Linux Training for Network and Security Managers
introduction to Linux
- Linux History
- Linux Distributions
- Differences between distributions
Basic Linux Use
- Linux System Setup (video)
- System Açılışı
- First Entry System
- Console and Graphical Interfaces
- Recognition System
- Basic Settings
- Network Ayarları
- Configuring the SSH Service
- Configuring WEB Service
- Command and Operation Logic
- New Program System Installation / Removal
- From package repositories
- The source code
- Synaptic Package Management System
- Installed Applications Update
- Operating System Update
- Linux Kernel Security Update terms
Linux User Management
- User / group to add, delete and modify operations
- PAM ( pluggable Authentication Modules)
- User information
- /etc/passwd, shadow, group dosyaları
- Password Security
- Linux Parola Türleri (md5,sha512)
- Salting passwords logic and Rainbowtabl Attacks
- Password Security Testing Tools
- John The Ripper password security tests
- Application (screenplay)
Linux File System
- File / Directory Concepts
- Linux File / Directory Structure
- File Types and Classification
- Important Files and Directories
- File / Directory Accesses
- Files on the Access Privileges
Getting Help in Linux System
- Man (manuals)
- Command parameters (-help)
- Internet Resources (cyberciti.biz, ipucu.enderunix.org)
- Linux Email Lists
Text Editor
Business (Process) Management
- Process Concept
- Employees Process Monitoring
- Process Termination
- Background processes run
- Process running in the background forefront
- Ps, top, commands
Search Transactions File System
- Basic archiving and backup commands
- The presence of the desired files with find
- locate, whereis komutları
- content search with grep
- Implementation (finding files accessed within the last week, certain common file types to find cancel, content search, search based on file permissions)
Package Management System
- Linux Package Repositories
- Adding New Programs
- Post Installation Program
- Software Installation from Source Code
- Council Programs Update
- Lifting Program
Service Management
- RedHat Based System in Service Management
- Debian Based System in Service Management
Surveillance System
- Disk, cpu and ram Availability Monitoring
- Monitoring Network Availability
- Monitoring of network services
- Advanced System Resource Monitoring (htop)
- Traffic monitoring (tcpdump, wireshark)
Crontab - Tasks Timer
- Connected Setting Time Jobs
Linux Network Management
- Configuring DHCP Settings
- Configuring IP Settings
- DNS Server Configuration
- Forwarding (Routing) Description
- As Linux Firewall
- Router (router) as Configuration
- Connecting to remote systems and Management (RDP, SSH, VNC, FTP)
Advanced Kernel Configuration - Linux sysctl
- The / proc directory structure and Sysctl Values
- Network Settings with sysctl Command
- Security Settings with sysctl Command
Bash Script Programming
- Bash script programming
- Standard Input / Output Logic
- Variables, Values and Examples Programming
Linux Log Infrastructure
- Important Log Files
- Login to the remote system by sending syslog
- Syslog remote system with the Logan Collection
- Rotating log (rotate)
Linux Security
- Linux Vulnerabilities
- Not Track openings
- Local openings and upgrades Rights
- Iptables firewall (port opening / closing, Nate operations)
- Packet Logging
- System Limits (ulimit)
- Linux Kernel Logging Infrastructure (auditd)
- File Integrity Verification (checksum, Tripwire)
- Linux Dünyasında Rootkitler
- Tips for a secure Linux
50 Commands You Need to Know
arp, nslookup, dig, host, wc, ls, mv, rm, cp, lsof, grep, ping, route, head, tail, cat, tar, which, locate, who, top, kill, netstat, ssh, pwd, df, passwd, chmod, chown, find, gzip, ifconfig, last, ps, sudo, traceroute, uname, vi, vmstat ...
10 Important Need to Know File, Directory
/etc/passwd, /etc/syslog.conf, /var/log/messages, /var/log/auth, /var/log/security, /etc/group, /etc/shadow, /etc/profile ...