->

UnixCBT BSD8x Edition (FreeBSD 8.2) DVD

UnixCBT BSD8x Edition (FreeBSD 8.2) DVD  

Resolution: 1280x720(.Mp4) | Audio: AAC 256 Kbit/s 48 KHz | Completion Time: 40hours | 3.87 GB

Genre: Programs, Instructional | LinuxCBT | Language: English

UnixCBT BSD8x Edition explores the enterprise-ready FreeBSD 8x operating system.

UnixCBT BSD8x Edition prepares you or your organization for successfully deploying and managing business-critical FreeBSD-based server solutions. Let UnixCBT BSD8x Edition teach you what traditional training outlets and other CBTs do not; solid Unix skills!

 


Recommended Prerequisites:

Open mind & determination to master Unix and related open-source applications

Basic Computing Skills

Basic understanding of networking concepts

Access to FreeBSD to perform all of the installations and exercises 

 

Introduction to & Installation of FreeBSD Unix

    Installation

        Explore features of FreeBSD

        Perform standard installation

        Execute custom installation

        Install with multiple disks

        Commence FTP, network-based installation

        Explore nuances and caveats

        Evaluate results

Post-Installation Initialization and Exploration

    Configure X

    Install and configure GNOME Desktop

    Explore the boot process

    Demonstrate usage of the following useful commands & concepts

        Install BASH $SHELL

        ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami

        alias, cat, file, chmod, chown, history

        Standard in/out, UNIX Pipes, Redirection, Command Chaining

        ps, df, top, kill

        less & more, head & tail, find

        which & whereis, w, who

        tar, gzip, bzip2, zip

        checksums

        Tweak run-time kernel parameters with 'sysctl'

        Use 'screen' to maintain persistent TTYs

        Explore user management tools

        Peruse Unix permissions

        Implement symbolic links

    Storage Management

        Provision additional storage as needed

        Migrate file system to new file system

        Appropriate SWAP as needed

        Configure CCD storage manager with RAID

        Explore GVinum storage manager

        Take file system snapshots

        Implement quotas

        Evaluate results

    Kernel Compilation

        Discuss applicability

        Explore kernel environment

        Compile new kernel with desired features

        Retain original kernel

        Evaluate results

    Log Management

        Peruse model

        Configure Syslog

        Capture logs from remote sources

        Rotate logs

        Evaluate results

    Cron Scheduler

        Explore defaults

        Define and schedule tasks

        Monitor behavior

        Alter configuration accordingly

        Pinpoint nuances and caveats

        Evaluate results

    Common Network Tools

        PING

        TELNET

        NETSTAT

        DIG

        NSLOOKUP

        HOST

        WHOIS

Core Network Services & Configuration

    BSD Service | Daemon Management

        Peruse model

        Contrast with System V

        Explore defaults

        Tweak configuration

        Enable | Disable Services as needed

        Evaluate results

    Sysctl

        Explore run-time kernel directives

        Identify key configuration files

        Alter directives to improve performance

        Ensure persistence

        Evaluate results

    IPv[4|6] Configuration

        Identify key files and tools

        Explore initial configuration

        Alter configuration to reflect current events

        Evaluate results

    Package Management

        Discuss model

        Explore Ports

        Install various packages from source using Ports

        Update Ports collection

        Install pre-compiled, binary packages

        Compare and contrast approaches

        Evaluate results

    Commonly-used Network Utilities

        Discuss and explore critical network client utilities

        LFTP

        CURL

        Wget

        RSYNC

    Network Time Protocol (NTP) Client/Server

        Discuss features and benefits

        Explore configuration

        Configure Network Time Protocol (NTP) to perform client/server time synchronization

        Perform one-off synchronizations

        Evaluate results

    INETD - TELNETD | TFTPD | FTPD

        Discuss features and benefits

        Enable TELNETD daemon

        Use for terminal emulation

        Enable TFTPD daemon

        Use for quick file transfers

        Implement FTP Server

        Evaluate FTP client access

        Evaluate results

    BIND DNS

        Implement BIND

        Explore caching-only configuration

        Resolve upstream hosts via caching-only instance

        Implement primary DNS server

        Configure secondary zone services

        Synchronize content with remote BIND host

        Setup reverse DNS

        Apply to IPv[4|6] accordingly

        Evaluate resuls

    Dynamic Host Configuration Protocol (DHCP) services

        Explain the various steps of the DHCP process

        Configure global & scope-level DHCP options

        Configure IP reservations based on layer 2 MAC addresses

        Enable DHCP services

        Evaluate client access

    SAMBA

        Discuss features and benefits

        Install and configure

        Implement SWAT

        Evaluate disparate client access

        Ensure persistent configuration

        Evaluate results

    NFS

        Discuss features and benefits

        Implement exports

        Attach remotely

        Configure persistence

        Evaluate results

Application Services - Unix|Apache|MySQL|PHP (UAMP)

    Web Application Services

        Implement Apache Web Server

        Examine httpd.conf file directives

        Implement virtual directories using Apache and symbollic links

        Implement Redirects using Locate and various Apache directives

        Configure virtual hosts bound to the primary IP address and port

        Configure virtual hosts bound to alternate virtual IP addresses and ports

        Implement Apache logging system per virtual host

    MySQL Relational Database Management System

        Install MySQL Relational Database Management System

        Secure access to MySQL

        Explore MySQL Terminal Monitor Client

        Create sample MySQL database

        Install PHPMyAdmin for web-based management of MySQL instances

        Explain & Secure access to PHPMyAdmin

        Explore PHPMyAdmin's interface

    PHP Implementaiton

        Discuss features and benefits

        Write scripts to enumerate useful PHP | Apache data

        Integrate PHP with MySQL

        Evaluate results

    Postfix MTA

        Install Postfix MTA

        Introduction to Postfix Message Transfer Agent (MTA)

        Use Mutt to demonstrate outbound mail handling using Postfix

        Explore Postfix Configuration

    Post Office Protocol Version 3 (POP3)

        Explain POP3 concepts and applications

        Implement POP3 daemon

        Connect to POP3 daemon using Windows client

        Use Mutt to send SMTP-based messages to POP3 account

    Internet Messaging Access Protocol (IMAP)

        Explain IMAP concepts and applications in comparison to POP3

        Implement IMAP services

        Connect to IMAP services from remote Windows client

Security Implementation Techniques

    GNU Privacy Guard (GPG)

        Discuss features and benefits

        Use GPG to secure communications

        Generate usage keys

        Exchange keys and encrypted data with remote user

        Evaluate Results

    Secure Shell (SSH) Usage

        Discuss features and benefits

        Identify key SSH clients

        Use SSH clients accordingly to secure communications

        Explore SSH server configuration

        Evaluate Results

    Network Mapper (NMAP)

        Install current version of NMAP

        Identify commonly used NMAP options/switches/parameters

        Perform default TCP SYN-based ethical scans of local and remote resources

        Explain typical TCP handshake protocol while using NMAP

        Perform default TCP Connect-based ethical scans of local and remote resources

        Peform local ethical scans

        Identifiy key NMAP configuration files

        Use NMAP to perform operating system fingerprinting and versioning

        Peform subnet-wide ethical scans

    System Lockdown

        Discuss typical company policy

        Identify superfluous services | daemons

        Execute lockdown accordingly

        Generate security baseline with NMap

        Ensure lockdown persistence

        Evaluate results

    TCPDump

        Explain features and benefits

        Capture myriad traffic

        Archive traffic for post-mortem analyses

        Apply BPFs as needed

        Evaluate results

    WireShark

        Discuss features and benefits

        Explore interface

        Capture arbitrary packets and examine

        Peruse tcpdump captures

        Archive interesting packet streams

        Evaluate results

    Packet Filter (PF) Firewall

        Discuss features and benefits

        Intro to PF concepts and structure

        Define PF firewall rules based on lockdown policy

        Enable PF logging and peruse captures

        Ensure persistence

        Evaluate results

Download (Rapidgator.net)

http://rapidgator.net/file/24287514/UCBT_BSD8X.part1.rar.html

http://rapidgator.net/file/24287371/UCBT_BSD8X.part2.rar.html

http://rapidgator.net/file/24287407/UCBT_BSD8X.part3.rar.html

http://rapidgator.net/file/24287671/UCBT_BSD8X.part4.rar.html

 

Or

http://extabit.com/file/2crkmthy8gthu/UCBT_BSD8X.part1.rar

http://extabit.com/file/2crkmthy8gtgi/UCBT_BSD8X.part2.rar

http://extabit.com/file/2crkmthy8gtia/UCBT_BSD8X.part3.rar

http://extabit.com/file/2crkmthy8i1rm/UCBT_BSD8X.part4.rar

 

Or

http://www.rapidshare.com/dateiUmFdBGwYBm/UCBT_BSD8X.part1.rar.htm

http://www.rapidshare.com/dateiWf1rAV3zv8/UCBT_BSD8X.part2.rar.htm

http://www.rapidshare.com/dateiDCDXM4DI5t/UCBT_BSD8X.part3.rar.htm

http://www.rapidshare.com/dateiAhgjDHFH3V/UCBT_BSD8X.part4.rar.htm

 


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 hung712   |  

Information
Members of Guests cannot leave comments.




rss