Red Hat Linux Network Security Training
Series
KeyStone's Red Hat 7 course
will give you the administration skills and knowlege you need to complete
the RHCE (Red Hat Certified Engineer) training program. This course is
the best way to prepare yourself for the RHCE exam.
About Trainer
Nicholas D. Wells has an
MBA and 18 years of experience in the software industry. He has authored
and contributed to numerous books related to Linux training.
Networking and Security Level
1
-
1.0 Networking on Linux
-
1.1 Understanding Linux Networking
-
1.2 A Few Key Protocols
-
1.3 Using Command Line Tools
to
-
1.4 Configure Networking
-
1.5 Using LinuxConf to configure
-
1.6 Networking
-
1.7 Ethernet and Dial Up Networking
-
1.8 The Network Card, the interface,
and the route
-
2.0 Troubleshooting Networking
-
2.1 Using the Ping Command
-
2.2 Checking Ifconfig and route
-
3.0 Dial-up Networking
-
3.1 Protocols
-
3.2 Working with an ISP
-
4.0 DHCP
-
4.1 Configuring the DHCP Server
-
4.2 The DHCP Client
-
5.0 Introducing Domain Name
Service-DNS
-
5.1 Subdomains and Zones
-
5.2 Configuring the Client
Side of DNS
-
6.0 Server-side DNS
-
6.1 Configuring DNS Server
-
6.2 PTR Record
-
6.3 Utilities
-
7.0 Network Information Service
-
7.1 Understanding the Purpose
of NIS/NFS
-
7.2 The YP Command
-
7.3 The R Commands
Networking and Security Level
2
-
1.0 Introducing Samba
-
1.1 Purpose and Background
of Samba
-
1.2 Installing the Packages
-
1.3 Setting up Core Configuration
Options
-
1.4 Setting up Shares
-
1.5 Security and Password Issues
-
1.6 Client Testing
-
1.7 Setting up the smb.conf
configuration file
-
1.8 The Print Tool
-
2.0 The LDAP Directory Protocol
-
2.1 Understanding LDAP
-
2.2 Setting up an LDAP Server
-
3.0 Understanding E-mail on
Linux
-
3.1 Security Considerations
and Transfer Agents
-
4.0 Basic Sendmail Configuration
-
4.1 Overview of Configuration
Files
-
4.2 Using e-mail Aliases
-
4.3 Linux Conf
-
5.0 Using the Procmail Delivery
Agent
-
5.1 Understanding the Purpose
of Procmail
-
5.2 Setting up Procmail recipes
-
6.0 Mail Relay Agents: POP
and IMAP
-
6.1 Using POP and IMAP
Networking and Security Level
3
-
1.0 Basic Apache Web Server
Configuration
-
1.1 Features of Apache
-
1.2 Packages
-
2.0 Httpd.conf
-
2.1 Httpd.conf
-
3.0 Server Resource Management
-
3.1 Srm.conf
-
4.0 Access.conf
-
4.1 Access.conf
-
5.0 Advanced Features of Apache
-
5.1 Virtual Hosting, Server-side
Includes, and CGI
-
6.0 Apache Modules
-
6.1 Locating Modules (Free
and Commercial)
Networking and Security Level
4
-
1.0 Security Basics
-
1.1 Reasons for Security-Protection
from disaster, malice and accident
-
1.2 Physical, User, and Network
Security
-
1.3 Defining some Security-related
terms
-
1.4 Cryptography-algorithms/symmetric
and asymmetric
-
2.0 Physical Security
-
2.1 Hard Drive Removal, Booting
form Floppy and BIOS Passwords
-
2.2 LILO Prompt run Levels
and Passwords
-
2.3 Using the Sticky Bit
-
2.4 Session Security
-
3.0 User Security
-
3.1 Reviewing File System Permissions
-
3.2 Monitoring Login Attempts
-
3.3 Dangling Files from deleted
Users
-
3.4 Securetty and Nologin files
-
3.5 Using File Attributes
-
3.6 Using Su and Sudo
-
4.0 Passwords
-
4.1 The Passwd and Shadow Files
-
4.2 MD5 and authconfig
-
4.3 Pwconv and related Utilities
-
4.4 Cracklib and the Linux.words
Library
-
5.0 Pluggable Authentication
Modules
-
5.1 Defining PAM and PAM Clients
-
5.2 Reviewing the Directories
/lib/security and /etc/pam.d and /etc/security
-
5.3 The access.conf and time.conf
files
-
6.0 Public Private Key Systems
-
6.1 Understanding the Key Exchange
-
7.0 Controlling User Access
to Resources
-
7.1 Clobberd and Clobberedit
-
7.2 Limits
-
7.3 Process Accounting
-
8.0 Network Security
-
8.1 Inetd
Networking and Security Level
5
-
1.0 TCP Wrappers
-
1.1 Host Allow and Host Deny
-
1.2 Host Options
-
1.3 tcpdchk and tcpdmatch
-
1.4 identd
-
1.5 Plaintext Network Services
-
1.6 SAINT and Nessus
-
2.0 Network Routing
-
2.1 Understanding Network Traffic
(drop v forward)
-
2.2 Enabling IP Forwarding
-
2.3 Understanding Dynamic Routing
-
2.4 The Traceroute Command
-
2.5 Optimizing the Kernel for
Routing
-
3.0 Advanced Routing Techniques
-
3.1 Three advanced routing
techniques
-
3.2 Using a Traditional Proxy
Server with Client Configuration
-
3.3 Using a Transparent Proxy
with Port Forwarding
-
3.4 Using network Address Translation/IP
Masquerading
-
3.5 Red Hat’s Piranah Virtual
Server
-
3.6 Portscanners, Sniffers,
TCPdump and Ethereal
-
3.7 IPTraf Interface
-
4.0 Display Security
-
4.1 Xhost for Host-based Security
-
4.2 Xauth for more Precise
Security
-
5.0 The Secure Shell (SSH)
-
5.1 Defining the Importance
of SSH
-
5.2 Generating Keys
-
5.3 Authentication Layers
-
5.4 Using SSH and SCP
-
5.5 Tunneling Other Protocols
Over SSH
-
6.0 Firewalls and IP Chains
-
6.1 Understanding Firewalls
and IP Chains
-
6.2 Setting default Policies
-
6.3 Setting Up IP Masquerading
-
6.4 Adding Rules
-
6.5 Additional Resources
Regular price: $569.95
Sale
price: $469.95
Click here for Secure
Yahoo Order: Red
Hat Linux Network Security Training Series
Unix, Linux, Red Hat
Computer Based Training CD Roms, Videos