  7. Password Policy
  8. Resource Limits
  9. User Access Control
  10. Single User Mode
  11. Authentication Troubleshooting
  12. NIS Overview
  13. NIS Server Topology
  14. Configuring an NIS Server
  15. NIS Client Configuration
  16. NIS Troubleshooting
  1. Introduction to System Monitoring
  2. File System Analysis
  3. Set User and Group ID Permissions
  4. Typical Problematic Permissions
  5. EXT2 Filesystem Attributes
  6. Monitoring Data Integrity with tripwire
  7. Configuring tripwire
  8. System Log Files
  9. syslogd and klogd configuration
  10. Advanced syslogd configuration
  11. Log File Analysis
  12. Monitoring and Limiting Processes
  13. Monitoring Processes with top
  14. Monitoring Processes Graphically
  15. System Activity Reporting
  16. Process Accounting Tools
  1. Packet Filtering Capabilities
  2. Netfilter Architecture
  3. Netfilter Packet Flow
  4. Chain Operations
  5. Rule targets
  6. Rule Matching
  7. Network Address Translation(NAT)
  8. Connection Tracking
  9. Rule persistence
  10. The "Bastion Host"
  1. SystemV Startup Control
  2. Securing the Service
  3. tcp_wrappers Configuration
  4. Daemon Specification
  5. Client Specification
  6. Advanced Syntax
  7. xinetd-based security
  8. xinetd Access Control
  9. Host Patterns
  10. Advanced Security Options
  1. The Need For Encryption
  2. Cryptographic Building Blocks
  3. Random Numbers
  4. One-Way Hashes
  5. Symmetric Encryption
  6. Asymmetric Encryption
  7. Public Key Infrastructures
  8. Digital Certificates
  9. Generating Digital Certificates
  10. OpenSSH Overview
  11. The OpenSSH
  12. OpenSSH Authentication
  13. Protecting Your Keys
  14. Applications: RPM
    • Makati
    • +63 2 8891 0722
    • +63 2 8891 0713
    • +63 2 8751 6482
    • Intramuros
    • +63 2 8524-5572
    • Intramuros
    • 658 Muralla St., Intramuros, Manila 1002, Philippines


    • Makati
    • 333 Sen. Gil Puyat Ave., Makati City 1200, Philippines