You are using an outdated browser. For a faster, safer browsing experience, upgrade for free today.

Details

Release Info

Look no further than MacOSX. It thrives because of BSD Unix. As does: iOS. So, that device you're likely holding is powered by BSD Unix. Light and Fast are irrefutable hallmarks of BSD Unix. It is embedded in so many applications that it is a must-know in your OS | Distro toolbox. Certainly Linux is supreme on many fronts, but, BSD is a mighty contender.

Release Syllabus

FreeBSD Unix Version 8x
  • Installation
    • Explore features of FreeBSD
    • Perform standard installation
    • Execute custom installation
    • Install with multiple disks
    • Commence FTP, network-based installation
    • Explore nuances and caveats
    • Evaluate results
  •  
  • Post-Installation Initialization and Exploration
    • Configure X
    • Install and configure GNOME Desktop
    • Explore the boot process
    • Demonstrate usage of the following useful commands & concepts
      • Install BASH $SHELL
      • ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami
      • alias, cat, file, chmod, chown, history
      • Standard in/out, UNIX Pipes, Redirection, Command Chaining
      • ps, df, top, kill
      • less & more, head & tail, find, which & whereis, w, who
      • tar, gzip, bzip2, zip
      • checksums
      • Tweak run-time kernel parameters with 'sysctl'
      • Use 'screen' to maintain persistent TTYs
      • Explore user management tools
      • Peruse Unix permissions
      • Implement symbolic links
  •  
  • Storage Management
    • Migrate file system to new file system
    • Appropriate SWAP as needed
    • Configure CCD storage manager with RAID
    • Explore GVinum storage manager
    • Take file system snapshots
    • Implement quotas
    • Evaluate results
  •  
  • Kernel Compilation
    • Discuss applicability
    • Explore kernel environment
    • Compile new kernel with desired features
    • Retain original kernel
    • Evaluate results
  •  
  • Log Management
    • Peruse model
    • Configure Syslog
    • Capture logs from remote sources
    • Rotate logs
    • Evaluate results
  •  
  • Cron Scheduler
    • Explore defaults
    • Define and schedule tasks
    • Monitor behavior
    • Alter configuration accordingly
    • Pinpoint nuances and caveats
    • Evaluate results
  •  
  • Common Network Tools
    • PING
    • TELNET
    • NETSTAT
    • DIG
    • NSLOOKUP
    • HOST
    • WHOIS
  •  
  •  
  • Core Network Services & Configuration | BSD Service | Daemon Management
    • Peruse model
    • Contrast with System V
    • Explore defaults
    • Tweak configuration
    • Enable | Disable Services as needed
    • Evaluate results
  •  
  • Sysctl
    • Explore run-time kernel directives
    • Identify key configuration files
    • Alter directives to improve performance
    • Ensure persistence
    • Evaluate results
  •  
  • IPv[4|6] Configuration
    • Identify key files and tools
    • Explore initial configuration
    • Alter configuration to reflect current events
    • Evaluate results
  •  
  • Package Management
    • Discuss model
    • Explore Ports
    • Install various packages from source using Ports
    • Update Ports collection
    • Install pre-compiled, binary packages
    • Compare and contrast approaches
    • Evaluate results
  •  
  • Commonly-used Network Utilities
    • Discuss and explore critical network client utilities
    • LFTP
    • CURL
    • Wget
    • RSYNC
  •  
  • Network Time Protocol (NTP) Client/Server
    • Discuss features and benefits
    • Explore configuration
    • Configure Network Time Protocol (NTP) to perform client/server time synchronization
    • Perform one-off synchronizations
    • Evaluate results
  •  
  • INETD - TELNETD | TFTPD | FTPD
    • Discuss features and benefits
    • Enable TELNETD daemon
    • Use for terminal emulation
    • Enable TFTPD daemon
    • Use for quick file transfers
    • Implement FTP Server
    • Evaluate FTP client access
    • Evaluate results
  •  
  • BIND DNS
    • Implement BIND
    • Explore caching-only configuration
    • Resolve upstream hosts via caching-only instance
    • Implement primary DNS server
    • Configure secondary zone services
    • Synchronize content with remote BIND host
    • Setup reverse DNS
    • Apply to IPv[4|6] accordingly
    • Evaluate resuls
  •  
  •  
  • Dynamic Host Configuration Protocol (DHCP) services
    • Explain the various steps of the DHCP process
    • Configure global & scope-level DHCP options
    • Configure IP reservations based on layer 2 MAC addresses
    • Enable DHCP services
    • Evaluate client access
  •  
  • SAMBA
    • Discuss features and benefits
    • Install and configure
    • Implement SWAT
    • Evaluate disparate client access
    • Ensure persistent configuration
    • Evaluate results
  •  
  • NFS
    • Discuss features and benefits
    • Implement exports
    • Attach remotely
    • Configure persistence
    • Evaluate results
  •  
  • Application Services - Unix|Apache|MySQL|PHP (UAMP) - Web Application Services
    • Implement Apache Web Server
    • Examine httpd.conf file directives
    • Implement virtual directories using Apache and symbollic links
    • Implement Redirects using Locate and various Apache directives
    • Configure virtual hosts bound to the primary IP address and port
    • Configure virtual hosts bound to alternate virtual IP addresses and ports
    • Implement Apache logging system per virtual host
  •  
  • MySQL Relational Database Management System
    • Install MySQL Relational Database Management System
    • Secure access to MySQL
    • Explore MySQL Terminal Monitor Client
    • Create sample MySQL database
    • Install PHPMyAdmin for web-based management of MySQL instances
    • Explain & Secure access to PHPMyAdmin
    • Explore PHPMyAdmin's interface
  •  
  • PHP Implementation
    • Discuss features and benefits
    • Write scripts to enumerate useful PHP | Apache data
    • Integrate PHP with MySQL
    • Evaluate results
  •  
  • Postfix MTA
    • Install Postfix MTA
    • Introduction to Postfix Message Transfer Agent (MTA)
    • Use Mutt to demonstrate outbound mail handling using Postfix
    • Explore Postfix Configuration
  •  
  • Post Office Protocol Version 3 (POP3)
    • Explain POP3 concepts and applications
    • Implement POP3 daemon
    • Connect to POP3 daemon using Windows client
    • Use Mutt to send SMTP-based messages to POP3 account
  •  
  • Internet Messaging Access Protocol (IMAP)
    • Explain IMAP concepts and applications in comparison to POP3
    • Implement IMAP services
    • Connect to IMAP services from remote Windows client
  •  
  •  
  • Security Implementation Techniques - GNU Privacy Guard (GPG)
    • Discuss features and benefits
    • Use GPG to secure communications
    • Generate usage keys
    • Exchange keys and encrypted data with remote user
    • Evaluate Results
  •  
  • Secure Shell (SSH) Usage
    • Discuss features and benefits
    • Identify key SSH clients
    • Use SSH clients accordingly to secure communications
    • Explore SSH server configuration
    • Evaluate Results
  •  
  • Network Mapper (NMAP)
    • Install current version of NMAP
    • Identify commonly used NMAP options/switches/parameters
    • Perform default TCP SYN-based ethical scans of local and remote resources
    • Explain typical TCP handshake protocol while using NMAP
    • Perform default TCP Connect-based ethical scans of local and remote resources
    • Peform local ethical scans
    • Identifiy key NMAP configuration files
    • Use NMAP to perform operating system fingerprinting and versioning
    • Peform subnet-wide ethical scans
  •  
  • System Lockdown
    • Discuss typical company policy
    • Identify superfluous services | daemons
    • Execute lockdown accordingly
    • Generate security baseline with NMap
    • Ensure lockdown persistence
    • Evaluate results
  •  
  • TCPDump
    • Explain features and benefits
    • Capture myriad traffic
    • Archive traffic for post-mortem analyses
    • Apply BPFs as needed
    • Evaluate results
  •  
  • WireShark - Packet Capture and Analysis Tool
    • Discuss features and benefits
    • Explore interface
    • Capture arbitrary packets and examine
    • Peruse tcpdump captures
    • Archive interesting packet streams
    • Evaluate results
  •  
  • Packet Filter (PF) Firewall
    • Discuss features and benefits
    • Intro to PF concepts and structure
    • Define PF firewall rules based on lockdown policy
    • Enable PF logging and peruse captures
    • Ensure persistence
    • Evaluate results
  •  

Tokyo Time

16:9

Rate

1.25x

Watched

1

Completed

1 of 5