Linux class table of contents
Lessons
Week 1
- Course Intro and Overview (01:41)
- Getting Help / Discussion Forum
- Course Download (02:31)
- Creating a Local Lab Environment – Background (16:28)
- Exercise 1 – Creating a Local Lab Environment – Instructions (14 Pages)
- Exercise 1 – Walkthrough – Part I – Windows Users Only (04:18)
- Exercise 1 – Walkthrough – Part I – Mac Users Only (01:56)
- Exercise 1 – Walkthrough – Part I – Linux (CentOS/RHEL) Users Only (02:53)
- Exercise 1 – Walkthrough – Part II – All Users (22:54)
- Vagrant and VirtualBox Troubleshooting Tips (08:02)
- Local User Creation – Intro (02:47)
- Getting Started with Shell Scripting: Naming, Permissions, Variables, Built-ins (35:03)
- Special Variables, Pseudocode, Command Substitution, if Statement, Conditionals. (23:15)
- Exit Statuses, Return Codes, String Test Conditionals, More Special Variables. (17:39)
- Reading Standard Input, Creating Accounts, Username Conventions, More Quoting. (23:27)
- Local User Creation – Script 1 – Instructions (5 Pages)
- Local User Creation – Script 1 – Walkthrough (21:22)
- Submit Your Assignment for Script 1
- Watch me troubleshoot a student’s shell script (4:52)
Week 2
- Random Data, Cryptographic Hash Functions, Text and String Manipulation. (31:02)
- Positional Parameters, Arguments, for Loops, Special Parameters (29:48)
- The while Loop, Infinite Loops, Shifting, Sleeping (16:12)
- Local User Creation – Script 2 – Instructions (5 Pages)
- Local User Creation – Script 2 – Walkthrough (20:09)
- Submit Your Assignment for Script 2
- Advanced Standard Input, Standard Output, and Standard Error – Part I (13:26)
- Advanced Standard Input, Standard Output, and Standard Error – Part II (25:45)
- Local User Creation – Script 3 – Instructions (6 Pages)
- Local User Creation – Script 3 – Walkthrough (11:57)
- Submit Your Assignment for Script 3
- Review What You’ve Learned so Far (07:47)
Week 3
- Case Statements (19:56)
- Functions (33:09)
- Parsing Command Line Options with getopts, Part 1 (20:16)
- Parsing Command Line Options with getopts, Part 2 (17:34)
- Deleting and Disabling Linux Accounts, Part 1 of 4 (Finding Files) (11:23)
- Deleting and Disabling Linux Accounts, Part 2 of 4 (The userdel command) (5:06)
- Deleting and Disabling Linux Accounts, Part 3 of 4 (Archives with tar) (13:37)
- Deleting and Disabling Linux Accounts, Part 4 of 4 (Disabling Accounts) (8:08)
- Deleting Users – Script 4 – Instructions (7 Pages)
- Deleting Users – Script 4 – Walkthrough (32:47)
- Submit Your Assignment for Script 4
Week 4
- Cut and Awk (21:37)
- Cut and Awk Demonstration Script: Open Network Ports (9:43)
- Sort and Uniq (18:05)
- Parsing Log Files – Script 5 – Instructions (4 Pages)
- Parsing Log Files – Script 5 – Walkthrough (14:32)
- Submit Your Assignment for Script 5
- Data Manipulation and Text Transformations with Sed
- Configuring a Mini Network and Scripting for Remote Systems (30:11)
- Scripting Remote Commands – Script 6 – Instructions (12 Pages)
- Scripting Remote Commands – Script 6 – Walkthrough – Part 1 (25:44)
- Scripting Remote Commands – Script 6 – Walkthrough – Part 2 (12:37)
- Submit your Assignment for Script 6
- Scripting Software Installs, Both Local and Remote(27:40)
- Breaking and Continuing Loops (07:47)
- Remote Software Install – Script 7 – Instructions (8 Pages)
- Submit your Assignment for Script 7
- Remote Software Install – Script 7 – Walkthrough (16:25)
- Scheduling Your Scripts with Cron (25:55)
- Viewing Running Processes (13:35)
- Monitoring Processes – Script 8 – Instructions (7 Pages)
- Submit your Assignment for Script 8
- Monitoring Processes – Script 8 – Walkthrough
Bonus Week (Catch Up and Real World Implementation)
- Use this time to complete any assignments you missed and get help.
- Think of a task or something you would like to automate or script.
- Write the pseudocode for your script
- Write a shell script of YOUR choosing
- Submit your shell script.
- What Shell Scripting Is and Why You Should Learn It (09:38)
Linux Shell Scripting: A Project-Based Approach to Learning
Course Introduction
Course Intro and Overview (01:41)
Course Download (02:31)
Course Setup: Creating a Local Linux Shell Scripting Environment
Creating a Local Lab Environment – Background (16:28)
Exercise 1 – Creating a Local Lab Environment – Instructions (14 Pages)
Exercise 1 – Walkthrough – Part I – Windows Users Only (04:18)
Exercise 1 – Walkthrough – Part I – Mac Users Only (01:56)
Exercise 1 – Walkthrough – Part I – Linux (CentOS/RHEL) Users Only (02:53)
Exercise 1 – Walkthrough – Part II – All Users (22:54)
Vagrant and VirtualBox Troubleshooting Tips (08:02)
User and Account Creation – Shell Scripting Project 1
Local User Creation – Intro (02:47)
Getting Started with Shell Scripting: Naming, Permissions, Variables, Built-ins (35:03)
Special Variables, Pseudocode, Command Substitution, if Statement, Conditionals. (23:15)
Exit Statuses, Return Codes, String Test Conditionals, More Special Variables. (17:39)
Reading Standard Input, Creating Accounts, Username Conventions, More Quoting. (23:27)
Local User Creation – Exercise 2 – Instructions (5 Pages)
Local User Creation – Exercise 2 – Walkthrough (21:22)
Password Generation and Shell Script Arguments – Shell Scripting Project 2
Random Data, Cryptographic Hash Functions, Text and String Manipulation. (31:02)
Positional Parameters, Arguments, for Loops, Special Parameters (29:48)
The while Loop, Infinite Loops, Shifting, Sleeping (16:12)
Local User Creation – Exercise 3 – Instructions (5 Pages)
Local User Creation – Exercise 3 – Walkthrough (20:09)
Linux Programming Conventions – Shell Scripting Project 3
Advanced Standard Input, Standard Output, and Standard Error – Part I (13:26)
Advanced Standard Input, Standard Output, and Standard Error – Part II (25:45)
Local User Creation – Exercise 4 – Instructions (6 Pages)
Local User Creation – Exercise 4 – Walkthrough (11:57)
Parsing Command Line Options – Shell Scripting Project 4
Case Statements (19:56)
Functions (33:09)
Parsing Command Line Options with getopts, Part 1 (20:16)
Parsing Command Line Options with getopts, Part 2 (17:34)
Deleting and Disabling Linux Accounts, Part 1 of 4 (Finding Files) (11:23)
Deleting and Disabling Linux Accounts, Part 2 of 4 (The userdel command) (5:06)
Deleting and Disabling Linux Accounts, Part 3 of 4 (Archives with tar) (13:37)
Deleting and Disabling Linux Accounts, Part 4 of 4 (Disabling Accounts) (8:08)
Deleting Users – Exercise 5 – Instructions (7 Pages)
Deleting Users – Exercise 5 – Walkthrough (32:47)
Transforming Data / Data Processing / Reporting – Shell Scripting Project 5
Cut and Awk (21:37)
Cut and Awk Demonstration Script: Open Network Ports (9:43)
Sort and Uniq (18:05)
Parsing Log Files – Exercise – Instructions (4 Pages)
Parsing Log Files – Walkthrough (14:32)
Data Manipulation and Text Transformations with Sed
Network Scripting and Automation of Distributed Systems
Configuring a Mini Network and Scripting for Remote Systems (30:11)
Scripting Remote Commands – Exercise – Instructions (12 Pages)
Scripting Remote Commands – Walkthrough – Part 1 (25:44)
Scripting Remote Commands – Walkthrough – Part 2 (12:37)
Scripting Software Installs, Both Local and Remote(27:40)
Breaking and Continuing Loops (07:47)
Remote Software Install – Exercise – Instructions (8 Pages)
Remote Software Install – Walkthrough (16:25)
Scheduling Your Scripts with Cron (25:55)
Viewing Running Processes (13:35)
Monitoring Processes – Exercise – Instructions (7 Pages)
Monitoring Processes – Walkthrough (27:37)
Course Summary
Summary (07:47)
Course Extras
What Shell Scripting Is and Why You Should Learn It (09:38)
Open All · Close All
---------------------------------
Shell Scripting: Discover How to Automate Command Line Tasks
Lessons
Start Here – Course Overview and Downloads
- Course Overview
- Course Downloads, Including the scripts used in the course and a cheat sheet
Shell Scripting, Succinctly
- Section Overview – Shell Scripting, Succinctly
- Shell Scripting, Part I
- Shell Scripting, Part II
- Shell Scripting: Quiz 1
- Shell Scripting, Succinctly – Practice Exercises
Exit Statuses and Return Codes
- Exit Statuses and Return Codes
- Exit Status Demo
- Shell Scripting: Quiz 2 – Exit Statuses and Return Codes
- Exit Statuses and Return Codes – Practice Exercise
Functions
- Functions, Part I
- Functions, Part II
- Shell Scripting: Quiz 3 – Functions
- Functions – Practice Examples
Shell Script Checklist and Template
- Shell Script Checklist and Template (video)
- Shell Script Checklist and Template
Wildcards
- Introduction to Wildcards
- Wildcard Introduction, Part I
- Wildcard Introduction, Part II
- Wildcards in Shell Scripts
- Wildcard Scripting Demo
- Shell Scripting: Quiz 4 – Wildcards
- Wildcards – Practice Exercises
Case Statements
- Case Statements
- Shell Scripting: Quiz 5 – Case Statements
- Case Statements – Practice Exercises
Logging
- Logging
- Shell Scripting: Quiz 6 – Logging
- Logging – Practice Exercises
While Loops
- While Loops, Part I
- While Loops, Part II
- Shell Scripting: Quiz 7 – While Loops
- While Loops – Practice Exercises
Debugging
- Debugging Essentials
- More Debugging Tips
- Shell Scripting: Quiz 8 – Debugging
- Debugging – Practice Exercises
Data Manipulation and Text Transformations with Sed
- Data Manipulation and Text Transformations with Sed
Scripts Used to Create This Course
- Scripts Used to Create This Course
Slides
- Slides
Open All · Close All
-------------------------------------------
Linux Security
Lessons
Course Overview and Downloads
- Course Overview
- Course Downloads
General Security
- Section Overview – General Security
- Is Linux Secure?
- What Makes Linux Secure?
- Security Guidelines and Principles
- Section Summary – General Security
- Linux Security: Quiz 1 – General Security Principles
Physical Security
- Section Overview – Physical Security
- Physical Security Concepts
- Single User Mode Security
- Single User Mode and Blank Passwords
- Securing the Boot Loader
- Disk Encryption
- Encrypting a New Device, Part I
- Encrypting a New Device, Part II
- Encrypting an Existing Device
- Disabling Control Alt Delete
- Section Summary – Physical Security
- Linux Security: Quiz 2 – Physical Security
Account Security
- Section Overview – Account Security
- Intro to PAM
- PAM Configuration Example
- Password Security
- Account Security Demo #1 (UID 0)
- Controlling Account Access
- Security by Account Type
- Account Security Demo #2
- Account Security Demo #3 (Sudo)
- Linux Security: Quiz 3 – Account Security
Network Security
- Section Overview – Network Security
- Network Security, Part I
- Network Security, Part II
- Securing SSHD, Part I
- Securing SSHD, Part II
- Linux Firewall Fundamentals
- Configuring the Firewall from the Command Line
- Firewall Rule Specifications
- Example Firewall Rules
- Linux Firewall Demonstration
- Linux Security: Quiz 4 – Linux Firewalls
- TCP Wrappers, Part I
- TCP Wrappers, Part II
- Linux Security: Quiz 5 – Network Security
File System Security
- Section Overview – File System Security
- File and Directory Permissions, Intro
- File and Directory Permissions, Part I
- File and Directory Permissions, Part II
- Special Modes, Part I
- Special Modes, Part II
- File Attributes
- File Attributes Demo
- ACLs
- ACLs Demo
- Rootkits
- Rootkit Hunter Demonstration
- Rootkit Detection Software
Additional Security Resources
- Additional Security Resources
- Linux Hardening Guides
- Linux Security Email Lists
- Security Meetups List
- Security Conference Videos
Open All · Close All
you will learn Linux Security and Hardening
How to protect your Linux systems against hackers.
Ways to prevent attackers from breaking into your systems, even when they have physical access to your machine.
How to enforce strong password policies and control password as well as account aging policies on your Linux servers.
SSH Hardening practices.
Network security tactics.
Port scanning and network service detection.
How the Linux firewall works and exactly how to configure it.
How to protect the superuser (root) account.
Ways to share accounts securely with an audit trail.
File system security and encryption.
Using and configuring sudo, and why you need to.
Advanced Linux permissions include special modes, file attributes, and access control lists (ACLs).
Much, much more!
Unconditional 30 day money-back guarantee – that's my personal promise of your success!
you will be able to tighten up the security on any Linux system. You'll learn the security weaknesses of the Linux operating system and be given step-by-step instructions on how to protect those weaknesses. You'll even learn some security concepts that apply to information security as a whole while focusing on the Linux specific issues that require special consideration.
Monday, February 1, 2021
Linux class table of contents
Subscribe to:
Post Comments (Atom)
Git branch show detached HEAD
Git branch show detached HEAD 1. List your branch $ git branch * (HEAD detached at f219e03) 00 2. Run re-set hard $ git reset --hard 3. ...
-
snmpconfig command allow you to managge snmpv1/v3 agent configuration on SAN switch. Event trap level is mapped with event severity level....
-
Firmware upgrade on HPE SuperDom Flex 280 - prerequisites tasks a. Set up repo b. Upload firmware to your webserver 1. For foundation so...
-
Disabling the Telnet protocol on Brocade SAN switches By default, telnet is enabled on Brocade SAN switches. As part of security hardening o...
No comments:
Post a Comment