You are using an outdated browser. For a faster, safer browsing experience, upgrade for free today.

Details

Release Info

Widely considered the top Linux Distro, Ubuntu builds on Debian, and offers a mature and stable framework upon which to build your important Applications and Services. Gander not beyond Long Term Support (LTS) Releases, which are made available every ~24-months, and, offer 5-years of security updates por gratis, to appreciate why Ubuntu wins. Canonical is boss; build your offerings on Ubuntu.

Release Syllabus

Ubuntu Linux version 14x Administration
  • Features | Installation | Deployment
    • Discuss important features | attributes
    • Obtain platform images
    • Provision GUESTs on Hypervisor
    • Perform server installation
    • Clone server install
    • Effect changes to cloned instance
    • Confirm functionality of GUESTs
  •  
  • Post-Installation Exploration
    • Explain typical boot sequence
    • Discuss System V Runlevels
    • Peruse Upstart Environment
    • Identify key steps
    • Evaluate results
  •  
  • Basic Linux | Unix Commands
    • ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami
    • alias, cat, file, chmod, chown, history, dd, blkid, lspci
    • STDIN | STDOUT, UNIX Pipes, Redirection, Command Chaining
    • ps, df, top, pagers
    • head, tail, which, w, who, sudo, su, wall
    • tar, gzip, bzip2
  •  
  • Common Tools | Files
    • Discuss various relevant client utilities
    • Networking: ping, netstat, mtr, telnet
    • File Retrieval: Use WGET | Curl | LFTP to retrieve content
    • Name Resolvers: host, nslookup, dig, /etc/hosts
    • Checksum various content
    • Explore Time Administration
    • Replace 'ntpd' with 'chronyd'
    • Discuss applicability
  •  
  •  
  • LSOF
    • Use 'lsof' to expose file | socket usage
    • Use lsof to identify various resources
    • Discuss general usage | applicability
  •  
  • Secure Shell (SSH)
    • Introduce default implementation
    • Discuss TTY assignments
    • Generate SSH PKI Usage Keys
    • Migrate to PKI (Passwordless) AUTH
    • Non-interactively transport content with SCP
    • Interactively move content with SFTP
    • Discuss enhanced 'root' configuration
    • Ensure consistent PKI deployment
  •  
  • Screen | Perpetual TTYs
    • Discuss caveats of default $SHELL access
    • Spawn 'screen' instances
    • Navigate 'screen' instances
    • Detatch | Re-attach | Share 'screen' resources
    • Spawn | Terminate 'screen' instances as desired
  •  
  • File Permissions | User Management
    • Explain standard Linux (DAC) permissions
    • Alter permissions as needed
    • Test access to content
    • Discuss Symbolic Links
    • Implement Soft | Hard Links
    • Examine behavior
  •  
  • User | Group Management
    • Identify GUI | $SHELL User Management tools
    • Explore: /etc/{passwd,shadow,group}
    • Provision users | groups as needed
    • Test functionality
    • Modify accounts | groups as desired
    • Confirm configuration
  •  
  • Storage Management
    • Explore current storage configuration
    • Provision additional storage as needed
    • Mount | Test | Committ to: /etc/fstab
    • Identify current SWAP environment
    • Allocate SWAP as needed
    • Enable | Committ to: /etc/fstab
    • Logical Volume Management (LVM)
    • Identify default configuration
    • Provision LVM-dedicated storage
    • Configure: PVs | VGs | LVs
    • Extend storage as needed
    • Reduce VG as needed
    • Evaluate results
  •  
  • Package Management
    • Identify key 'dpkg' | 'apt-get' | 'aptitude' features
    • Enumerate stock package-set
    • Update current packages
    • Install and confirm packages as desired
  •  
  •  
  • SYSLOG Configuration
    • Explore default configuration
    • Discuss Syslog Rules
    • Except facilities from catchall: /var/log/syslog
    • Explore key logs
  •  
  • Cron Scheduler
    • Explore default configuration
    • Discuss scheduling parameters
    • Write simple $SHELL script
    • Schedule execution via Cron
    • Alter schedule as desired
    • Confirm expected behavior
  •  
  • IP Administration
    • Expose Installed configuration
    • Identify available tools | configuration
    • Create interface aliases (sub-interfaces)
    • Test communications | Ensure persistence
    • Add IP ROUTE to access remote subnet
    • Test routing
    • Confirm persistence
  •  
  • DNS | DHCPD Implementation
    • Discuss features and benefits
    • Implement DNS Caching-Only services
    • Explore default configuration
    • Resolve recursively as needed
    • Setup Primary DNS zone
    • Replicate to Secondary DNS server
    • Alter zone | Test replication
    • Implement DHCP Server
    • Dedicate VLAN | Test address assignment
  •  
  • Apache HTTPD Server
    • Identify key Apache features
    • Explore default environment
    • Examine Apache logs configuration
    • Provision IP-based Virtual Hosts
    • Provision Name-based Virtual Hosts
    • Ensure distinct logs
    • Test Virtual Host connectivity
    • Implement Apache SSL
  •  
  • Apache SSL Configuration
    • Identify key Files and Tools
    • Invoke default SSL configuration and evaluate
    • Generate certificates for default instance
    • Generate certs for virtual hosts and apply
    • Test secure connectivity
  •  
  • Network Reconnaissance
    • Install NMap
    • Explore footprint
    • Perform local reconnaissance
    • Quickly identify available subnet-based nodes
    • Comprehensive scan of select targets
    • Examine log and identify weakspots
    • Evaluate results
  •  
  • Packet Capturing
    • Explore 'tcpdump' basics
    • Capture wide variety of packets
    • Use BPFs to reduce captured data
    • Replay captures with 'tcpdump'
    • Parse with BPFs as desired
    • Parse captures with WireShark
  •  
  • Rescue /boot
    • Unable to update key packages
    • Kernel | INITRD | etc.
    • Provision new Block Storage
    • Enter Single-User Mode
    • Synch /boot content
    • Confirm all is well
  •  

Tokyo Time

16:9

Rate

1.25x

Watched

1

Completed

1 of 5