Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    LinuxCBT Deb7x Edition

    Posted By: serpmolot
    LinuxCBT Deb7x Edition

    LinuxCBT Deb7x Edition
    English | mp4 | H264 1356x766 | AAC 1 ch | 40 hrs 4 min | 6.93 GB
    eLearning

    Course Objective

    Features Discussion and Various Installations
    - Enumerate relevant features
    - Discuss platform support
    - Installation preparation
    - Obtain relevant ISO image
    - Prepare VMWare environment to support Debian
    - Install and evaluate
    - Update network configuration
    - Prepare environment for rapid implementation
    - Clone instance and modify accordingly
    - Evaluate cloned resource as needed
    - Prepare Debian for Xen VM installation
    - Provision resources for Xen
    - Install on Xen as HVM and evaluate

    Basic Debian GNU/Linux Skills
    Explore usage of the following useful commands

    - ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami, tty
    - cat, file, chmod, chown, history
    - STDIN, STDOUT, STDERR, UNIX Pipes, Redirection, Command Chaining
    - ps, df, free, top, kill
    - less & more, head & tail, find
    - stat, which, w, who
    - dig (Domain Information Groper) - used to query DNS servers
    - Tar and compression utilities with tar|gzip|bzip2
    - Use checksum programs to confirm content integrity
    - Explain UNIX/Linux file security & permissions
    - Symlinks | Hard Links | Soft Links | Special Bits

    Storage Management
    - Explore disk topology with FDISK
    - Provision EXT4 File Systems as needed
    - Provision additional Storage partitions using Parted
    - Provision additional Swap storage
    - Use MKSWAP & SWAPON to enable additional Swap storage
    - Update File System Table (FSTAB) to reflect system changes
    - Explore Logical Volume Management (LVM) Configuration
    - Create volume sets using: Logical Volume Management (LVM)

    Package Management
    - Explain classes of Debian GNU/Linux Packages
    - Identify Debian GNU/Linux Package Management Tools
    - Inventory currently installed DEB packages
    - Identify key Advanced Package Tool (APT) configuration files
    - Search for Debian GNU/Linux packages using Advanced Package Tool (APT)
    - Install/Update/Remove software using APT
    - Configure APT to query multiple sources for packages
    - Peruse package repository using 'dpkg'
    - Configure APT to install packages from varying versions of Debian GNU/Linux
    - Use Aptitude to manage Debian GNU/Linux packages
    - Discuss various package management options
    - Explore package management repositories
    - Use DPKG to install a .deb package
    - Install packages using 'apt-get'
    - Manage packages using 'aptitude'

    System Control
    - Peruse key directories used by Kernel
    - Discuss hierarchy as applied to functioning system
    - Identify supported settings
    - Influence settings real time and evaluate
    - Committ settings for persistence
    - Confirm persistence of directives
    - Discuss various possible system tweaks

    Screen TTYs | PTYs
    - Discuss TTY | PTY limitations
    - Identify opportunites to benefit from Screen
    - Identify configuration environment
    - Invoke and use screen natively
    - Confirm persistence of TTYs | PTYs across sessions
    - Share Screen sessions
    - Confirm overall efficacy of Screen

    Explore the CRON scheduling daemon & configuration
    - Identify key Cron configuration scopes (Global & User)
    - Explain Crontab file format and applicable options
    - Define global cron jobs
    - Define custom cron jobs user-wide
    - Evaluate results of cron jobs

    Core Network Services
    - System Logging via RSyslog and Logrotate
    – Discuss Syslog Facilities | Levels
    – Explore default configuration
    – Receive Syslog data via network
    – Mirror Syslog log as needed
    – Trap Infrastructure device logs and evaluate
    – Explore log rotation and customization via Logrotate
    – Discuss key log rotation use cases
    – Configure Logrotate to rotate sample log files
    – Evaluate results
    - Common Network Utilities
    – PING
    – TELNET
    – NETSTAT
    – ARP
    – TRACEPATH
    – DIG

    - Interface Configuration
    – Explore network configuration tree
    – Alter settings and evaluate
    – Provision aliased interfaces as needed
    – Confirm communications via various interfaces
    – Committ configuration for persistence
    – Provision interface configuration on various nodes
    – Evaluate accordingly

    - RSYNC Transmissions
    – Discuss features and benefits
    – Generate and move data between nodes as needed
    – Confirm results
    – Explore various rsync options
    – Synchronize content as needed
    – Evaluate rsync applicability

    - Network Time Protocol Configuration
    – Discuss applicability
    – Install and explore default configuration
    – Re-configure environment to suit internal requirements
    – Confirm ntp strata assignments
    – Ensure time synchronization across nodes

    - Very Secure File Transfer Protocol Daemon (VSFTPD)
    – Explain features and applicability
    – Peruse default configuration
    – Test anonymous FTP connectivity
    – Secure configuration per general requirements
    – Use various FTP clients to communicate with VSFTPD
    – Enable local user access
    – Jail users to $HOME - added security
    – Evaluate results

    - BIND Domain Name Server - DNS Implementation
    – Implement BIND 9x
    – Configure BIND as a caching-only DNS server
    – Test caching-only name resolution from various nodes
    – Configure primary DNS services
    – Replicate primary content to secondary DNS node
    – Confirm replication information
    – Disable primary and evaluate secondary behaviour
    – Vary TTLs of records and evaluate responsiveness
    – Configure reverse DNS zone - IPv4
    – Provision forward and reverse IPv6 records
    – Confirm IPv[4|6] record resolution

    - Windows Integration via Samba
    – Explore default Samba footprint
    – Use Samba clients to ascertain NETBIOS (SMB|CIFS) information
    – Install Samba Server
    – Configure User-level security and evaluate access
    – Provision bridge user and test access
    – Rationalize ineffectiveness of User-level security
    – Contrast User | ADS security levels
    – Install ADS support via Winbind and Kerberos
    – Install Samba SWAT for streamlined web-based administration
    – Connect Samba node to Active Directory Services (ADS)
    – Confirm enumeration of ADS resources
    – Test connectivity via: NETBIOS and SSH
    – Evaluate results

    - Apache HTTPD - Web Services
    – Implement Apache Web Server
    – Explore configuration hierarchy
    – Discuss key directives
    – Peruse Apache logging templates and defaults
    – Vary logged information as needed
    – Provision IP-Based Virtual Hosts (VHosts)
    – Confirm distinct IP-Based connectivity to various sites
    – Contrast IP-Based sites with default sites
    – Conserve IP resources with Name-Based VHosts
    – Contrast various VHost types
    – Secure communications with Apache SSL | TLS
    – Test connectivity to various SSL|TLS-enabled sites

    - MySQL Installation | Administration
    – Install MySQL Relational Database Management System
    – Explore default client | server environment
    – Use Terminal Monitor Client to ascertain DBMS details
    – Secure DBMS - Remove superfluous accounts
    – Create simple MySQL database with 'mysql' and 'ssh'
    – Install PHPMyAdmin for web-based management of MySQL
    – Use PHPMyAdmin to ascertain DBMS details
    – Test connectivity as various users
    – Explore PHPMyAdmin's interface
    – Evaluate accordingly

    - PHP Intro | CLI Script
    – Explore default implementation
    – Ensure proper PHP stack is installed
    – Expose useful debug variables - Apache | PHP
    – Write simple data copy CLI script - normalize file delimiters
    – Evaluate results

    - Postfix MTA
    – Install Postfix MTA
    – Introduction to Postfix Message Transfer Agent (MTA)
    – Use Mutt to demonstrate outbound mail handling using Postfix
    – Explore Postfix Configuration

    - Post Office Protocol Version 3 (POP3)
    – Explain POP3 concepts and applications
    – Implement POP3 daemon
    – Test basic $SHELL-based connectivity
    – Use Mutt to send SMTP-based messages to POP3 account
    – Configure MUA to interact with POP3 server
    – Contrast clear-text and encrypted communications

    - Internet Messaging Access Protocol (IMAP)
    – Contrast IMAP with POP3
    – Install IMAP server
    – Fetch mail from IMAP server and evaluate
    – Confirm secure communications
    - Web-based Mail Implementation using Squirrel-mail
    – Describe required squirrel mail components for web-mail integration
    – Install squirrel mail on Debian GNU/Linux system
    – Configure Apache virtual directory for squirrel mail integration
    – Configure Apache Virtual Host for squirrel mail integration
    – Configure BIND DNS services for squirrel mail integration
    – Explore squirrel mail's web-based interface

    - Improve Security Posture
    – Update and Upgrade install Packages
    – Identify changes across Nodes
    – Secure content with GNU Privacy Guard (GPG)
    – Explore benefits of various Secure Shell clients
    – Peruse Secure Shell Server security
    – Disable superfluous services
    – Explore and tighten System Policy
    – Login Definitions
    – Evaluate Results

    - NMap Security Scanner
    – Obtain, compile and install current version of NMAP
    – Identify commonly used NMAP options/switches/parameters
    – Perform default TCP SYN-based ethical scans of local and remote resources
    – Explain typical TCP handshake protocol while using NMAP
    – Perform default TCP Connect-based ethical scans of local and remote resources
    – Peform local ethical scans
    – Identifiy key NMAP configuration files
    – Use NMAP to perform operating system fingerprinting and versioning
    – Peform subnet-wide ethical scans

    - TCPDump Introduction | Usage
    – Identify key tools
    – Use TCPDump to capture traffic
    – Apply Berkeley Packet Filters accordingly
    – Capture and analyze traffic with Wireshark
    – Evaluate Results

    - IPTABLES (Netfilter Linux Kernel-based Firewall)
    – Discuss features and benefits
    – Explore IPTABLES default chains/filters and policies
    – Filter traffic as desired
    – Log filtered traffic and evaluate
    – Filter traffic based on Layer-4 TCP/UDP (Source/Destination Ports) information
    – Summarize rules with filtered groups of interesting traffic
    – Restrict access to various daemons (SSH/FTP/HTTP/etc.)
    – Test connectivity locally and remotely
    – Ensure rules persistence across restarts

    - Secure Key Services
    – Identify remaining services
    – Generate SSL | TLS Usage Keys
    – Configure FTP Server with SSL | TLS
    – Test secure communications with LFTP and FileZilla
    – MySQL with Secure Shell Security
    – MySQL with SSL | TLS Security
    – Evaluate Results

    - Snort® NIDS Introduciton | Usage
    – Discuss features and benefits
    – Explore online sources
    – Install Snort Network Intrusion Detection System Packages
    – Use Snort to intercept interesting traffic as Sniffer
    – Log for archival purposes
    – Apply BPFs as needed
    – Parse captured traffic with common tools
    – Explore NIDS configuration mode
    – Evaluate results

    Screenshots:

    LinuxCBT Deb7x Edition

    LinuxCBT Deb7x Edition

    LinuxCBT Deb7x Edition

    NO MIRRORS PLEASE

    WANT MORE? VISIT MY BLOG!


    LinuxCBT Deb7x Edition