Wrapup Overview First half Last half First half


















- Slides: 18

Wrapup

Overview First half Last half

First half

First Half • Shells ▫ ▫ ▫ What is a shell and what does it do Most popular shells Redirection shell variables environment export and environment

First Half • Utilities and Filters ▫ ▫ ▫ What are filters and why to use them Filter examples (tail, diff, etc) Basics of regular expressions grep sed

First Half • Scripting ▫ Centered on BASH ▫ Basic operators �(conditionals, if, test, case, for, while, here docs, trap, signals, etc)

First half • NTP ▫ Centralized clock ▫ Many networked programs need a synchronized clock • Syslog ▫ Need a common clock when monitoring errors on a network

First half • SSH • DNS ▫ DNSSec • Distributed File Systems ▫ ▫ NFS SMB SAN NAS • RAID

First Half • System Auditing ▫ ▫ ▫ Run levels Services/Daemons iptables permissions Account management • System Hardening ▫ basic practices ▫ vulnerability databases

Last Half

Last Half • Network Auditing ▫ hardware roles �(hubs, switches, routers, etc. ) ▫ Tools �(ping, nmap, wireshark, etc. ) • Network Hardening ▫ ▫ firewalls dhcp hazards rogue devices vpn roles

Last half • Wireless I and II

Last Half • AWK ▫ who named for ▫ how to spell ▫ basic use �$n is the field on a line �blank is default delimiter �what is default std out �role of BEGIN and END

Last half • User Management ▫ Keberos • LDAP ▫ Good as standalone ▫ Better when teamed with another product • e. Mail ▫ TLS ▫ SPF �Verifies a domains valid mail servers �Does not validate content

Last Half • Replication ▫ Types: �Primary/backup �Master/Slave �Multi-master • Load Balancing ▫ What is it �Round Robin �Reverse Proxies ▫ Differences ▫ How to do

Last Half • System Administration ▫ sudo ▫ special attributes �(suid, guid, sticky bit) ▫ booting basics ▫ ▫ �init device files file systems tar, compress, gzip and zip package management �Why?

Last Half • SNMP ▫ basics of protocol ▫ security concerns �Most common version �Most secure version

Last Half • Configuration Management ▫ What is supposed to be on the systems ▫ What IS on the systems • Security Policies ▫ Procedures ▫ Objectives �Confidentiality �Integrity �Availability
@t.kfa:wrapup.playstation.com
First surname
First last
First last
First last
First.m.last format
Foil in math
Preamble field
First name last name tpu
Summary of scar in the joy luck club
Back action clasp
Mythological creature half man half horse
What is a half horse half man called
What is a myth
Minotaur greek mythology
Mulciber roman god
Half half clasp
Top half bottom half
Half mens half geit narnia