UnixCBT BSD8x Edition
发表于 : 2011-11-10 20:51
Price: Subscription Includes ALL LinuxCBT | UnixCBT Content
Subscription Terms: 1-Month | 3-Month | 6-Month | 12-Month
License: Single-User (Default)
Multiple Licenses: Select During Checkout
System Requirements: Web Browser with HTML5 | Flash support
User Agents: Chrome | Safari | Firefox | IE | Opera
Mobile | Tablet Platforms: IOS | Droid
Duration: 40 hours
UnixCBT BSD8x Edition prepares you or your organization for successfully deploying and managing business-critical FreeBSD-based server solutions. Let UnixCBT BSD8x Edition teach you what traditional training outlets and other CBTs do not; solid Unix skills!
Recommended Prerequisites:
Open mind & determination to master Unix and related open-source applications
Basic Computing Skills
Basic understanding of networking concepts
Access to FreeBSD to perform all of the installations and exercises
Introduction to & Installation of FreeBSD Unix
Installation
Explore features of FreeBSD
Perform standard installation
Execute custom installation
Install with multiple disks
Commence FTP, network-based installation
Explore nuances and caveats
Evaluate results
Post-Installation Initialization and Exploration
Configure X
Install and configure GNOME Desktop
Explore the boot process
Demonstrate usage of the following useful commands & concepts
Install BASH $SHELL
ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami
alias, cat, file, chmod, chown, history
Standard in/out, UNIX Pipes, Redirection, Command Chaining
ps, df, top, kill
less & more, head & tail, find
which & whereis, w, who
tar, gzip, bzip2, zip
checksums
Tweak run-time kernel parameters with 'sysctl'
Use 'screen' to maintain persistent TTYs
Explore user management tools
Peruse Unix permissions
Implement symbolic links
Storage Management
Provision additional storage as needed
Migrate file system to new file system
Appropriate SWAP as needed
Configure CCD storage manager with RAID
Explore GVinum storage manager
Take file system snapshots
Implement quotas
Evaluate results
Kernel Compilation
Discuss applicability
Explore kernel environment
Compile new kernel with desired features
Retain original kernel
Evaluate results
Log Management
Peruse model
Configure Syslog
Capture logs from remote sources
Rotate logs
Evaluate results
Cron Scheduler
Explore defaults
Define and schedule tasks
Monitor behavior
Alter configuration accordingly
Pinpoint nuances and caveats
Evaluate results
Common Network Tools
PING
TELNET
NETSTAT
DIG
NSLOOKUP
HOST
WHOIS
top
Core Network Services & Configuration
BSD Service | Daemon Management
Peruse model
Contrast with System V
Explore defaults
Tweak configuration
Enable | Disable Services as needed
Evaluate results
Sysctl
Explore run-time kernel directives
Identify key configuration files
Alter directives to improve performance
Ensure persistence
Evaluate results
IPv[4|6] Configuration
Identify key files and tools
Explore initial configuration
Alter configuration to reflect current events
Evaluate results
Package Management
Discuss model
Explore Ports
Install various packages from source using Ports
Update Ports collection
Install pre-compiled, binary packages
Compare and contrast approaches
Evaluate results
Commonly-used Network Utilities
Discuss and explore critical network client utilities
LFTP
CURL
Wget
RSYNC
Network Time Protocol (NTP) Client/Server
Discuss features and benefits
Explore configuration
Configure Network Time Protocol (NTP) to perform client/server time synchronization
Perform one-off synchronizations
Evaluate results
INETD - TELNETD | TFTPD | FTPD
Discuss features and benefits
Enable TELNETD daemon
Use for terminal emulation
Enable TFTPD daemon
Use for quick file transfers
Implement FTP Server
Evaluate FTP client access
Evaluate results
BIND DNS
Implement BIND
Explore caching-only configuration
Resolve upstream hosts via caching-only instance
Implement primary DNS server
Configure secondary zone services
Synchronize content with remote BIND host
Setup reverse DNS
Apply to IPv[4|6] accordingly
Evaluate resuls
Dynamic Host Configuration Protocol (DHCP) services
Explain the various steps of the DHCP process
Configure global & scope-level DHCP options
Configure IP reservations based on layer 2 MAC addresses
Enable DHCP services
Evaluate client access
SAMBA
Discuss features and benefits
Install and configure
Implement SWAT
Evaluate disparate client access
Ensure persistent configuration
Evaluate results
NFS
Discuss features and benefits
Implement exports
Attach remotely
Configure persistence
Evaluate results
top
Application Services - Unix|Apache|MySQL|PHP (UAMP)
Web Application Services
Implement Apache Web Server
Examine httpd.conf file directives
Implement virtual directories using Apache and symbollic links
Implement Redirects using Locate and various Apache directives
Configure virtual hosts bound to the primary IP address and port
Configure virtual hosts bound to alternate virtual IP addresses and ports
Implement Apache logging system per virtual host
MySQL Relational Database Management System
Install MySQL Relational Database Management System
Secure access to MySQL
Explore MySQL Terminal Monitor Client
Create sample MySQL database
Install PHPMyAdmin for web-based management of MySQL instances
Explain & Secure access to PHPMyAdmin
Explore PHPMyAdmin's interface
PHP Implementaiton
Discuss features and benefits
Write scripts to enumerate useful PHP | Apache data
Integrate PHP with MySQL
Evaluate results
Postfix MTA
Install Postfix MTA
Introduction to Postfix Message Transfer Agent (MTA)
Use Mutt to demonstrate outbound mail handling using Postfix
Explore Postfix Configuration
Post Office Protocol Version 3 (POP3)
Explain POP3 concepts and applications
Implement POP3 daemon
Connect to POP3 daemon using Windows client
Use Mutt to send SMTP-based messages to POP3 account
Internet Messaging Access Protocol (IMAP)
Explain IMAP concepts and applications in comparison to POP3
Implement IMAP services
Connect to IMAP services from remote Windows client
top
Security Implementation Techniques
GNU Privacy Guard (GPG)
Discuss features and benefits
Use GPG to secure communications
Generate usage keys
Exchange keys and encrypted data with remote user
Evaluate Results
Secure Shell (SSH) Usage
Discuss features and benefits
Identify key SSH clients
Use SSH clients accordingly to secure communications
Explore SSH server configuration
Evaluate Results
Network Mapper (NMAP)
Install current version of NMAP
Identify commonly used NMAP options/switches/parameters
Perform default TCP SYN-based ethical scans of local and remote resources
Explain typical TCP handshake protocol while using NMAP
Perform default TCP Connect-based ethical scans of local and remote resources
Peform local ethical scans
Identifiy key NMAP configuration files
Use NMAP to perform operating system fingerprinting and versioning
Peform subnet-wide ethical scans
System Lockdown
Discuss typical company policy
Identify superfluous services | daemons
Execute lockdown accordingly
Generate security baseline with NMap
Ensure lockdown persistence
Evaluate results
TCPDump
Explain features and benefits
Capture myriad traffic
Archive traffic for post-mortem analyses
Apply BPFs as needed
Evaluate results
WireShark
Discuss features and benefits
Explore interface
Capture arbitrary packets and examine
Peruse tcpdump captures
Archive interesting packet streams
Evaluate results
Packet Filter (PF) Firewall
Discuss features and benefits
Intro to PF concepts and structure
Define PF firewall rules based on lockdown policy
Enable PF logging and peruse captures
Ensure persistence
Evaluate results
download
Subscription Terms: 1-Month | 3-Month | 6-Month | 12-Month
License: Single-User (Default)
Multiple Licenses: Select During Checkout
System Requirements: Web Browser with HTML5 | Flash support
User Agents: Chrome | Safari | Firefox | IE | Opera
Mobile | Tablet Platforms: IOS | Droid
Duration: 40 hours
UnixCBT BSD8x Edition prepares you or your organization for successfully deploying and managing business-critical FreeBSD-based server solutions. Let UnixCBT BSD8x Edition teach you what traditional training outlets and other CBTs do not; solid Unix skills!
Recommended Prerequisites:
Open mind & determination to master Unix and related open-source applications
Basic Computing Skills
Basic understanding of networking concepts
Access to FreeBSD to perform all of the installations and exercises
Introduction to & Installation of FreeBSD Unix
Installation
Explore features of FreeBSD
Perform standard installation
Execute custom installation
Install with multiple disks
Commence FTP, network-based installation
Explore nuances and caveats
Evaluate results
Post-Installation Initialization and Exploration
Configure X
Install and configure GNOME Desktop
Explore the boot process
Demonstrate usage of the following useful commands & concepts
Install BASH $SHELL
ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami
alias, cat, file, chmod, chown, history
Standard in/out, UNIX Pipes, Redirection, Command Chaining
ps, df, top, kill
less & more, head & tail, find
which & whereis, w, who
tar, gzip, bzip2, zip
checksums
Tweak run-time kernel parameters with 'sysctl'
Use 'screen' to maintain persistent TTYs
Explore user management tools
Peruse Unix permissions
Implement symbolic links
Storage Management
Provision additional storage as needed
Migrate file system to new file system
Appropriate SWAP as needed
Configure CCD storage manager with RAID
Explore GVinum storage manager
Take file system snapshots
Implement quotas
Evaluate results
Kernel Compilation
Discuss applicability
Explore kernel environment
Compile new kernel with desired features
Retain original kernel
Evaluate results
Log Management
Peruse model
Configure Syslog
Capture logs from remote sources
Rotate logs
Evaluate results
Cron Scheduler
Explore defaults
Define and schedule tasks
Monitor behavior
Alter configuration accordingly
Pinpoint nuances and caveats
Evaluate results
Common Network Tools
PING
TELNET
NETSTAT
DIG
NSLOOKUP
HOST
WHOIS
top
Core Network Services & Configuration
BSD Service | Daemon Management
Peruse model
Contrast with System V
Explore defaults
Tweak configuration
Enable | Disable Services as needed
Evaluate results
Sysctl
Explore run-time kernel directives
Identify key configuration files
Alter directives to improve performance
Ensure persistence
Evaluate results
IPv[4|6] Configuration
Identify key files and tools
Explore initial configuration
Alter configuration to reflect current events
Evaluate results
Package Management
Discuss model
Explore Ports
Install various packages from source using Ports
Update Ports collection
Install pre-compiled, binary packages
Compare and contrast approaches
Evaluate results
Commonly-used Network Utilities
Discuss and explore critical network client utilities
LFTP
CURL
Wget
RSYNC
Network Time Protocol (NTP) Client/Server
Discuss features and benefits
Explore configuration
Configure Network Time Protocol (NTP) to perform client/server time synchronization
Perform one-off synchronizations
Evaluate results
INETD - TELNETD | TFTPD | FTPD
Discuss features and benefits
Enable TELNETD daemon
Use for terminal emulation
Enable TFTPD daemon
Use for quick file transfers
Implement FTP Server
Evaluate FTP client access
Evaluate results
BIND DNS
Implement BIND
Explore caching-only configuration
Resolve upstream hosts via caching-only instance
Implement primary DNS server
Configure secondary zone services
Synchronize content with remote BIND host
Setup reverse DNS
Apply to IPv[4|6] accordingly
Evaluate resuls
Dynamic Host Configuration Protocol (DHCP) services
Explain the various steps of the DHCP process
Configure global & scope-level DHCP options
Configure IP reservations based on layer 2 MAC addresses
Enable DHCP services
Evaluate client access
SAMBA
Discuss features and benefits
Install and configure
Implement SWAT
Evaluate disparate client access
Ensure persistent configuration
Evaluate results
NFS
Discuss features and benefits
Implement exports
Attach remotely
Configure persistence
Evaluate results
top
Application Services - Unix|Apache|MySQL|PHP (UAMP)
Web Application Services
Implement Apache Web Server
Examine httpd.conf file directives
Implement virtual directories using Apache and symbollic links
Implement Redirects using Locate and various Apache directives
Configure virtual hosts bound to the primary IP address and port
Configure virtual hosts bound to alternate virtual IP addresses and ports
Implement Apache logging system per virtual host
MySQL Relational Database Management System
Install MySQL Relational Database Management System
Secure access to MySQL
Explore MySQL Terminal Monitor Client
Create sample MySQL database
Install PHPMyAdmin for web-based management of MySQL instances
Explain & Secure access to PHPMyAdmin
Explore PHPMyAdmin's interface
PHP Implementaiton
Discuss features and benefits
Write scripts to enumerate useful PHP | Apache data
Integrate PHP with MySQL
Evaluate results
Postfix MTA
Install Postfix MTA
Introduction to Postfix Message Transfer Agent (MTA)
Use Mutt to demonstrate outbound mail handling using Postfix
Explore Postfix Configuration
Post Office Protocol Version 3 (POP3)
Explain POP3 concepts and applications
Implement POP3 daemon
Connect to POP3 daemon using Windows client
Use Mutt to send SMTP-based messages to POP3 account
Internet Messaging Access Protocol (IMAP)
Explain IMAP concepts and applications in comparison to POP3
Implement IMAP services
Connect to IMAP services from remote Windows client
top
Security Implementation Techniques
GNU Privacy Guard (GPG)
Discuss features and benefits
Use GPG to secure communications
Generate usage keys
Exchange keys and encrypted data with remote user
Evaluate Results
Secure Shell (SSH) Usage
Discuss features and benefits
Identify key SSH clients
Use SSH clients accordingly to secure communications
Explore SSH server configuration
Evaluate Results
Network Mapper (NMAP)
Install current version of NMAP
Identify commonly used NMAP options/switches/parameters
Perform default TCP SYN-based ethical scans of local and remote resources
Explain typical TCP handshake protocol while using NMAP
Perform default TCP Connect-based ethical scans of local and remote resources
Peform local ethical scans
Identifiy key NMAP configuration files
Use NMAP to perform operating system fingerprinting and versioning
Peform subnet-wide ethical scans
System Lockdown
Discuss typical company policy
Identify superfluous services | daemons
Execute lockdown accordingly
Generate security baseline with NMap
Ensure lockdown persistence
Evaluate results
TCPDump
Explain features and benefits
Capture myriad traffic
Archive traffic for post-mortem analyses
Apply BPFs as needed
Evaluate results
WireShark
Discuss features and benefits
Explore interface
Capture arbitrary packets and examine
Peruse tcpdump captures
Archive interesting packet streams
Evaluate results
Packet Filter (PF) Firewall
Discuss features and benefits
Intro to PF concepts and structure
Define PF firewall rules based on lockdown policy
Enable PF logging and peruse captures
Ensure persistence
Evaluate results
download
代码: 全选
filesonic:
http://www.filesonic.com/file/2988537345
http://www.filesonic.com/file/2988539265
http://www.filesonic.com/file/2988537365
http://www.filesonic.com/file/2988540965
http://www.filesonic.com/file/2988521125
http://www.filesonic.com/file/2988501565
http://www.filesonic.com/file/2988501675
wupload
http://www.wupload.com/file/1915300176
http://www.wupload.com/file/1915300196
http://www.wupload.com/file/1915299911
http://www.wupload.com/file/1915316986
http://www.wupload.com/file/1915327771
http://www.wupload.com/file/1915327791
http://www.wupload.com/file/1915328686
filejungle
http://www.filejungle.com/f/ZUSyvA
http://www.filejungle.com/f/HFFJHe
http://www.filejungle.com/f/staPvH
http://www.filejungle.com/f/guCnjb
http://www.filejungle.com/f/fPMczS
http://www.filejungle.com/f/M53kjE
http://www.filejungle.com/f/YxsCbP