LinuxCBT.com

Syllabus

Focus: FreeBSD Unix Version 8x

Duration: 40-Hours

    • Installation
      • Explore features of FreeBSD
      • Perform standard installation
      • Execute custom installation
      • Install with multiple disks
      • Commence FTP, network-based installation
      • Explore nuances and caveats
      • Evaluate results
    •  
    • Post-Installation Initialization and Exploration
      • Configure X
      • Install and configure GNOME Desktop
      • Explore the boot process
      • Demonstrate usage of the following useful commands & concepts
        • Install BASH $SHELL
        • ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami
        • alias, cat, file, chmod, chown, history
        • Standard in/out, UNIX Pipes, Redirection, Command Chaining
        • ps, df, top, kill
        • less & more, head & tail, find, which & whereis, w, who
        • tar, gzip, bzip2, zip
        • checksums
        • Tweak run-time kernel parameters with 'sysctl'
        • Use 'screen' to maintain persistent TTYs
        • Explore user management tools
        • Peruse Unix permissions
        • Implement symbolic links
    •  
    • Storage Management
      • Migrate file system to new file system
      • Appropriate SWAP as needed
      • Configure CCD storage manager with RAID
      • Explore GVinum storage manager
      • Take file system snapshots
      • Implement quotas
      • Evaluate results
    •  
    • Kernel Compilation
      • Discuss applicability
      • Explore kernel environment
      • Compile new kernel with desired features
      • Retain original kernel
      • Evaluate results
    •  
    • Log Management
      • Peruse model
      • Configure Syslog
      • Capture logs from remote sources
      • Rotate logs
      • Evaluate results
    •  
    • Cron Scheduler
      • Explore defaults
      • Define and schedule tasks
      • Monitor behavior
      • Alter configuration accordingly
      • Pinpoint nuances and caveats
      • Evaluate results
    •  
    • Common Network Tools
      • PING
      • TELNET
      • NETSTAT
      • DIG
      • NSLOOKUP
      • HOST
      • WHOIS
    •  
    •  
    • Core Network Services & Configuration | BSD Service | Daemon Management
      • Peruse model
      • Contrast with System V
      • Explore defaults
      • Tweak configuration
      • Enable | Disable Services as needed
      • Evaluate results
    •  
    • Sysctl
      • Explore run-time kernel directives
      • Identify key configuration files
      • Alter directives to improve performance
      • Ensure persistence
      • Evaluate results
    •  
    • IPv[4|6] Configuration
      • Identify key files and tools
      • Explore initial configuration
      • Alter configuration to reflect current events
      • Evaluate results
    •  
    • Package Management
      • Discuss model
      • Explore Ports
      • Install various packages from source using Ports
      • Update Ports collection
      • Install pre-compiled, binary packages
      • Compare and contrast approaches
      • Evaluate results
    •  
    • Commonly-used Network Utilities
      • Discuss and explore critical network client utilities
      • LFTP
      • CURL
      • Wget
      • RSYNC
    •  
    • Network Time Protocol (NTP) Client/Server
      • Discuss features and benefits
      • Explore configuration
      • Configure Network Time Protocol (NTP) to perform client/server time synchronization
      • Perform one-off synchronizations
      • Evaluate results
    •  
    • INETD - TELNETD | TFTPD | FTPD
      • Discuss features and benefits
      • Enable TELNETD daemon
      • Use for terminal emulation
      • Enable TFTPD daemon
      • Use for quick file transfers
      • Implement FTP Server
      • Evaluate FTP client access
      • Evaluate results
    •  
    • BIND DNS
      • Implement BIND
      • Explore caching-only configuration
      • Resolve upstream hosts via caching-only instance
      • Implement primary DNS server
      • Configure secondary zone services
      • Synchronize content with remote BIND host
      • Setup reverse DNS
      • Apply to IPv[4|6] accordingly
      • Evaluate resuls
    •  
    •  
    • Dynamic Host Configuration Protocol (DHCP) services
      • Explain the various steps of the DHCP process
      • Configure global & scope-level DHCP options
      • Configure IP reservations based on layer 2 MAC addresses
      • Enable DHCP services
      • Evaluate client access
    •  
    • SAMBA
      • Discuss features and benefits
      • Install and configure
      • Implement SWAT
      • Evaluate disparate client access
      • Ensure persistent configuration
      • Evaluate results
    •  
    • NFS
      • Discuss features and benefits
      • Implement exports
      • Attach remotely
      • Configure persistence
      • Evaluate results
    •  
    • Application Services - Unix|Apache|MySQL|PHP (UAMP) - Web Application Services
      • Implement Apache Web Server
      • Examine httpd.conf file directives
      • Implement virtual directories using Apache and symbollic links
      • Implement Redirects using Locate and various Apache directives
      • Configure virtual hosts bound to the primary IP address and port
      • Configure virtual hosts bound to alternate virtual IP addresses and ports
      • Implement Apache logging system per virtual host
    •  
    • MySQL Relational Database Management System
      • Install MySQL Relational Database Management System
      • Secure access to MySQL
      • Explore MySQL Terminal Monitor Client
      • Create sample MySQL database
      • Install PHPMyAdmin for web-based management of MySQL instances
      • Explain & Secure access to PHPMyAdmin
      • Explore PHPMyAdmin's interface
    •  
    • PHP Implementation
      • Discuss features and benefits
      • Write scripts to enumerate useful PHP | Apache data
      • Integrate PHP with MySQL
      • Evaluate results
    •  
    • Postfix MTA
      • Install Postfix MTA
      • Introduction to Postfix Message Transfer Agent (MTA)
      • Use Mutt to demonstrate outbound mail handling using Postfix
      • Explore Postfix Configuration
    •  
    • Post Office Protocol Version 3 (POP3)
      • Explain POP3 concepts and applications
      • Implement POP3 daemon
      • Connect to POP3 daemon using Windows client
      • Use Mutt to send SMTP-based messages to POP3 account
    •  
    • Internet Messaging Access Protocol (IMAP)
      • Explain IMAP concepts and applications in comparison to POP3
      • Implement IMAP services
      • Connect to IMAP services from remote Windows client
    •  
    •  
    • Security Implementation Techniques - GNU Privacy Guard (GPG)
      • Discuss features and benefits
      • Use GPG to secure communications
      • Generate usage keys
      • Exchange keys and encrypted data with remote user
      • Evaluate Results
    •  
    • Secure Shell (SSH) Usage
      • Discuss features and benefits
      • Identify key SSH clients
      • Use SSH clients accordingly to secure communications
      • Explore SSH server configuration
      • Evaluate Results
    •  
    • Network¬†Mapper (NMAP)
      • Install current version of NMAP
      • Identify commonly used NMAP options/switches/parameters
      • Perform default TCP SYN-based ethical scans of local and remote resources
      • Explain typical TCP handshake protocol while using NMAP
      • Perform default TCP Connect-based ethical scans of local and remote resources
      • Peform local ethical scans
      • Identifiy key NMAP configuration files
      • Use NMAP to perform operating system fingerprinting and versioning
      • Peform subnet-wide ethical scans
    •  
    • System Lockdown
      • Discuss typical company policy
      • Identify superfluous services | daemons
      • Execute lockdown accordingly
      • Generate security baseline with NMap
      • Ensure lockdown persistence
      • Evaluate results
    •  
    • TCPDump
      • Explain features and benefits
      • Capture myriad traffic
      • Archive traffic for post-mortem analyses
      • Apply BPFs as needed
      • Evaluate results
    •  
    • WireShark - Packet Capture and Analysis Tool
      • Discuss features and benefits
      • Explore interface
      • Capture arbitrary packets and examine
      • Peruse tcpdump captures
      • Archive interesting packet streams
      • Evaluate results
    •  
    • Packet Filter (PF) Firewall
      • Discuss features and benefits
      • Intro to PF concepts and structure
      • Define PF firewall rules based on lockdown policy
      • Enable PF logging and peruse captures
      • Ensure persistence
      • Evaluate results
    •  

UnixCBT BSD8x Edition

  •  
DEMO