Tuesday, May 24, 2011 | By: Dalia

RH253 Red Hat Networking & Security Administration Content

RH253 Red Hat Networking & Security Administration

UNIT 1 – Introduction to System Services
clip_image001
   Objectives
clip_image001[1]   Agenda
clip_image001[2]   Service Management
clip_image001[3]   Services Managed by init
clip_image001[4]   System V service Management
clip_image001[5]   Chkconfig
clip_image001[6]   Xinetd managed Series
clip_image001[7]   The xinetd Daemon
clip_image001[8]   The/etc/sysconfig/ files
clip_image001[9]   Fault Analysis
clip_image001[10]   End of Unit 1
clip_image001[11]   Lab: Introduction to System Services

UNIT 2 – Organizing Network Systems
clip_image001[12]
   Objectives
clip_image001[13]   Agenda
clip_image001[14]   Domain Name SystemDNS
clip_image001[15]   Zones, Domains & Delegation
clip_image001[16]   Name Server Hierarchy
clip_image001[17]   The DNS Server
clip_image001[18]   Berkeley Internet Name Domain (BIND)
clip_image001[19]   Service Profile: DNS
clip_image001[20]   Configuring BIND
clip_image001[21]   Global Options
clip_image001[22]   Address Match Lists and ac1
clip_image001[23]   Rndc
clip_image001[24]   Master and Slave Zones
clip_image001[25]   Reverse Lookup Zones
clip_image001[26]   Special Zones
clip_image001[27]   Zone Files
clip_image001[28]   Resource Records (RR)
clip_image001[29]   SOA (Start of Authority)
clip_image001[30]   NS (Name Server)
clip_image001[31]   Main Record Types
clip_image001[32]   Example Zone File
clip_image001[33]   Round Robin Load Sharing through DNS
clip_image001[34]   Delegating Subdomains
clip_image001[35]   BIND Syntax Utilities
clip_image001[36]   Caching-only Name Server
clip_image001[37]   BIND Utilities
clip_image001[38]   Advanced BIND Features
clip_image001[39]   DHCP Overview
clip_image001[40]   Service Profile: DHCP
clip_image001[41]   Configuring a DHCP Server
clip_image001[42]   End of Unit 2
clip_image001[43]   Lab: Organizing Networked Systems

UNIT 3 – Network File Sharing Services
clip_image001[44]
   Objectives
clip_image001[45]   Agenda
clip_image001[46]   NFS File Service (NFS)
clip_image001[47]   SFS Server
clip_image001[48]   Client-side NFS
clip_image001[49]   FTP
clip_image001[50]   Service Profile: FTP
clip_image001[51]   Samba Services
clip_image001[52]   Samba Daemons
clip_image001[53]   Service Profile: SMB
clip_image001[54]   Configuring Samba
clip_image001[55]   Overview of smb.conf Sections
clip_image001[56]   Configuraring File and Directory Sharing
clip_image001[57]   Printing to the Samba Server
clip_image001[58]   Authentication Methods
clip_image001[59]   Passwords
clip_image001[60]   Samba Client Tools: smbclient
clip_image001[61]   Nmblookup
clip_image001[62]   Smbmount
clip_image001[63]   Samba mouts in /etc/fstab
clip_image001[64]   End of Unit 3
clip_image001[65]   Lab: Network File Sharing Services

UNIT 4 – Electronic Mail Services
clip_image001[66]
   Objectives
clip_image001[67]   Agenda
clip_image001[68]   Sendmail Features
clip_image001[69]   Security and “Anti-Spam” Features
clip_image001[70]   An Email Review
clip_image001[71]   Server Operations
clip_image001[72]   Service Profile: Sendmail
clip_image001[73]   Main Configuration Files
clip_image001[74]   Other Configuration Files
clip_image001[75]   Sendmail Configuration with the m4 Macro Language
clip_image001[76]   Sendmail m4 Macro File: Introduction
clip_image001[77]   Sendmail m4 Macro File: Features
clip_image001[78]   Sendmail Client Configuration
clip_image001[79]   Other Valuable m4 directives
clip_image001[80]   Additional Sendmail Configuration Files
clip_image001[81]   /etc/mail/virtusertable
clip_image001[82]   /etc/mail/access
clip_image001[83]   Blacklisting Recipients
clip_image001[84]   Debugging Sendmail
clip_image001[85]   Using alternatives
clip_image001[86]   Postfix
clip_image001[87]   Service Profile:Postfix
clip_image001[88]   Configuring postfix
clip_image001[89]   Additional Postfix Configuration
clip_image001[90]   Enhanced Postfix Configuration
clip_image001[91]   Procmail Delivery
clip_image001[92]   Procmail sample Configuration
clip_image001[93]   End of Unit 4
clip_image001[94]   Lab: Electronic Mail Services

UNIT 5 – The HTTP Service
clip_image001[95]
   Objectives
clip_image001[96]   Agenda
clip_image001[97]   Apache Overview
clip_image001[98]   Service Profile:HTTPD
clip_image001[99]   Apache Configuration
clip_image001[100]   Apache Server Configuration
clip_image001[101]   Virtual Hosts
clip_image001[102]   Apache Namespace Configuration
clip_image001[103]   Apache Access Configuration
clip_image001[104]   Using .htaccess Files
clip_image001[105]   CGI
clip_image001[106]   Notable Apache Modules
clip_image001[107]   Apache Encrypted Web Server
clip_image001[108]   Squid Web Proxy Cache
clip_image001[109]   Service Profile: Squid
clip_image001[110]   End of Unit 5
clip_image001[111]   Lab: The HTTP Service

UNIT 6 – Security Concerns and Policy
clip_image001[112]
   Objectives
clip_image001[113]   Agenda
clip_image001[114]   Definition of Security
clip_image001[115]   Attacks from the Network
clip_image001[116]   Principles of Security
clip_image001[117]   Security Practices
clip_image001[118]   Diagnostic Utilities
clip_image001[119]   Which Services Are Running?
clip_image001[120]   Remote service Detecting
clip_image001[121]   Isolate Vulnerabilities
clip_image001[122]   Security Policy: the System
clip_image001[123]   Security Policy: the People
clip_image001[124]   Response Strategies
clip_image001[125]   Additional Resources
clip_image001[126]   End of Unit 7
clip_image001[127]   Lab: Security Concerns and Policy

UNIT 7 – Authentication Services
clip_image001[128]
   Objectives
clip_image001[129]   Agenda
clip_image001[130]   Authentication Basics
clip_image001[131]   Service Profile: PAM
clip_image001[132]   PAM Operation
clip_image001[133]   /etc/pam.d/system-auth
clip_image001[134]   Core PAM Modules
clip_image001[135]   Authentication Modules
clip_image001[136]   Miscellaneous PAM Modules
clip_image001[137]   Password Security
clip_image001[138]   Password Policy
clip_image001[139]   Resource Limits
clip_image001[140]   User Access Control
clip_image001[141]   Single User Mode
clip_image001[142]   Sudo
clip_image001[143]   Authentication Troubleshooting
clip_image001[144]   NIS Overview
clip_image001[145]   Service Profile: NIS
clip_image001[146]   NIS Server Topology
clip_image001[147]   Configuring an NIS Server
clip_image001[148]   NIS Client Configuration
clip_image001[149]   NIS Troubleshooting
clip_image001[150]   End of Unit 8
clip_image001[151]   Lab: Authentication Services

UNIT 8 – System Monitoring
clip_image001[152]
   Objectives
clip_image001[153]   Agenda
clip_image001[154]   Introduction to System Monitoring
clip_image001[155]   File System Analysis
clip_image001[156]   Set User and Ground ID Permissions
clip_image001[157]   Typical Problematic Permissions
clip_image001[158]   EXT2 Filesystem Attributes
clip_image001[159]   System Log Files
clip_image001[160]   Syslogd and klogd configuration
clip_image001[161]   Advanced syslogd configuration
clip_image001[162]   Log File Analysis
clip_image001[163]   Monitoring and Limiting Processes
clip_image001[164]   Processes Monitoring Utilities
clip_image001[165]   System Activity Reporting
clip_image001[166]   Process Accounting Tools
clip_image001[167]   End of Unit
clip_image001[168]   Lab: System Monitoring

UNIT 9 – Security Networks
clip_image001[169]
   Objectives
clip_image001[170]   Agenda
clip_image001[171]   Routing Principles
clip_image001[172]   Net filter Overview
clip_image001[173]   Net filter Architecture
clip_image001[174]   Net Filter Tables and Chains
clip_image001[175]   Net filter Packet Flow
clip_image001[176]   Rule matching
clip_image001[177]   Rule Targets
clip_image001[178]   Simple Example
clip_image001[179]   Basic Chain Operations
clip_image001[180]   Directional Filtering
clip_image001[181]   Connection Tracking
clip_image001[182]   Network Address Translation (NAT)
clip_image001[183]   Rule persistence
clip_image001[184]   The “Bastion Host”
clip_image001[185]   End of Unit 10
clip_image001[186]   Lab: Security Networks

UNIT 10 – Securing Services
clip_image001[187]
   Objectives
clip_image001[188]   Agenda
clip_image001[189]   System Startup Control
clip_image001[190]   Securing the Service
clip_image001[191]   Tcp-wrappers Configuration
clip_image001[192]   Daemon Specification
clip_image001[193]   Advanced Syntax
clip_image001[194]   Options
clip_image001[195]   Example
clip_image001[196]   Securing xinetd-managed services
clip_image001[197]   Xinetd Access Control
clip_image001[198]   Host Patterns
clip_image001[199]   Advanced security Options
clip_image001[200]   End of Unit 11
clip_image001[201]   Lab: Securing Services

UNIT 11 – Securing Data
clip_image001[202]
   Objectives
clip_image001[203]   Agenda
clip_image001[204]   The Need for Encryption
clip_image001[205]   Cryptographic building Blocks
clip_image001[206]   Random Numbers
clip_image001[207]   One-Way Hashes
clip_image001[208]   Symmetric Encryption
clip_image001[209]   Asymmetric Encryption l
clip_image001[210]   Asymmetric Encryption ll
clip_image001[211]   Public Key Infrastructures
clip_image001[212]   Digital Certificates
clip_image001[213]   Generating Digital Certificates
clip_image001[214]   OpenSSH Overview
clip_image001[215]   OpenSSH Authentication
clip_image001[216]   The OpenSSH Server
clip_image001[217]   Service Profile:SSH
clip_image001[218]   OpenSSH Server Configuration
clip_image001[219]   The OpenSSH Client
clip_image001[220]   Protecting Your Keys
clip_image001[221]   Applications: RPM

 

 

ADs