Price: $495 for Single-User License – Configure during checkout
Government | Academic Price: $395
Student Price: $195
Multi-User License: Select During Checkout
System Requirements: Web Browser with Flash support
Duration: 65 hours on 1-DVD
MD5SUM: 73ef5ff55ca74deeca3daf3bcde70d25
SHA1SUM: e36357ad682610fc500c951c2865fe5aec77c1ff
Content Size: 4.23 GB ( 4,547,160,064 bytes )
UnixCBT feat. Solaris® 10 Edition focuses on the enterprise-trusted, Solaris® 10 Operating System (OS).
The coursework focuses on traditional Unix features including: Bourne/BASH shells, user/group management, file permissions, disk management, Cron, Network Time Protocol (NTP), Network File System (NFS), SendMail, and File Transfer Protocol (FTP).
UnixCBT feat. Solaris® 10 Edition also covers Solaris® 10-specific features, including but not limited to: Custom installations, Service Management Facility (SMF) framework, Package & Patch management, Unix File System (UFS) management, Volume management (RAID-0/1/5), Solaris® Management Console (SMC), Solaris® Zones, and the Zettabyte File System (ZFS).
Additionally, UnixCBT feat. Solaris® 10 Edition covers the integration of key Open Source technologies, including, but not limited to: Grand Unified Boot Loader (GRUB), GNOME Desktop, Samba, Apache HTTPD, MySQL, PHP (SAMP), BIND (DNS), Secure Shell Version 2 (SSHv2), GNU Privacy Guard (GPG (PGP-compliant encryption tools), TCPDump, Snort® NIDS, and Nmap.
Recommended Prerequisites for:
* Any LinuxCBT OS Edition such as LinuxCBT feat. SUSE® Enterprise Edition
o Open mind & determination to master Linux and related open-source applications
o Basic MS Windows skills
o Basic understanding of networking concepts
o Access to a PC to perform all of the installations and exercises
Installations
* Local Media (CDROM) Text-based Installation on Dell PowerEdge Hardware
o Discuss features of Solaris® 10
o Explore system BIOS
o Configure BIOS for local media booting
o Boot local media and discuss default GRUB options for installation
o Boot installation and discuss installation options
o Discuss system requirements for text & GUI installations
o Discuss single-user mode access
o Boot text-based installation and explain hardware detection process & assignment
o Configure network parameters
o Configure time & locale parameters
o Explore software companion DVD components
o Select appropriate installation package group (Entire Distribution)
o Customize file system slices – /, /export/home, SWAP
o Complete installation of Entire Distribution
o Reboot and confirm boot to the GUI screen
* Pre-Execution (PXE) Nework-based Installation on Dell PowerEdge Hardware
o Explain PXE installation requirements (TFTP, DHCP, etc.)
o Prepare an alternate Solaris® server to become an Install Server – ./setup_install_server
o Share Install Server source files using Network File System (NFS)
o Configure SuSE® Linux DHCP Server to support the PXE client (Solaris® server) using a reservation
o Configure Solaris® Install server to support the Solaris® client – ./add_install_client
o Explore files created by ./add_install_client to support PXE
o Explain PXE-boot process
o Boot PowerEdge server and configure BIOS to boot using PXE
o Reboot and install Solaris® 10 across the network without local media
o Install using Solaris® Interactive option
o Configure GUI (KVM) settings for graphical installation
o Configure network parameters
o Configure time & locale parameters
o Confirm additional parameters and NFS path to source files
o Customize file system slices – /, /export/home, /var, SWAP
o Complete installation of Entire Distribution
o Reboot and explore the Grand Unified Boot Loader (s) menu items
o Discuss Service Management Facility (SMF) initial starup process
o Confirm GUI Login
* Console-based (Serial Cisco Firewall Rollover Cable) Installation
o Discuss requirements of serial installation
o Execute ./add_install_client to setup console installation option on appropriate com port
o Boot PowerEdge server and confirm PXE boot
o Select console boot option and confirm GRUB boot option
o Connect to SuSE® Linux and use kermit to connect via com1 to the PowerEdge server
o Continue PXE-Console(Serial) installation
o Alter kermit console to resemble a mainframe terminal
o Configure network parameters
o Configure time & locale parameters
o Customize file system slices – /, /export/home, /var, /usr, /opt, SWAP
o Complete installation of Entire Distribution
o Configure X.org GUI parameters using kdmconfig
* Sysidcfg (phase 1) & JumpStart-based (phase 2) Installation – Unattended Installs
o Explain the directives(network,locale,etc.) and application of the ‘sysidcfg’ file
o Define the ‘sysidcfg’ file
o Execute ./add_install_client to provide support for ‘sysidcfg’ file
o Reboot using PXE and install using ‘sysidcfg’ file, confirming auto-population of directives – phase 1
o Discuss rules regarding JumpStart installation method – phase 2
o Introduction to the ‘rules.ok’ file
o Discuss ‘rules.ok’ profile development for classes of users (marketing, development, etc.)
o Define ‘rules.ok’ profile file with appropriate criteria, validae, and store in NFS-accessible location
o Reboot server, and confirm ‘sysidcfg’ and ‘rules.ok’ files in GRUB entry
o Continue JumpStart, unattended installation
* Desktop Console-based Installation with PXE
o Boot using ‘sysidcfg’ and ‘rules.ok’ files incorporated in JumpStart option
o Configure X.org using kdmconfig
o Complete unattended remainder of installation
* Flash-based (Snapshot) Installation with PXE and JumpStart Integration
o Discuss ideal environment for implementing flash installations
o Identify the current runlevel and enter single-user mode to prepare flash archive
o Use the ‘flar’ utility to take a snapshot of the system
o Use Secure Copy (scp) to copy flash archive to NFS server
o Reboot PowerEdge server and perform flash installation
o Compete installation, reboot and confirm initial startup
o Configure JumpStart and flash archive installation
o Configure X.org GUI parameters using kdmconfig
o Customize file system slices – /, SWAP
o Complete installation
o Confirm results – GUI Login
System Administration
* Grand Unified Boot Loader (GRUB) Implementation
o Describe the boot process (BIOS – GRUB – Solaris® Kernel – Sched – Init – SMF – Runlevel)
o Discuss the default GRUB menu items
o Explain how GRUB references bootable media
o Boot into single-user mode by modifying GRUB
o Explore the GRUB startup environment
* System Initialization (INIT – PID 1)
o Describe init’s invocation
o Peruse init’s default configuration file /etc/inittab
o Explain runlevels
o Compare & contrast Solaris® & Linux runlevels
o Explore /etc/init.d and /etc/rc* directories
* Service Management Facility (SMF) Framework
o Discuss the adavantages and features of SMF
o Discuss the service configuration database
o Explain support for legacy services
o Discuss the role of service restarters – ‘svc.startd’ & ‘inetadm’
o Describe support for INETD-controlled daemons
o Enumerate services configured on the system, including state information
o Discuss & examine Fault Management Resource Identifiers (FMRIs)
o Discuss service dependencies
o Use ‘svcadm’ to manage (disable/enable) services
o Break dependencies and evaluate the results
o Use ‘inetadm’ to manage INETD-related services
o Convert legacy INETD service to SMF-managed service
* GNOME Desktop Environment
*
o Explore GNOME Desktop
o Identify key features
o Explore the Control Panel interface
o Browse the filie system using Nautilus explorer
o Correlate GNOME Desktop items to files in the user’s home directory
o Customize GNOME Desktop
o Create GNOME Desktop launchers (Shortcuts)
o Save configuration
* Shell-based User & Group Management
o Enumerate key user & group management tools
o Analyze the fields in /etc/passwd, /etc/shadow, /etc/group
o Correlate /etc/passwd to /etc/shadow entries
o Create and modify users and groups
o Alter the default encryption algorithm used for passwords
o Add users to groups and evaluate results
* Solaris® Management Console (SMC) – Consolidated GUI System Management
o Confirm that ‘wbem’ is running
o Launch SMC and connect to local ‘wbem’ instance
o Authenticate and explore the SMC GUI interface
o Peruse key system metrics
o Explore the log viewer interface
o Manage users & groups using SMC
o Define user templates and create users based on those templates
o Examine scheduled jobs and correlate to crontab entries
o Explore mounted file systems
* Bourne Again Shell (BASH)/Bourne Shell Basics
o Distinguish between privileged and non-privileged uses
o Identify the default shell for a given user
o Discuss features of BASH
o Execute BASH
o Discuss pseudo-terminals and how to identify connected terminals
o Modify user’s accounts to default to BASH using shell & SMC
o Use ‘su’ to switch users
o Explore key BASH commands
o Focus on BASH input, output, and error redirection
o Explore BASH command chaining
o Use logical BASH operators (&&, ||) to control program logic
o Discuss and alter BASH global and user-specific configuration files
o Reveal key information using system info commands
* Package Management
o Discus options for managing packages
o Discuss package nomenclature
o Use ‘installer’ script in GUI & text modes to install packages
o Install packages from the Software Companion DVD sources
o Use ‘prodreg’ to display currently-installed software
o Install packages using prodreg and evaluate results
o Enumerate existing packages using ‘pkginfo’
o Echo package metadata using pkginfo
o Use ‘pkgchk’ to enumerate package’s contents
o Use pkgchk to discover discrepancies in file locations and permissions – auditing
o Determine package membership of files using pkgchk
o Use ‘pkgadd’ to install packages
o Add packages to the local pacakage repository for subsequent installs
* Patch Management
o Discuss options for managing patches
o Register server with sun.com to obtain patches automatically
o Resolve outstanding patches using Update Manager
o Install selected patches and reboot if necessary
o Confirm patch application
o Analyze patch level using ‘smpatch’ from the BASH shell
o Install specific patches using ‘smpatch’
* Unix File Permissions
o Analyze permissions in ‘ls -l’ output
o Discuss common Unix file types (files, directories, links, named-pipes, etc.)
o Correlate symbolic permissions values to octal values
o Use ‘chmod’ to alter file & directory permissions
o Use ‘chown & chgrp’ to alter file & directory ownership
o Apply SETUID & SETGID permissions to files & directories
o Discuss the rules of symbolic & hard links
o Create hard and soft links – symlinks
o Discuss and examine inodes
* Devices & Drivers Overview
o Explore & correlate logical & physical device locations
o Identify & discuss default driver locations
* Disk, Slice & File System Management
o Explain disk terminology (Tracks/Cylinders/Sectors/Partitions/Slices)
o Examine existing disk layout, including slices using prtvtoc
o Discuss x86 partition constraints – Volume Table of Contents (VTOC) & FDISK
o Illustrate the disk-FDISK-slice hierarchy
o Explain the disk nomenclature: c0t0d0s* (controller, target, disk, slice)
o Identify logical and physical disk/slice locations
o Use ‘format’ to enumerate connected controllers & disks
o Manipulate slices using ‘format’
o Rectify disk geometry issues using fdisk option of ‘format’
o Manipulate FDISK partitions with fdisk option of ‘format’
o Discuss ‘newfs’ rules
o Create Unix File Systems (UFSs) using ‘newfs’
o Mount newly-created file systems at various locations
o Confirm available storage
o Updated /etc/vfstab, ensuring persistence
o Recap file system provisioning process
o Provision memory-based, Temporary File System (TEMPFS)
o Provision and manage additional SWAP storage (files & file systems)
* Volume Management – State Database Replicas, RAID-0/1/5, Volume Extenstion (growfs)
o Introduction to volume management
o Discuss Replicas, RAID Volumes, Hot Spare Pools, and Soft Partitions
o Create required state database replicas on available slices, using SMC
o Provision RAID-0 (Stripe) using SMC and available disks
o Create UFS file system on RAID-0 volume, mount, and confirm results
o Provision RAID-1 (Mirror) using SMC and available disks
o Create UFS file system on RAID-1 volume, mount, and confirm results
o Provision RAID-5 (Stripe with Parity) using SMC and available disks
o Create UFS file system on RAID-5 volume, mount, and confirm results
o Extend an in-use volume dynamically, using ‘growfs’
o Confirm extended volume results
* Quota Implementation
o Discuss the benefits of implementing quotas
o Discuss soft & hard limits
o Discuss inodes and blocks usage
o Examine ‘edquota’
o Use ‘quotacheck’ to confirm quotas
o Enable quotas on a per-file system basis & confirm results
o Test soft & hard limits by generating I/O
o Use ‘repquota’ to confirm current disk & slice usage
* CRON – Process Scheduling – Automation
o Discuss the benefits of automation & scheduling
o Explore at, and Cron’s directory layout
o Explain Cron scheduling fields
o Examine user’s cron entries
o Schedule per-user jobs and confirm execution
* SYSLOG – Configuration
o Discuss features & benefits
o Identify key binaries and configuration files
o Discuss Syslog rule components: selectors (facilities & levels) and actions
o Peruse predefined selectors & actions
o Explain options for facilities, levels and actions
o Configure new selectors & actions for Cisco® PIX® firewall logging
o Confirm logging results
* Log Rotation – logadm
o Discuss features & benefits
o Identify key binaries and configuration files
o Explore default log rotation schedule and items
o Discuss available logadm criteria
o Examine log rotation and effects on inodes
* Zettabyte File System (ZFS) Implementation
o Discuss the features (RAID-0/1/Z, Pools, etc.) and benefits of ZFS
o Discuss ZFS prerequisites
o Create ZFS pools using the Command Line Interface (CLI)
o Set quotas on provisioned ZFS file systems atop the hierarchy and evaluate results
o Manage ZFS storage pools from the CLI
o Extend ZFS storage pools dynamically, while mounted
o Manage ZFS storage pools using the web GUI
Network Administration
* NETSTAT
o Explain ‘netstat’ applications
o Identify key output features including: address families & protocols
o Use ‘netstat’ to return the current IP routing table
o Correlate service names in output to /etc/services
o Return protocol-specific entries
o Return active sockets and attached processes
o Reveal DHCP-configured plumbed interfaces
* Network Configuration
o Discuss network configuration modes
o use ‘dladm’ to reveal the status of connected network interfaces – layer 1
o Explain network interface nomenclature
o Use ‘ifconfig’ to return layer 2(MAC) & 3(IP) information for network interfaces
o Identify key network services using Service Management Facility (SMF)
o Enumerate key network configuration files for the configuration modes
o Transition from DHCP to static configuration, creating the requisite files
o Reboot and confirm static configuration
o Reveal DHCP-configured plumbed interfaces using ‘ifconfig’
o Plumb(Initiate) physical interfaces, commit configuration for persistence & test comms
o Plumb(Initiate) logical interfaces associated with physical interfaces & test comms from Linux
o Explore ‘/etc/nsswitch.conf’ name service configuration file
* Network Time Protocol (NTP) Client/Server Implementation
o Configure Network Time Protocol (NTP) to perform client/server time synchronization
o Synchronize NTP with additional Stratum 2 NTP server
o Synchronize against Stratum 1 NTP servers
* Network File System (NFS) Implementation
o Implement NFS Server
o Export shares and discuss options
o Mount NFS exports on remote Linux Hosts
o Explore AutoFS configuration
o Configure AutoFS mount points
* Samba Implementation
o Focus on key Samba (SMB/CIFS) clients
o Integrate with Windows via Samba
o Explore Samba Configuration files
o Enable Samba Server support
o Explore Samba Web-based Administration Tool (SWAT)
o Configure Samba file sharing
o Configure Samba with multiple NETBIOS aliases
* WUFTPD File Transfer Protocol (FTP) services
o Implement anonymous FTPD
o Implement user-level FTPD access
o Implement FTPD banners
o Disable anonymous access
o Configure WUFTPD to chroot jail users into their home directories
o Configure virtual FTP hosts
* Dynamic Host Configuration Protocol (DHCP)
o Explain DHCP Concepts & Applications
o Explore DHCP confiuration files
o Configure DHCP subnet with applicable options
o Configure DHCP Reservation based on layer-2 address
* Domain Name System (DNS)
o Identify BIND packages & key files
o Construct a standard ‘named.conf’ configuration file with root hints, forward, and reverse zones
o Download latest root hints file as ‘db.cache’ using ‘wget’
o Construct appropriate zone files to match defined zones in ‘/etc/named.conf’
o Configure BIND as a caching-only DNS server
o Implement Master DNS Zone
o Configure Master/Slave Zones with Linux Server
o Evaluate results of BIND configuration using DIG & host
* Sendmail Message Transfer Agent (MTA)
o Introduction to Sendmail Implementation
o Explore the directives in the Sendmail configuration files
o Explre aliases
o Test messaging using ‘sendmail’ binary
o Identify relay-related configuration files
o Configure Virtual Domains
* Internet Message Access Protocol (IMAP) Implementation
o Explain POP3 & IMAP applications
o Download & Install IMAP server using ‘wget’ , ‘gunzip’ & ‘pkgadd’
o Configure IMAP server to be managed by INETADM (SMF)
o Invoke & test mail retrieval
* Apache Web Server Implementation
o Identify the versions of Apache included with Solaris® 10 using SMF & pkg* tools
o Discuss Apache server’s features and concepts
o Explore key binaries, configuration files, and documentation
o Discuss key sections & directives in the Apache ‘httpd.conf’ file
o Setup Apache 2 support
o Implement Apache Mod Alias and ScriptAlias
o Discuss and implement the File, Location & Directory directives
o Explore Apache logging semantics
o Configure IP-based Virtual Hosts
o Configure Name-based Virtual Hosts
o Implement Apache logging system per virtual host
o Webalizer Log Analysis software Implementation
o Generate web reports using Webalizer
* Trivial File Transfer Protocol (TFTP) Implementation
o Install TFTP server
o Backup Cisco PIX firewall configuration using TFTP
o Update Cisco PIX firewall configuration using TFTP
* MySQL® Relational Database Management System
o Install MySQL® Relational Database Management System
o Explore key configuration files
o Secure access to MySQL®
o Discuss security framework
o Discuss default table storage engine, MyISAM, file types
o Explore MySQL® monitor shell-based interface
* PHPMyAdmin – MySQL® Web-based Management Interface
o Install PHPMyAdmin for web-based management of MySQL instances
o Explain & Secure access to PHPMyAdmin
o Explore PHPMyAdmin’s interface
* Postfix Message Transfer Agent (MTA)
o Configure Postfix as default MTA
o Introduction to Postfix Message Transfer Agent (MTA)
o Explore the directives in the Postfix configuration files
o Define default values for the FQDN
o Alter myorigin and examine results
o Configure Postfix to route messages using a Smarthost
o Examine how Postfix delivers mail locally
o Configure SMTP Relaying in Postfix
o Use Mutt to demonstrate outbound mail handling using Postfix
o Define SMTP Virtual domains for hosting multiple DNS domains
o Configure Postfix with a production UnixCBT DNS domain
o Examine Virtual domain routing with production and non-production DNS domains
* top
Security Implementation Techniques
* System Security Overview
o Discuss key areas related to security in a vanilla Solaris® 10 installation
o Peruse the ‘sulog’ log file to identify ‘su’ instances & explain fields
o Test using ‘su’ and examine results in ‘/var/adm/sulog’
o Record failed logins in the ‘/var/adm/loginlog’ file
o Test login failures and examine results in ‘loginlog’
o Peruse the directives in ‘/etc/default/login’
o Adjust ‘login’ file directive to capture failed login attempts
o Test failed logins using SSH – Compare SSH threshold to system threshold
o Explore system-wide account-policy information using ‘logins’ command
o Identify the default password encryption algorithm
o Upgrade default password encryption algorithm to MD5 and Blowfish
o Test user-account modifcation of passwords and evaluate encryption strings
* Secure Shell Version 2 (SSHv2)
o Discuss the features and benefits of SSHv2
o Identify SSHv2 SMF FMRI
o Identify global and per-user configuration files
o Explain SSHv2 config file precedence order
o Identify key directives in global and per-user configuration files
o Discuss ‘~/.ssh/known_hosts’ file
o Execute ‘ssh’ in debug mode and evaluate output, including psuedo-terminal (pty) assignment
o Execute remote commands and return output to local system using ‘ssh’
o Use Secure Copy (SCP) to copy files securely and non-interactively between systems
o Use Secure File Transfer Program (SFTP) to copy files securely interactively between systems
o Generate SSHv2 DSA & RSA usage keys for PKI login
o Configure SSHv2 to support PKI (password-less) logins
o Test password-less login to remote systems
o Execute ‘ssh’ in debug mode and evaluate output, including PKI, password-less login
o Implement ‘~/.ssh/authorized_keys’ file
o Discuss using SSHv2 as a psuedo-VPN via port forwarding
o Use SSHv2 to forward local TCP ports & test communications
o Use SSHv2 to forward remote TCP ports & test communications
o Enable the sharing of locally & remotely forwarded TCP ports
* GNU Privacy Guard (GPG) – Pretty Good Privacy (PGP)-compatible Facility
o Discuss the features and benefits of GPG
o Download GPG package from sunfreeware.com
o Install GPG
o Explore GPG files
o Generate DSA public/private key pair
o Identify available, per-user public/private key pairs on keychains
o Import G/PGP public key and evaluate results
o Sign imported public key and verify signature associated with downloaded content
o Encrypt ASCII text file with appropriate public key and evaluate output
o Decrypt ASCII text with appropriate private key and evaluate output
* Snoop – Packet Sniffing
o Discuss the features and benefits of snoop
o Explain default interface behavior
o Execute ‘snoop’ and evaluate packet headers
o Capture snoop output to log file
o Use ‘snoop’ to playback captured packets
o Playback ranges of packets
o Return layers 2-7 of OSI model and evaluate output
o Apply filters, similar to Berkelye Packet Filters (BPFs), and evaluate results
o Adjust time output, relative to current, and first packet captured
o Source FTP traffic from Windows 2003 and snoop credentials passed in clear-text
o Evaulate results
* TCPDump – Packet Sniffing
o Discuss the features and benefits of tcpdump
o Install tcpdump from the Software Companion DVD
o Identify installed package & man pages
o Discuss tcpdump-supported qualifiers for creating expressions & capturing packets
o Execute ‘tcpdump’ and evaluate captured packets
o Bind tcpdump to specific interfaces for capturing packets
o Apply Berkeley Packet Filters (BPFs) to capture sessions to suppress traffic
o Dump ‘tcpdump’ capture to log file and evaluate results
o Use ‘tcpdump’ to playback captured packets
o Source FTP traffic from Windows® 2003 host and sniff credentials passed in clear-text
o Source Telnet traffic from Windows® 2003 host and sniff credentials passed in clear-text
o Evaluate results
* Snort® 2.x Network Intrusion Detection System (NIDS) – Packet Sniffing & Logging
o Discuss the features and benefits of Snort® NIDS
o Discuss Snort® NIDS pre-requisites (libpcap/libpcre/compiler/etc.)
o Obtain, compile and install the Snort® Network Intrusion Detection System (NIDS)
o Identify and explain key operating modes (Sniffer/Logger/NIDS)
o Invoke Snort® in network sniffer mode
o Explore Snort® in Binary (TCPDUMP) logging mode
o Output logs to binary format and examine the results
o Implement Snort® with BPF to filter traffic
o Generate traffic from remote Windows 2003 and Linux hosts
o Use Snort® with Berkeley Packet Filter (BPF) to parse logs
* Network Mapper (Nmap)
o Discuss the features and benefits of Nmap
o Download Nmap bzip2 source package from insecure.org
o Compile & install Nmap
o Discuss default TCP-connect scan mode
o Discuss SYN-based scanning
o Use Nmap to perform reconnaisance testing
o Evaluate results
* Solaris® Zones – Containers – Virtualization – Instances
o Discuss the features, benefits and limitations of Solaris® Zones
o Discuss Global and Non-Global zones
o Identify file system location to house non-global zones
o Use ‘zonecfg’ to provision non-global zones
o Verify zone configuration using ‘zonecfg’
o Install non-global zones using ‘zoneadm’ and evaluate results
o Login to non-global zones and explore
o Evaluate results
o Manage zones using ‘zoneadm
Download Here:
Hotfile.com For USA, EU, Japan, Sing, Au, Ru, UAE, SA.
About admin
Hi, My Name is Hafeez. I am a webdesigner, blogspot developer and UI designer. I am a certified Themeforest top contributor and popular at JavaScript engineers. We have a team of professinal programmers, developers work together and make unique blogger templates.
0 comments:
Post a Comment