
Linux - 8:35 hoursFEATURES Inline Activities Video
In this course, expert Jordan Hudgens explores the fundamentals of the Linux operating system. As well as giving an overview of Linux and touching on its history and evolution, Hudgens will tap into some key areas of Linux including the command line interface, default tools, and managing processes. Finally, he will discuss file and user management within Linux. After completing this course you will be well on your way to becoming fluent in Linux. A continuation of Linux Part 1: Overview, Tools and Users, this course, with expert Jordan Hudgens, explores system functions as well as managing files and directories. Hudgens will discuss working with background jobs and installing packages from the command line, as well as show the power of the Linux Kernel including its flexibility and how it runs the entire OS. Finally, he will walk through the shell programming language and custom scripts, finishing up with creating partitions.
Learn all about the boot process and how to build a Linux boot process from the ground up, including how to work with GRUB, systemd, and the full boot sequence. Discover the importance of quickly and efficiently adding and configuring environment variables when it comes to building out your system. Finally, explore input and output as well as the process of piping data from files and directories or to log files. Discover what it takes to manage a Linux system. Find out what a backup file consists of and how to both manually and automatically back up a system. Explore package management including YUM and RPM, and because security is a critical, discover how to implement proper security protocols. Finally, learn what options you have when it comes to file systems and discover which option is right for you. Learn how to use VIM, one of the most universal text editors on the market. Whether you're an administrator or a developer, learn how to customize VIM to best suit your needs. Discover how to manage passwords and complete security checks with the shadow password management system. Explore advanced permissions to be able to update users, set permissions on files and directories, and keep your Linux system organized.
Linux, Part 1 of 5: Overview, Tools, and Users Linux, Part 2 of 5: System Functions, Scripts, and Partitions Linux, Part 3 of 5: Input/Output and Variables Linux, Part 4 of 5: Files and Security Linux, Part 5 of 5: VIM and Permissions |
Linux Shell Scripting Solutions - 8:25 hoursFEATURES Audio Narration Video
The shell remains one of the most powerful tools on a computer system yet a large number of users are unaware of how much can be accomplished with it. Using a combination of simple commands, you will see how to solve complex problems in day-to-day computer usage. This video will take you through useful real-world examples to make your daily life easy when working with the shell. It shows you how to effectively use the shell to accomplish complex tasks with ease. Starting with the basics of the shell, you will learn simple commands and their usages, allowing you to perform operations on different kinds of files. We then explain text processing and web interaction, and conclude with backups, monitoring, and other sysadmin tasks. This is an an excellent guide on solving day-to-day problems using the shell and a few powerful commands together to create solutions.
SHELL SOMETHING OUT Printing in the Terminal Playing with Variables and Environment Variables Function to Prepend to Environment Variables Math with the Shell Playing with File Description and Redirection Arrays and Associative Arrays Visiting Aliases Grabbing Information about the Terminal Getting and Setting Dates and Delays Debugging the Script Functions and Arguments Reading the Output of a Sequence of Commands Reading n Characters without Pressing the Return Key Running a Command Until It Succeeds Field Separators and Iterators Comparisons and Tests
HAVE A GOOD COMMAND Concatenating with cat Recording and playing Back of terminal sessions Finding files and file listing Playing with xargs Translating with tr Checksum and Verification Cryptographic Tools and Hashes Sorting Unique and Duplicates Temporary File Naming and Random Numbers Splitting Files and Data Slicing Filenames Based on Extension Renaming and Moving Files in Bulk Spell Checking and Dictionary Manipulation Automating Interactive Input Making Commands Quicker by Running Parallel Processes
FILE IN, FILE OUT Generating Files of any Size The Intersection and Set Difference (A-B) on Text Files Finding and Deleting Duplicate Files Working with File Permissions, Ownership, and the Sticky Bit Making Files Immutable Generating Blank Files in Bulk Finding Symbolic Links and Their Targets Enumerating File Type Statistics Using Loopback Files Finding the Difference between Files, Patching Using Head and Tail for Printing the Last or First Ten Lines Listing Only Directories – Alternative Methods Fast Command-Line Navigation Using pushd and popd Counting the Number of Lines, Words and Characters in a File Printing the Directory Tree
TEXTING AND DRIVING Using Regular Expressions Searching and mining text inside a file with grep Cutting a File Column-Wise with Cut Using sed to Perform Text Replacement Using awk for Advanced Text Processing Finding Frequency of Words Used in a Given File Compressing or Decompressing JavaScript Merging Multiple Files as Columns Printing the nth Word or Column in a File or Line Printing Text between Line Numbers or Patterns Printing Lines in the Reverse Order Parsing E-mail Address and URLs from Text Removing a Sentence in a File Containing a Word Replacing a Pattern with Text in all Files in a Directory Text Slicing and Parameter Operations
TANGLED WEB? NOT AT ALL!! Downloading from a Web Page Downloading a Web Page as Plain Text Primer on cURL Parsing Data from a Website Image crawler and downloader Web photo album generator Creating a "define " Utility by Using the Web Backend Finding Broken Links in a Website Tracking changes to a website Posting to a Web Page and Reading Response
THE BACKUP PLAN Archiving with tar Archiving with cpio Compressing data with gzip Archiving and Compressing with Zip Faster Archiving with pbzip2 Creating filesystems with Compression Backup Snapshots with rsync Version Control-Based Backup with Git Creating entire disk images using fsarchiver
THE OLD-BOY NETWORK Let Us Ping! Listing All the Machines Alive on a Network Running Commands on a Remote Host with SSH Transferring Files through the Network Password-Less Auto-Login with SSH Port Forwarding and Mounting Remote Drives Network Traffic and Port Analysis Creating Arbitrary Sockets
PUT ON THE MONITORS CAP Monitoring Disk Usage Calculating the Execution Time for a Command Collecting Information about Logged-in Users, Boot Logs, and Boot Failures Listing the Top ten CPU Consuming Processes in an Hour Monitoring Command Outputs with Watch Logging Access to Files and Directories Logfile Management with logrotate Logging with syslogd Monitoring User Logins to Find Intruders Remote Disk Usage Health Monitor Finding Out Active User Hours on a System Measuring and Optimizing Power Usage Monitoring Disk Activity Checking Disks and Filesystems for Errors
ADMINISTRATION CALLS Gathering Information about Processes Killing Processes and Send or Respond to Signals Sending Messages to User Terminals Gathering System Information Using /proc for Gathering Information Scheduling with cron Writing and Reading the MySQL Database from Bash User Administration Script Bulk Image Resizing and Format Conversion Taking Screenshots from the Terminal Managing Multiple Terminals from One
|
Linux System Administration - 5:53 hoursFEATURES Video
Linux System Administration LiveLessons provides novice Linux users with more than five hours of step-by-step video training covering essential system administration responsibilities and skills with professional system administrator Ben Whaley. The content comprises nine video lessons featuring command-line examples and conceptual discussion. The video tutorials offer practical advice for real world system administration, such as encouraging the use of shell shortcuts and automation to reduce tedious manual tasks and improve administrative efficiency. What You Will Learn: How to use Vagrant and VirtualBox as a makeshift lab environment Linux's history and background Shell shortcuts and basic bash scripting The Linux startup and shutdown procedures Management of user accounts The use of sudo to control access to privileged commands Interact with processes from the command line The filesystem layout File permissions and attributes Log file management with syslog and logrotate Linux on a TCP/IP network Network debugging with tcpdump and ping Using SSH for remote management The iptables host-based firewall How to secure a Linux system.
Lesson 1: Where to Start Lesson 2: The Shell Lesson 3: Booting and Shutting Down Lesson 4: Access Control, Accounts and Rootly Powers Lesson 5: Controlling Processes Lesson 6: The File System Lesson 7: Log Files and Syslog Lesson 8: TCP/IP Networking Lesson9: Security |
Mastering Linux Security and Hardening - 4:05 hoursFEATURES Audio Narration Video
This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently.By the end of this book, you will be confident in delivering a system that will be much harder to compromise.
RUNNING LINUX IN A VIRTUAL ENVIRONMENT The Course Overview The Threat Landscape and Keeping Up with Security News Introduction to VirtualBox and Cygwin
SECURING USER ACCOUNTS Setting Up sudo Privileges for Full Administrative Users Setting Up sudo for Users with Only Certain Delegated Privileges Advanced Tips and Tricks for Using sudo Locking Down Users' Home Directories the Red Hat/CentOS and Debian/Ubuntu Way Enforcing Strong Password Criteria Setting and Enforcing Password and Account Expiration Preventing Brute-Force Password Attacks Locking User Accounts
SECURING YOUR SERVER WITH A FIREWALL An Overview of iptables Uncomplicated Firewall for Ubuntu Systems firewalld for Red Hat Systems nftables – A More Universal Type of Firewall System
ENCRYPTING AND SSH HARDENING GNU Privacy Guard Encrypting Partitions with Linux Unified Key Setup – LUKS Encrypting Directories with eCryptfs Using VeraCrypt for Cross-Platform Sharing of Encrypted Containers Ensuring that SSH Protocol 1 Is Disabled Creating a User’s SSH Key Set Disabling Username/Password Logins
MASTERING DISCRETIONARY ACCESS CONTROL Changing Ownership of Files and Directories Setting Permissions Values Using SUID and SGID Protecting Sensitive Files
ACCESS CONTROL LISTS AND SHARED DIRECTORY MANAGEMENT Creating an Access Control List Creating an Inherited Access Control List Removing a Specific Permission Preventing Loss of ACLs Creating a User Group and Adding Members to It Setting the SGID Bit and the Sticky Bit Accessing Files in the Shared Directory
IMPLEMENTING MANDATORY ACCESS CONTROL WITH SELINUX AND APPARMOR How SELinux Can Benefit a Systems Administrator? Setting Security Contexts for Files and Directories Troubleshooting with setroubleshoot Working with SELinux Policies Looking at AppArmor Profiles Working with AppArmor Command-Line Utilities
SCANNING, AUDITING, AND HARDENING Installing and Updating ClamAV and maldet Scanning with ClamAV and maldet SELinux Considerations Scanning for Rootkits with Rootkit Hunter Controlling the auditd Daemon and Creating Audit Rule Using ausearch and aureport Scanning and Hardening with Lynis |
|
|
|