Bezpieczeństwo IT

Administracja serwerami Linux oraz BSD

RH 253 - Red Hat Linux Networking and Security Administration

Przeprowadzenie autoryzowanego szkolenia RH253

Szkolenie przeprowadzone zostało dla firmy B2B Sp. z o.o. będącej Certyfikowanym Ośrodkiem Edukacyjnym firmy Red Hat  (http://bel.pl/pl/szkolenia/sciezka-rhce/rh253) :

  1. System Performance and Security
    1. Concepts and Practices
    2. System Faults and Breaches
    3. Method of Fault Analysis
    4. Benefits of System Monitoring
    5. Managing Processes by Account
    6. Lab: System Monitoring
  2. System Service Access Controls
    1. Service and Network Access Controls
    2. System Initialization and Service Management
    3. Service and Application Access Controls
    4. tcp_wrappers Configuration
    5. Security Enhanced Linux (SELinux)
    6. Lab: Controlling access to certain hosts
  3. Network Resource Access Controls
    1. Internet Protocol and Routing
    2. IPv6: Dynamic Interface Configuration
    3. IPv6: StaticInterface Configuration
    4. IPv6: Routing Configuration
    5. Netfilter Overview
    6. Rules: General Considerations
    7. Connection Tracking
    8. Network Address Translation (NAT)
    9. IPv6 and ip6tables
    10. Lab: Securing Networking
  4. Organizing Networked Systems
    1. Host Name Resolution
    2. DNS-Specific Resolvers
    3. Trace a DNS Query with dig
    4. Exploring DNS with host
    5. Service Profile: DNS
    6. Getting Started with BIND
    7. bind-chroot Package
    8. caching-nameserver Package
    9. Remote Name Daemon Control (rndc)
    10. The DHCP Service
    11. DHCP Overview
    12. Configuring an IPv4 DHCP Server
    13. Lab: Implement a Minimal DNS Server
  5. Network File Sharing Services
    1. File Transfer Protocol (FTP)
    2. Network File Service (NFS)
    3. Port options for the Firewall
    4. Samba services
    5. Configuring Samba
    6. Lab: Network File Sharing Services
  6. Web Services
    1. Apache Overview
    2. Apache Server Configuration
    3. Virtual Hosts
    4. Apache Access Configuration
    5. CGI
    6. Apache Encrypted Web Server
    7. Squid Web Proxy Cache
    8. Lab: Implementing Web (HTTP) Services
  7. Electronic Mail Services
    1. Essential Email Operation
    2. Simple Mail Transport Protocol
    3. Sendmail SMTP Restrictions
    4. Sendmail Operation
    5. Using alternatives to Switch MTAs
    6. Postfix Configuration
    7. Postfix SMTP Restrictions
    8. Postfix Operation
    9. Mail Retrieval Protocols
    10. Lab: Electronic Mail
  8. Securing Data
    1. The Need For Encryption
    2. Symmetric Encryption
    3. Asymmetric Encryption
    4. Public Key Infrastructures
    5. Digital Certificates
    6. Lab: Securing Data
  9. Account Management
    1. Account Management
    2. Account Information (Name Service)
    3. Name Service Switch (NSS)
    4. Pluggable Authentication Modules (PAM)
    5. PAM Operation
    6. Utilities and Authentication
    7. Lab: Account Management Methods
« Powrót
Linux daje

swobodę wyboru i nie ogranicza do rozwiązań jednego producenta.

Grupa Emerge: Emerge Studio Emerge Systems Do góry Mapa witryny

tel.: + 48 791 611 309 | email: systems@emerge.pl © 2012 Emerge Systems - bezpieczeństwo IT. Wszelkie prawa zastrzeżone.