MySQL Edition
Details
Release Info
Long baked-into the L[AE]MP stack is MySQL for Relational DBMS services. MySQL, is feature-filled, reliable and scalable. Interfaces abound to allow you to be productive ASAP. It's CLI access control is very useful, offering very easy control of your data. MySQL is a must-study. Spend some time on the basics of MySQL in this release.Release Syllabus
MySQL DBMS Engine
MySQL - DBMS
- MySQL Installation
- Introduction to MySQL 5
- Discuss DBMS system specifications
- Identify existing MySQL-installed components
- Explore file-system layout
- Identify & discuss the various downloadable formats /source|binary|packaged/
- Download MySQL packages to a local repository
- Discuss the key DBMS components
- Confirm md5sums of components
- Install MySQL server package and examine defaults
- Identify key server-side administrative utilities
- Inspect the contents of the default DBMS data-directory
- Install MySQL Client package and explore its contents
- Terminal Monitor Shell Client
- Discuss Terminal Monitor concepts
- Explain the default privileges configuration
- Connect to the DBMS using anonymous privileges
- Explore Terminal Monitor's help facility and useful escape sequences
- Identify the default schemas
- Execute useful SQL functions
- Demonstrate how to execute SQL queries from the shell in non-interactive mode
- User Administration
- Identify the currently logged-in user
- Connect to MySQL DBMS as root and explore the interface
- Attempt to connect to the DBMS as invalid users and discuss the results
- Attempt to connect from a remote host and evaluate results
- Discuss the primary methods of tightening the default security scheme
- Tighten the default privileges for the root user
- Explore the global 'user' grant table & discuss attributes
- Secure anonymous user accounts
- Remove anonymous privileges and confirm enhanced security policy
- Discuss and explore the grant tables and applicable attributes
- Identify the ancillary grant tables that permit granular filtration
- Create new DBMS users and confirm connectivity
- Remove superfluous user accounts
- Discuss permissible host values when defining users
- Create remote super users and test connectivity
- Discuss privileges scopes concepts & applications
- Identify grant tables related to privileges scopes
- Use GRANT to create and manipulate user-privileges
- Create unprivileged accounts and explore capabilities
- Use REVOKE to remove privileges
- Use DROP to discard superfluous accounts
- Maintain user passwords using SET and UPDATE
- Show Commands & Options Files
- Explain the usages of key SHOW commands
- Expose DBMS privileges for currently authenticated user
- Expose DBMS privileges for other defined users
- List all databases available on the system
- Show the DDL statements used to create various MySQL-managed databases
- Examine the default supported character sets
- Reveal the structure of defined tables
- Show the DDL statements used to create various tables
- List the supported Storage Engines by the current binary-build of MySQL
- Examine the MyISAM Storage Engine tables on the file system & discuss key file types
- Show the schemas of various tables and discuss the results
- Examine the currently executing processes, including connected users
- Initiate & KILL connections listed in the process-list table
- Examine key status variables on the running server
- Show table status information, revealing used-space, length, create-time, etc.
- Discuss the default search-path for options files by MySQL clients
- Examine and secure the MySQL history file to prevent superfluous disclosure of queries
- Define a personal MySQL options file
- Explain the supported section headers in MySQL options files
- Define useful run-time directives for MySQL clients and examine results
- Define a useful, custom MySQL prompt on a global and per-user basis & examine usefulness
- Set default database variable in per-user options files and examine results
- Key MySQL Client Utilities
- Focus on mysql terminal monitor utility
- Discuss & demonstrate mysql client modes
- Discuss command-line option types
- Output queries to standard /HTML|XML|TXT/ formats
- Exclude column-headers from output for easy import into other applications
- Use options file to control startup variables
- Focus on mysqladmin utility
- Compare & contrast mysqladmin batch-mode to mysql interactive mode
- Confirm the status of DBMS servers using mysqladmin
- Ascertain remote DBMS process list
- Create & drop remote databases using mysqladmin
- Administer remote user credentials using mysqladmin
- Focus on mysqldump utility
- Discuss mysqldump applications, features & benefits
- Dump all databases and related objects to an ASCII text backup file
- Examine the resulting dump file
- Dump select databases and examine resulting file
- Dumpy DBMS databases to a remote MySQL instance using mysqldump
- Focus on mysqlimport utility
- Create database container and table structure for subsequent imports
- Create matching data-feed for import by mysqlimport
- Import data-feed using default delimiters and record-separators
- Discuss mysqlimport defaults regarding data-directory and table names
- Examine importing duplicate records
- Key Data Manipulation Language (DML) Statements
- Discuss common DML statements
- Focus on SELECT DML statement
- Optimize SELECT statements with WHERE clauses to define criteria
- Discuss SELECT operators /=|<=|>=|!=|etc/
- Perform pattern matching using WHERE clause with LIKE operator & wildcards
- Influence the order of SELECT output using ORDER BY
- Extend criteria definition and optimize queryies using AND clause
- Return result-set INTO output ASCII text file using SELECT INTO
- Redirect result-set to AWK and extract interesting fields
- Use LIMIT with SELECT to return n number of rows
- Return total number of rows including LIMIT value
- Alias column headers using SELECT
- Concatenate results returned using SELECT
- Focus on INSERT DML statement
- Explain supported INSERT statements /VALUES|SET|SELECT/
- Describe table structure to determine column constraints
- INSERT VALUES specifying column names
- INSERT VALUES one-to-one without defined column headers
- Use SET with INSERT to indicate interesting columns
- Use VALUES to INSERT multiple rows in one statement
- Discuss INSERT SELECT applications
- Create table structure for using INSERT SELECT
- Populate newly-created table with data
- Use SELECT INSERT to move data between tables & evaluate results
- Focus on UPDATE DML statement
- Perform global table UPDATE with simple DML statement
- Specify columns to be updated and evaluate affected rows
- UPDATE interesting rows using criteria
- UPDATE n number of records using the LIMIT criteria operator
- Focus on DELETE DML statement
- Remove interesting records using WHERE clause and applicable critieria
- Intro to the ALTER Data Definition Language (DDL) statement
- Key Data Types
- Focus on Numeric data-types
- Use describe to expose defined data-types for columns
- Discuss unsigned and auto incremented column attributes
- Discuss /TINYINT|SMALLINT|MEDIUMINT|INT|BIGINT/ capacity and applications
- Discuss FLOAT capacity and applications
- Discuss DOUBLE capacity and applications
- Discuss DECIMAL capacity and applications
- Discuss BIT capacity and applications
- Define a table with TINYINT column
- Populate TINYINT column with INSERT and exceed its limits and evaluate resutls
- Use ALTER to increase the capacity of the TINYINT column to SMALLINT
- Populate SMALLINT column and evaluate results
- ALTER table and add columns with greater numeric capacity
- Define a DECIMAL column and store values
- Focus on String data-types
- Explain features and limitations of CHAR type fields
- INSERT strings with unpreserved characters and evaluate results
- Compare & contrast VARCHAR & CHAR type fields; fixed vs. varaible-length
- ALTER table to convert interesting fields from CHAR to VARCHAR
- Create Perl script to generate values for VARCHAR columns and evaluate results
- Discuss /TEXT|TINYTEXT|MEDIUMTEXT|LONGTEXT/ column types
- Discuss /BLOB|TINYBLOB|MEDIUMBLOB|LONGBLOB/ column types
- ALTER table to support LONGTEXT and import data and evaluate results
- Discuss /BINARY|VARBINARY/ usages and limits
- Explain the usages of ENUM column types
- Explore predefined ENUM column types in system tables
- Define ENUM fields, insert data and evaluate DBMS behavior
- Focus on Date data-types
- Discuss DATE column type features (resolution & range)
- ALTER table structure to support DATE-based column
- INSERT invalid date and evaluate results
- Discuss DATETIME column type features (resolution & range)
- ALTER table structure to support DATETIME-based column
- INSERT valid date & time value and evaluate results
- Discuss how MySQL implements dummy dates
- ALTER table structure to support TIMESTAMP-based column
- Discuss TIMESTAMP column type features (resolution & range)
- Discuss NULL-enabled auto-timestamp (dummy-time) invocated columns
- Explain MySQL's default date syntax
- Insert Date & Time values into MySQL columns using mixed delimiters
- Insert Date & Time values into MySQL columns without delimiters
- Recap supported data-types
- Key Data Definition Language (DDL) Statements
- Focus on CREATE DDL statement
- Describe how MySQL maps database containers to the file system
- CREATE DATABASE container to house new tables
- Define the requirements /auto_increment|primary key|etc/ of new base tables
- Define the CREATE TABLE syntax for new base tables based on selected data types
- Execute statement and evaluate results of recently-created tables
- Use SHOW CREATE TABLE to examine DDL syntax for reference
- CREATE TABLE with NOT-NULL column enforcements
- Populate tables with useful values and evaluate results
- INSERT VALUES with DEFAULT for auto-populated columns and evaluate results
- Duplicate table structure using CREATE TABLE and evaluate results
- Populate destination table with data from the source table using INSERT
- Discuss Temporary tables features and applications
- CREATE TEMPORARY TABLES and populate with useful data
- Rename tables using RENAME TABLE as an alternative to ALTER TABLE
- Focus on DROP DDL statement
- Describe the objects that are affected using DROP
- DROP DBMS objects and evaluate file system implications
- Focus on CREATE INDEX DDL statement
- Discuss the importance of indexes to improved data-retrieval
- Discuss MyISAM storage engine per-index limits
- Identify default MyISAM index files
- Explore defined indices
- Define UNIQUE indices
- Compare & contrast table & index storage requirements
- Generate data-set to be imported into an indexed column
- Compare & contrast query-execution times with and without indices
- JOINS
- Discuss the features & benefits of using JOINS to access normalized data
- Normalize the data structure, using ALTER TABLE, to prepare for using joins
- Use seq to generate normalized data and import using mysqlimport
- Discuss the various types of supported JOINS /EQUI|NATURAL|LEFT|RIGHT|INNER|OUTER/
- Define and execute EQUIJOINS
- Define and execute NATURAL JOINS
- Define JOINS using fully-justified DBMS object names
- Use table and column aliases with JOINS
- VIEWS & TRIGGERS
- Discuss the features & benefits of using VIEWS
- Use DESCRIBE to identify interesting VIEW candidate-columns
- Explain VIEW-creation syntax
- Create useful VIEWS and evaluate results
- Create VIEWS using column-aliases
- Update VIEWS using CREATE OR REPLACE VIEW & ALTER VIEW
- Create VIEWS based on EQUIJOINS
- Demonstrate how to UPDATE base-table data using VIEWS
- Remove superfluous VIEWS using DROP VIEW
- Focus on TRIGGERS
- Discuss MySQL's TRIGGER implementation rules
- Discuss TRIGGER timing & events
- Discuss TRIGGER statements
- Define a TRIGGER to update a secondary table upon INSERT INTO primary table
- INSERT INTO primary table and examine TRIGGER response
- Log table updates using TRIGGERS
- Use SHOW to reveal defined TRIGGERS ON tables
- Create & evaluate multiple statement triggers using BEGIN .. .END
- Redefine MySQL statement delimiters to support multiple statement triggers
- Stored Routines (Functions & Procedures)
- Discuss Stored Routines components and applications
- Focus on Stored Procedures
- Discuss required privileges
- Explain how to invoke stored procedure
- Define useful stored procedures
- Use SHOW to reveal stored procedures and important attributes
- Create multiple statement stored procedures
- Redirect stored procedure output to memory for easy reuse
- Focus on Functions
- Discuss ideal uses for functions
- Describe function syntax
- Define functions based on date calculations and evaluate results
- Replication Configuration
- Explore uses of replication
- Illustrate MySQL Master-Slave replication model
- Discuss binary logging requirements
- Updated configuration on Master & Slave servers to reflect replicaiton requirements
- Create replication accounts on Master & Slave servers
- Create a snapshot of the master server's databases
- Transport the snapshot to slave servers using SCP
- Record replication position
- Configure server IDs on Master & Slave servers
- Use DDL to enable Master & Slave servers
- Confirm replication status via DDLs, the process list and system table
- Committ updates to the master server and confirm replication to the slave servers
- Configure an additional slave server and confirm replication
- Logging
- Explain MySQL logging /ERROR|QUERY|BINARY|SLOW/
- Discuss the default log file nomenclature
- Explain & examine the contents of the ERROR log file
- Restart MySQL and examine log entries
- Enable the QUERY log file
- Explain & examine the contents of the QUERY log file
- Discuss the BINARY log file
- Discuss the SLOW log file
- Enable the SLOW log file
- Use mysqlbinlog to examine the contents of binary logs
- Win32 Integration
- Connect to Windows 2003 host and download MySQL Administrator
- Install MySQL Administrator
- Connect to Linux-based MySQL instance and explore key variables
- Download and install MySQL Query Browser
- Explore Query Browser interface & features
- Execute remote queries with Query Browser
- Download & install MyODBC
- Connect MS Access to MySQL using MyODBC
- Import data into MS Access from MySQL
- Link Tables in MS Access to MySQL using MyODBC
- Storage Engines
- Discuss the MyISAM storage engine
- Explain the usages and limitations of the Memory storage engine
- Confirm Memory storage engine support
- Create memory-based tables using the Memory storage engine
- Focus on the CSV storage engine
- Confirm support for the CSV storage engine
- Define CSV-based tables and evaluate results
- Focus on the Federated storage engine
- Explain the applications of remote tables using the Federated storage engine
- Implement Federated tables and evaluate results
- Focus on the Archive storage engine
- Confirm support for the Archive storage engine
- Describe the applications of compressed tables using the Archive storage engine
- Implement compressed tables and evaluate results
- Import data-set into compressed table and evaluate storage requirements
- Focus on the InnoDB storage engine
- Discuss the benefits /Transactional|Scalability/ of InnoDB-based tables
- Confirm support for InnoDB tables
- Explain InnoDB storage architecture and identify default data & log files
- Update /etc/my.cnf configuration file to support InnoDB tables
- Load large data-set and examine resulting data & log files
- Define custom InnoDB data & log files
- Extend the data & log files and evaluate results
- Distribute data & log files across multiple partitions
- Create a raw device for InnoDB data & log files
- Define InnoDB data & log files on a RAW device
- phpMyAdmin
- Discuss the benefits and applications of phpMyAdmin
- Install & configure Apache HTTPD
- Download & install phpMyAdmin
- Secure phpMyAdmin's access to MySQL DBMS
- Explore phpMyAdmin's interface
- Perform many shell-based queries, graphically
- PHP5 Integration
- Uninstall PHP 4.x
- Download & install PHP 5.x packages & relevant modules /MySQL|SSL|etc./
- Explore the PHP Command Line Interface (CLI)
- Interface PHP CLI to MySQL & return results
- Implement PHP->MySQL error handling using conditions & OO-functions
- Execute useful PHP->MySQL methods
- Define HTML forms
- Process HTML forms using PHP
- Store data in MySQL using PHP
- Explore Additional MySQL Utilities
- Use MySQLShow to return useful data
- Use MyISAMCheck & MySQLCheck
- Compare and contrast both utilities
- MySQL with SSH Tunnel
- Discuss benefits
- Implement SSH tunnel
- Use MySQL utilities across secure tunnel
- Evaluate results
- MySQL on Windows Server
- Install MySQL
- Explore configuration
- Communicate between Linux & Windows
- Transfer data between Linux & Windows
- Implement MySQL Workbench
- Evaluate results
- MySQL Instances
- Discuss features & benefits
- Configure multiple instances
- Transfer data
- Evaluate results
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Sums Edition
Details
Release Info
Checksums ensure data-integrity, at-rest, cross-transit, and ultimately at-rest. Use them to verify Content as needed.Release Syllabus
Sums
- Various Tools
- Remote Confirmations
- File Metadata
- File Fragments
- Compress Content
- Archive Content
- DIR Hierarchy
- Password Sums
- Shared Secret
- Restrict History
- Downloaded Content
- Encrypt Content
- Site Credentials
- Site COOKIE
- Site COOKIE - Unique
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Cent9x-Stream Edition
Details
Release Info
CentOS offers a visage into the world of Red Hat Enterprise Linux (RHEL). It is a fork. Unlike its Enterprise counterpart, there are fewer encumbrances, especially vis-à-vis the all-too-important frequently required software updates. Use CentOS to align your Applications and Services with RHEL.Release Syllabus
CentOS9x Stream Administration
- Initial Environment
- ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami
- alias, cat, file, chmod, chown, history
- STD(IN|OUT), Pipes, Redirection, Command Chaining
- ps, df, top, free
- Pagers, W-Commands
- Checksums
- Awk | Sed | Grep Usage
- BASH SHELL Environment
- Compression | Archival Tools
- SSH Equivalence
- SHELL Quoting
- Propagate Environment
- Secure Clients
- Identify Standard File Types
- Standard File Permissions
- Symbolic Links
- Transfer Permissions
- Identify SWAP environment
- Provision dedicated SWAP partitions
- Add | Remove SWAP from pool as needed
- Provision File System-based SWAP
- SWAP Share
- SWAP Persistence
- Identify default storage configuration
- Provision new storage as needed
- XFS - File System
- XFS - Grow File System
- Identify LVM defaults
- Add new partitions to LVM management
- Allocate storage to LVM Volume Groups
- Create Logical Volumes (LVs) as needed
- Overlay File System and mount where applicables
- LVM - Resize
- LVM - Mixed FS
- LVM - SWAP
- Features
- Install
- Defaults
- General Usage
- Update Accounts
- Defaults
- Shared PASS Gen
- Unique PASS Gen
- Encrypted PASS Gen
- Update Accounts
- Groups
- Discuss features | limitations
- Identify default system-wide schedule
- Peruse various default Cron Jobs
- Schedule simple job and monitor recurrence
- Evaluate results
- Peruse Default CONF
- Discuss Syslog Rules
- Explore Log Rotate defaults
- Ensure rotated logs are compressed
- Extend default retention scheme
- Force Log Rotation as needed
- Explore Default environment
- Install PKGs
- Dump important metadata from packages
- Apply Updates
- Default CONF
- Add | Confirm IPs as needed
- Install
- Copy Configuration
- SELinux - Confirm
- TLS | SSL Services
- cURL Client Tests
- Virtual Hosts
- ENC Sites Only
- SFTP Only USER
- SFTP Only USER - NOLOGIN
- SFTP Only Group - Control
- NMap Intro
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5SysLogD Edition
Details
Release Info
Traditional visibility into daemon | service | program communications, activities, errors, etc., relies upon SysLOG. SysLog has migrated over the years towards JournalD via SystemD services, however, SysLOG remains intrical to many services within and without Nix Instances. In this edition, explore some of the key features of rSysLogD, the defacto SysLOG engine.Release Syllabus
SysLOG with rSysLogD
- Discuss Features
- Default Environment
- Kernel Firewall LOG
- Split LOGs by Priorities
- UDP | TCP Logging
- Dual L4 Logging
- Multiple Hosts
- Basic Queueing
- Reliable Event Logging Protocol (RELP)
- RELP - Remote Only
- RELP Only
- Traditional to RELP
- SysLOG Clear-Text - Confirm
- Property Filters
- Expression Filters
- Relay Chain
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5NFTables Edition
Details
Release Info
NFTables (nft) provides a streamlined packet classification environment.Release Syllabus
Netfilter Tables
- Features
- SSHGuard
- Ruleset Basics
- Persistence
- Sample Rules
- Inbound Filtering
- Dormant Table
- Manage Tables | Chains | Rules
- Counters
- Sets
- LOG Basics
- LOG with Sets
- Closed-Port LOGs
- LOG Options
- Re-Route LOGs
- Jump Targets
- Chain Jumping
- GoTo Chains
- Meta Selectors
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Deb12x Edition
Details
Release Info
Among the longstanding and well-maintained Distros is Debian. Its 'apt' package management framework is legendary; as is its commitment to supply por gratis, recurring security updates over a long horizon. Indeed, this distinguishes Debian and its relatives as the leading Linux Distros available.Release Syllabus
Debian 12x Administration
- Features
- Download
- Graphical Install
- Text Install
- Post-Install Tweaks
- Explore usage of the following useful commands
- tty | /dev/pts | w | whoami | who
- set | env | export | unset
- cat | echo | touch | rm
- pwd | ls | cd | mkdir | alias | umask
- head | tail
- dd
- find
- history
- STDIN, STDOUT, STDERR, UNIX Pipes, Redirection, Command Chaining
- ps, df, free, top, dd
- stat, which, w, who
- tar | gzip | bzip2 | xz
- ZSH Setup
- Explore SSH defaults
- Use SSH to connect to targets
- Transfer data with: scp | sftp | rsync
- Explain common Linux file permissions
- chmod | chgrp | chown
- Discuss various Linux file attributes | features
- SETUID | SETGID | STICKY Bit
- SymLinks: Hard | Soft
- Features
- useradd | adduser | usermod | userdel
- groupadd | groupmod | groupdel
- Create $USERs in Parallel
- $USER Passwords | mkpasswd | python3
- Generate Random Passwords
- Store Randomly-generated Passwords for Reference
- Encrypted Pass - Unique Users
- Default SHELL
- NO TTY Access
- Disable SSH Access
- Features
- Installation Defaults: File System Table
- Provision Storage
- GPT Label | Create Partition(s) | File System | Mount | Persistence
- Duplicate Drives
- Duplicate Varied Sizes
- Online Resizing (Up-Sizing)
- Provision SWAP
- Logical Volume Management (LVM)
- LVM Features
- Allocate Storage to LVM
- LVM | VG Resizing
- Fix sudo PATH
- Point-Release Upgrade
- Cron Features
- Cron Job Execution
- Journal Control Features
- Booted Kernels
- SystemD Features
- Explore default APT configuration
- Identify commonly-used package management tools
- Enumerate installed packages
- Identify package owners based on system binaries
- Discuss 'apt' and 'dpkg' options
- Install | Remove various packages
- Network Tools | IP Configuration
- Examine default IP configuration
- Extend IP configuration to facilitate additional addresses
- Static IP Config
- Dual: Dynamic | Static Config
- Multiple Interfaces
- Dual Network Services
- Confirm communications
- Features
- Restrict $USER to SFTP Access
- Confirm limited $SHELL
- SFTP-Only Group
- SFTP-Only Password AUTH
- Identifiy key NMAP configuration files
- Identify commonly used NMAP options/switches/parameters
- Scan Server resource
- Perform default TCP Connect-based ethical scans of local and remote resources
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5PHP-One-Liners Edition
Details
Release Info
PHP is more commonly known as a CGI processor; for Web-Applications. Perhaps you could call it a Middle-Tier. However, PHP also offers simple, but powerful CLI processing for common needs often provided via a hodgepodge of well-known $SHELL utilities. Either way, PHP makes it facile to achieve accounting where necessary, and simply via One-Liners.Release Syllabus
PHP One-Liners
- General Usage
- Count Lines
- Word Count
- Count Chars
- Split Lines into ARRAY
- Count Instances of Fields
- Transform Delimiters
- Anonymize LOGs
- Extract Unique SRCs
- Lines by Error Code
- LOG By Code
- Summarize Error Codes
- Pre-Seed Error Codes
- Random Strings
- Varied Passwords
- Expose Undefined Passwords
- Outdated Passwords
- Hash | Un-Hash
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5GlusterFS Edition
Details
Release Info
GlusterFS provides simple, cost-effective, scalable and reliable network-distributed volume | disk aggregation services. Quickly and effectively allocate storage for your applications with GlusterFS.Release Syllabus
Cloud Storage with GlusterFS
- Discuss Features:
- Default Volume Type
- Common Volume Types
- Transport Types
- File System Support
- Storage Model
- Features
- Provision Storage
- Allocate GlusterFS Brick
- Persistence
- Generate IO
- Multiple File Systems
- Various Sizes
- Stop | Remove Volume
- Reconstitute Volume
- Server Mount
- Evaluate
- Features
- Provision Storage
- Partition | FS | Mount | Brick
- Extend Volume
- Monitor IO Distribution
- Shrink Volume
- Confirm Reallocation
- Remove Bricks
- Add | Replace Bricks
- Confirm Data Transfer
- UUID Mounts
- Migrate Mounts
- Features
- Probe Storage Instances
- Provision Storage
- Extend Shared Volume
- Mount any Server
- List Storage Spread
- Dismantle Volume
- Confirm Data-Availability
- Volume Reconstruction
- Features
- Existing Bricks
- Re-Use Allocated Storage
- Define New Bricks
- Create Volume
- Generate | Monitor IO
- Fail NODEs
- Evaluate
- Features
- Explore Environment
- Create New Replica Volume
- Mount on Web Servers
- Ensure Persistence
- Update NginX Web Server Config
- Fetch Content
- Down Storage NODE | Test
- Restore NODE | Confirm Content
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5OpenPGPII Edition
Details
Release Info
GPG - OpenPGP - Provides a standard PKI Framework, supporting common Algorithms, for securing your data at-rest and in-transit.Release Syllabus
OpenPGP with GPG
- Discuss Features:
- Primary Tool
- Private | Public Keys
- Public Key Cryptography Standards (PKCS)
- Encryption | Decryption
- Signing | Verification
- Features
- General Usage
- Create Content
- Encrypt
- PassPhrase Protect
- Binary | Text Encryption
- Share
- Decrypt
- Features
- Vary Algos
- Compare Results
- Caveats
- Random PassPhrases
- Store PassPhrases
- Encrypt | Decrypt | Confirm
- Use Case
- Generate Keypairs
- Export | Import
- Share
- Sign
- URI Import
- Features
- Identify Public Keys
- Encrypt to Recipients
- Vary Key Identifcation
- Share Content
- Confirm Decryption
- Confirm Invalid Recipient
- Features
- Encryption | Decryption Distinction
- Sign | Share Content
- Confirm Signatures
- Missing Public Key
- Sign | Encrypt | Decrypt | Verify
- Encrypt | Sign | Verify | Decrypt
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5SSL-TLS Edition
Details
Release Info
Transport Layer Security (TLS) provides standards-based asymmetric and symmetric cryptographic solutions for your application needs.Release Syllabus
SSL-TLS with OpenSSL
- Discuss Features:
- Primary Tool
- Private | Public Keys
- Certificate Signing Requests (CSRs)
- Self-Signed Certificates
- Public Key Cryptography Standards (PKCS)
- Encryption | Decryption
- Random String Generation
- Message Digests
- SSL-TLS Client
- Features
- General Usage
- Retrieve Site Certificates
- Determine OCSP Configuration
- Probe supported TLS Versions
- Extract Certificate for local usage
- Retrieve Certificate with NMap
- Retrieve Certificate Chain
- Fetch Certificate
- x509 Query Fields
- Fingerprints
- One-Liner
- Export Public Key from Certificate
- Dump Public Key
- Generate Random Bytes
- Yield various Formats
- Create Random Files on Target
- Define Random $USERs
- Track defined $USERs
- Features
- Generate Digests
- Install SHA3-SUM
- Vary Content
- Compare Digests
- Remote Digests
- Store Digests
- Features
- Common Algorithms
- Generate Multiple Private Keys
- Export Public Keys
- Confirm Keys
- Remove and Re-Export Public Keys
- Generate Non-Default RSA Keys
- Password-Protected Keys
- Share PRIV_KEY and Confirm
- Features
- Base64 Encode | Decode
- AES-256 Encryption | Decryption
- Base64 Representation
- Decode | Decrypt
- Deterministic Examples
- Asymmetric Encrypts | Decrypts
- Features
- "pkeyutl" Sub-Command
- RSA Signatures
- ED(448|25519) Signatures
- RSA-PSS Signatures
- Eliptical Curve Signatures
- "-rawin" effect
- Encrypt | Sign | Verify | Decrypt
- Sign | Encrypt | Decrypt | Verify
- Discuss
- Generate Private Keys
- Generate Correlating CSRs
- Confirm Keys | CSRs
- Self-Signed Certificates
- Generate
- CA Store
- Root CA
- Various ALGOs
- Internal Domain
- SYMLINK Keys
- Password-Protected PRIV_KEY
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5$SHELL-Vars Edition
Details
Release Info
The $SHELL (all incarnations), provide a plethora of useful mechanisms that facilitate smoother and more automated operations. Core to reduced computing friction is $SHELL-Mastery.Release Syllabus
SHELL Variables
- Discuss Features
- Terminal (TTY)
- CLI Arguments
- Process ID
- Backgrounded
- SHELL Local
- Environment
- Persistence
- Aliases
- Command Substitution
- Increment | Decrement
- Dynamism