Quantcast
Channel: Download for Training » Linux
Viewing all 94 articles
Browse latest View live

LinuxCBT WebScan Edition

$
0
0

e4b26ccba2fc3642434ebe39702d6b05 LinuxCBT WebScan Edition

LinuxCBT WebScan Edition
English | mp4 | 1280×720 | h264, yuv420p, 5.00 fps(r) (eng)| aac, 44100 Hz, mono (eng) | 738.46 MB
Genre: eLearning

Focus: Web Server Scanning, System Requirements: Browser | [HTML5] | Flash | javascript, User Agents: Chrome | Safari | Firefox | IE9+ | Opera, Mobile Platforms: Droid | IOS | Mobiles | Tablets, Certificate of Completion: Auto-Generated, Duration: 4 Hours

Intro to Web Server Scanning with Nikto – Module XV
Introduction – Nikto – Features
Discuss Nikto Features
Pinpoint useful online resources
Identify key systems in topology
Explore possible scan targets

Nikto Installation
Download Nikto Web Scanner
Perform Installation
Explore run-time environment
Discuss Plugins – Signatures – DBs
Peruse configuration entries
Mention key CLI options

Staging Scan
Identify Staging targets
Scan Staging to ascertain server metadata
Perform comprehensive scans of targets
Watch web logs while scans are ongoing
Alter display of Web Scan Requests and Responses
Rule-out false-positives
Adjust security posture where applicable
Re-scan and compare and contrast

Production Scan
Identify PROD web instance
Discern useful metadata with reconnaissance
Drill deeper to determine more relevant attributes
Attempt to identify vulnerabilities on target
Peruse findings accordingly
Suggest methods of filtering false-positives

Reporting | Logging
Compare STDOUT to Report Data
Discuss Logging | Reporting options and formats
Enable Reports on various scans
Vary target reports for Cron mode
Tweak scans and redirect output accordingly

SSL Scans
Discuss applicabilitiy
Identify key options
Enable SSL scanning on targets
Compare Staging and Production output
Examine supported ciphers on targets
Search for cipher weaknesses
Evaluate results

Proxy Server Relay Scans
Discus pros and cons of Proxy Usage
Identify Squid Proxy Facility
Update Nikto configuration to support Proxy Usage
Perform Proxy Scans from multiple Web Scanners
Evaluate Proxy Requests | Responses in Real-Time
Compar and Contrast performance differentials
Evaluate results

Nikto Scan Tuning
Discuss features and benefits
Identify key Tuning Options
Filter scans to focus on targeted Plugins
Initiate multiple Tuned Scans
Evaluate Results

Buy_Premium_Account_To_Download_With_Speed_Maximum (Use my link to register and Buy Premium account^_^Recommend)

download LinuxCBT WebScan Edition
With a Premium account you can download files having Fullspeed !
Download from Uploaded
http://uploaded.net/file/rsryw0ks/20132957533_78778.part1.rar
http://uploaded.net/file/g9uwmc34/20132957533_78778.part2.rar

Download from Extabit
http://extabit.com/file/279mpbplrdsu8/20132957533_78778.part1.rar
http://extabit.com/file/279mpbplrdpn4/20132957533_78778.part2.rar

Download from Rapidgator
http://rapidgator.net/file/eb1872b23c796225ef4d22d6a31ac90e/20132957533_78778.part1.rar
http://rapidgator.net/file/be791265405e3cd64f51366bf13f5c0f/20132957533_78778.part2.rar

The post LinuxCBT WebScan Edition appeared first on Download for Training.


UnixCBT BSD9x Edition

$
0
0

e3cb38ca0c39c10d888994b6679aec30 UnixCBT BSD9x Edition

UnixCBT BSD9x Edition
English | mp4 | 1280×720 | h264, yuv420p, 5.00 fps(r) (eng)| aac, 44100 Hz, mono (eng) | 2.32 GB
Genre: eLearning

Focus: FreeBSD Unix Version 9x, System Requirements: Browser | [HTML5] | Flash | javascript, User Agents: Chrome | Safari | Firefox | IE9+ | Opera, Mobile Platforms: Droid | IOS | Mobiles | Tablets, Certificate of Completion: Auto-Generated, Duration: 16 Hours

Introduction | Features | Installations
Explore features of FreeBSD
Obtain appropo installation images
Perform standard installation
Obtain minimal boot images
Execute Internet installation
Discuss Intranet installation applications and benefits
Synch Base System to local Web Instance
Perform Intranet installation
Evaluate results

Post-Installation Exploration and Checks
Peruse Console dump
Confirm kernel hardware environment via ‘dmesg’ logs
Check allocated storage
Confirm hostname configuration
Identify IP configuration
Ensure proper name resolver(s) are configured
Explore IP re-configuration as an alternative
Identify and discuss Key BSD Files
Evaluate accordingly

Package Management – Ports | Packages | Updates
Discuss available package management facilities
Explain Ports applications
Peruse Ports environment
Install Ports and confirm accordingly
Discuss Port Audit applications
Install Port Audit on various targets
Attempt to install Ports post Port Audit and evaluate
Remedy Port Audit discrepancies where applicable
Discuss PortSnap applicability
Install PortSnap on various targets
Update Ports Trees as needed with PortSnap
Discuss pros and cons of Binary Packages
Install Binary Package as needed
Confirm ALL installed packages: Ports and Packages
Evaluate results

Unix Basics – Users – Permissions – Symlinks
Explore User | Group management with BSD Tools
Provision users | groups as needed on various targets
Manipulate provisioned objects using standard tools
Explore standard Unix File System Permissions
Apply common permissions to various objects
Test accessibility and debug accordingly
Discuss features of Symbolic Links
Implement Soft Links as needed
Confirm Soft Link behaviour | limitations
Implement Hard Links as needed
Contrast Hard | Soft Links
Consider applicability of various linking mechanisms
Evaluate results

Storage Management – GPART | GrowFS | SWAP
Discuss traditional BSD storage management facilities
Highlight limitations of various models
Introduce the attributes of GPART
Use GPART to dynamically provision partitions
Overlay File Systems as needed
Test storage of content
Backup | Restore Partition metadata
Extend existing partitions as desired
Re-provision File System overlays as needed
Discuss partition extension caveats
Evaluate results

Systems Management Basics – Kernel Environment | Client Tools | Cron
Explore standard BSD kernel environment
Highlight important files
Identify supported kernel options
Discuss loadable module support
Explore common client resolution tools
Use key network client tools to ascertain information
Explore system scheduler configuration
Provision scheduled item and monitor
Evaluate results

Log Management | Consolidation – Syslog | Newsyslog
Discuss available facilities
Explore standard Syslog configuration
Consolidate Syslogs across target BSD instances
Confirm log consolidation
Explore log rotation mechanism

top

IP Configuration and Management
Discuss available facilities
Explore default per-installation configuration
Oscillate between static and dynamic configurations
Provision multiple IP addresses across hosts
Debug routing issues as encountered
Standardise IP configuration based on logical per-host model
Evaluate results

Application Services – Unix|Apache|MySQL|PHP (UAMP) – Web Application Services
Implement Apache Web Server
Examine httpd.conf file directives
Implement virtual directories using Apache and symbollic links
Implement Redirects using Locate and various Apache directives
Configure virtual hosts bound to the primary IP address and port
Configure virtual hosts bound to alternate virtual IP addresses and ports
Implement Apache logging system per virtual host

MySQL Relational Database Management System
Install MySQL Relational Database Management System
Secure access to MySQL
Explore MySQL Terminal Monitor Client
Create sample MySQL database
Install PHPMyAdmin for web-based management of MySQL instances
Explain & Secure access to PHPMyAdmin
Explore PHPMyAdmin’s interface

PHP Integration
Discuss features and benefits
Build PHP support
Integrate PHP with MySQL
Troubleshoot integration issues
Re-build to enable various support
Confirm PHP applications support

Reconnaissance Tools
Install Dmitry Information Gatherer
Use Dmitry to query various targets
Evaluate information gathering features of Dmitry
Install current version of NMAP
Identify commonly used NMAP options/switches/parameters
Perform default TCP SYN-based ethical scans of local and remote resources
Explain typical TCP handshake protocol while using NMAP
Perform default TCP Connect-based ethical scans of local and remote resources
Identifiy key NMAP configuration files
Use NMAP to perform operating system fingerprinting and versioning
Peform subnet-wide ethical scans

download UnixCBT BSD9x Edition
With a Premium account you can download files having Fullspeed !
Download from Uploaded
http://uploaded.net/file/1a4atmho/201329575749_78777.part1.rar
http://uploaded.net/file/yse1l7q5/201329575749_78777.part2.rar
http://uploaded.net/file/f7rezhf0/201329575749_78777.part3.rar
http://uploaded.net/file/x302muhn/201329575749_78777.part4.rar

Download from Extabit
http://extabit.com/file/279mpbplqrbs0/201329575749_78777.part1.rar
http://extabit.com/file/279mpbplqri68/201329575749_78777.part2.rar
http://extabit.com/file/279mpbplqrbuo/201329575749_78777.part3.rar
http://extabit.com/file/279mpbplqri5c/201329575749_78777.part4.rar

Download from Rapidgator
http://rapidgator.net/file/0bf7964511e22d7e7d5a8d1797593e4c/201329575749_78777.part1.rar
http://rapidgator.net/file/cf0625ef628a38be3cfa662abcf3318b/201329575749_78777.part2.rar
http://rapidgator.net/file/4175d6a77c117927905badff0368f217/201329575749_78777.part3.rar
http://rapidgator.net/file/cd1807c1250ed5c9637c51ee6ca5aeab/201329575749_78777.part4.rar

The post UnixCBT BSD9x Edition appeared first on Download for Training.

LinuxCBT MemCacheD Edition Tutorial

$
0
0

07081d624ea04e68ca7057b35093c5e3 LinuxCBT MemCacheD Edition Tutorial

LinuxCBT MemCacheD Edition – Syllabus
English | Audio: aac, 44100 Hz, mono (eng)
MOV | Video: h264, yuv420p, 1358×766, 5.00 fps(r) (eng) | 536 MB
Genre: Video Training

Intro to Key | Value Caching – MemCacheD – Usage
Introduction – MemCacheD – Features
Discuss features and benefits

Discuss Caching Applicability
Identify Cache Hosts
Install MemCacheD
Confirm Configuration
Explore environment

MemCacheD – General Usage
Install MemCache Clients
Reveal various daemon statistics
Generate sample data
Insert sample data into cache
Evaluate Keys arbitrarily
Flush Key | Value Pairs and evaluate
Reload subset of sample data and evaluate
Discuss various storage commands
Generate and store arbitrary data
Evaluate accordingly

Cache Synchronization
Highlight important cross-application concepts
Discuss importance of Client Code
Vary source data accordingly and compare with Cache
Update Cache with latest data and evaluate
Insert arbitrary data with finite expiration
Test data access
Write $SHELL script to use Cache and Refresh accordingly
Evaluate results

MemCacheD – Cluster of Hosts
Discuss applicability
Highlight available targets and confirm configuration
Update targets accordingly
Invalidate Cache
Populate Cache with various data and evaluate
Confirm Key | Value pairs on various Cluster Nodes
Flush Results on targets
Reload and explore targets
Discuss concepts related to MemCacheD Clustering of Key | Value Pairs

MemCacheD – Python – Integration
Express usage features and concerns
Enable modular support for MemCacheD
Use Interactive interface to source MemCache objects
Issue common commands via Python against the Cache
Explore and discuss behaviour across Nodes
Author simple script to interact with MemCacheD
Automate procedure

MemCacheD – PHP – Includes
Consider features
Discuss sample usage scenarios
Generate usage files for inclusion
Ensure PHP support for MemCacheD
Author PHP script to Load Cached Key | Value pairs
Handle Cache Misses programatically
Debug as needed
Evaluate results

MemCacheD – PHP – SQL Queries
Discuss sample usage scenarios
Confirm MySQL DB | Table structure
Connect to MySQL via PHP
Confirm DBMS-provided results
Cache results if not present in Cache
Vary timers and monitor Cache behaviour
Evaluate results

MemCacheDB – Persistent – Key | Value – Storage
Contrast with MemCacheD
Discuss sample usage scenarios
Install MemCacheDB
Compare and Contrast footprint with MemCacheD
Test accessibility
Migrate sample scripts to use MemCacheDB
Debug as needed
Evaluate results

More: _http://www.linuxcbt.com/products_linuxcbt_memcached_edition.php

download LinuxCBT MemCacheD Edition Tutorial
With a Premium account you can download files having Fullspeed !
Download from Uploaded
http://uploaded.net/file/b0lcx14h/201356191159_80070.part1.rar
http://uploaded.net/file/qpscdojn/201356191159_80070.part2.rar

Download from Extabit
http://extabit.com/file/279ut76b3l46m/201356191159_80070.part1.rar
http://extabit.com/file/279ut76b3lam6/201356191159_80070.part2.rar

Download from Rapidgator
http://rapidgator.net/file/10013dac3d93d284de9a56788f1f9603/201356191159_80070.part1.rar
http://rapidgator.net/file/3ea6ee05ee4796312a358f14477b056e/201356191159_80070.part2.rar

The post LinuxCBT MemCacheD Edition Tutorial appeared first on Download for Training.

LinuxCBT PAM Edition

$
0
0

f1d4ad0a5faf0e7c159addfecbacc888 LinuxCBT PAM Edition

LinuxCBT PAM Edition

Introduction – Topology – Features
Discuss course outline
Explore system configuration
Explore network topology
Identify primary PAM systems
Enumerate and discuss key PAM features

PAM Rules Files & Syntax
Identify key PAM configuration files
Explain the purpose of the /etc/pam.d/other PAM rules file
Discuss PAM’s 4 management tasks
Identify the 4 tokens supported within PAM rules files
Explain possible values for the 4 supported rules file tokens
Discuss PAM’s stacking of rules for the 4 management tasks
Examine the /etc/pam.d/sshd PAM rules file for the SSHD service/daemon
Explore the contents of included PAM rules files

Common PAMs – Identify & Discuss Commonly Implemented PAMs
Explain the purpose and implementation of pam_echo
Test pam_echo using SSH
Explain the purpose and implementation of pam_warn
Explain the purpose and implementation of pam_deny
Identify instances of pam_warn and pam_deny modules
Explain the purpose and implementation of pam_unix2
Identify instances of pam_unix2 module
Explain the purpose and implementation of pam_env
Explain the purpose and implementation of pam_ftp
Peruse /etc/pam.d/vsftpd and discuss the implemenation of pam_ftp
Explain the purpose and implementation of pam_lastlog
Explain the purpose and implementation of pam_limits
Explain the purpose and implementation of pam_listfile
Explain the purpose and implementation of pam_nologin

Account Policies with PAM
Explain authentication flow when using PAM
Discuss account policies features
Identify and peruse the default account policies file: /etc/login.defs
Discus PAM’s usage of /etc/login.defs as it pertains to system security
Discuss pam_pwcheck is maintaining system policy
Configure pam_pwcheck to support minimum password length
Correlate pam_pwcheck system policy to user accounts database
Configure pam_pwcheck to support password history
Use chage to enumerate and change user accounts’ attributes associated with system policy

PAM Tally
Explain applications of pam_tally
Identify failed logins log file: /var/log/faillog
Identify PAM authentication messages in /var/log/messages
Compare and contrast pam_tally with faillog
Use pam_tally to display user’s tally
Enable pam_tally system-wide with desired policy
Fail to login multiple times, exceeding the system policy and evaluate results
Reset user’s login count using pam_tally and faillog
Redirect PAM log messages using Syslog-NG

PAM Password Quality Check (pam_passwdqc)
Identify pam_passwdqc using RPM
Discuss features
Enumerate the supported password character classes – Complex passwords
Replace pam_pwcheck with pam_passwdqc using at least 2 character classes
Test password policy in non-enforcing mode
Evaluate the effects
Enable password policy in enforcing mode and evaluate
Alter character class and length (complexity) requirements and evaluate

PAM Time – Time-based Access Control
Discuss features
Explain configuration file syntax
Impose restrictions on common services
Evaluate results

PAM Nologin
Discuss features
Explain configuration file syntax
Implement nologin module via /etc/nologin
Evaluate results

PAM Limits – System Resource Limits Controlled by PAM
Discuss features
Explain configuration file syntax
Impose restrictions on system resources
Evaluate results

PAM Authentication with Apache
Discuss features and desired result
Install Apache and development modules providing apxs support
Download PAM Apache module
Compile and install PAM Apache module
Configure Apache web site to support PAM
Evaluate results

PAM Make $HOME Dir
Explore features
Implement pam_mkhomedir
Create new accounts without $HOME
Evaluate module results

PAM Execute Processes
Discuss applicability
Implement pam_exec with various types
Evaluate module results

PAM Password History | Policy Enforcement
Discuss benefits
Implement pam_pwhistory
Tweak defaults
Evaluate module results
Implement pam_pwcheck
Contrast with pam_pwhistory
Apply policy to all users
Evaluate resuls

PAM Wheel
Consider applications
Implement pam_wheel
Evaluate resuls

download LinuxCBT PAM Edition
With a Premium account you can download files having Fullspeed !
Download from Uploaded
http://uploaded.net/file/opg0d5y1/20135641858_79848.part1.rar
http://uploaded.net/file/szvwjjxp/20135641858_79848.part2.rar

Download from Extabit
http://extabit.com/file/279ut76az8xry/20135641858_79848.part1.rar
http://extabit.com/file/279ut76az7sji/20135641858_79848.part2.rar

Download from Rapidgator
http://rapidgator.net/file/1ba87375aeac827ca8239659b1a2dc81/20135641858_79848.part1.rar
http://rapidgator.net/file/8cc37d718e24f4e2fac6d5a4b1262702/20135641858_79848.part2.rar

The post LinuxCBT PAM Edition appeared first on Download for Training.

LinuxCBT – PAM Edition Training

$
0
0

10e24c6cced6921c401da2895236bcb3 LinuxCBT – PAM Edition Training

LinuxCBT – PAM Edition Training | 558.10 MB
Course Objective

PAM Security – Module VII

Introduction – Topology – Features
Discuss course outline
Explore system configuration
Explore network topology
Identify primary PAM systems
Enumerate and discuss key PAM features

PAM Rules Files & Syntax
Identify key PAM configuration files
Explain the purpose of the /etc/pam.d/other PAM rules file
Discuss PAM’s 4 management tasks
Identify the 4 tokens supported within PAM rules files
Explain possible values for the 4 supported rules file tokens
Discuss PAM’s stacking of rules for the 4 management tasks
Examine the /etc/pam.d/sshd PAM rules file for the SSHD service/daemon
Explore the contents of included PAM rules files

Common PAMs – Identify & Discuss Commonly Implemented PAMs
Explain the purpose and implementation of pam_echo
Test pam_echo using SSH
Explain the purpose and implementation of pam_warn
Explain the purpose and implementation of pam_deny
Identify instances of pam_warn and pam_deny modules
Explain the purpose and implementation of pam_unix2
Identify instances of pam_unix2 module
Explain the purpose and implementation of pam_env
Explain the purpose and implementation of pam_ftp
Peruse /etc/pam.d/vsftpd and discuss the implemenation of pam_ftp
Explain the purpose and implementation of pam_lastlog
Explain the purpose and implementation of pam_limits
Explain the purpose and implementation of pam_listfile
Explain the purpose and implementation of pam_nologin

Account Policies with PAM
Explain authentication flow when using PAM
Discuss account policies features
Identify and peruse the default account policies file: /etc/login.defs
Discus PAM’s usage of /etc/login.defs as it pertains to system security
Discuss pam_pwcheck is maintaining system policy
Configure pam_pwcheck to support minimum password length
Correlate pam_pwcheck system policy to user accounts database
Configure pam_pwcheck to support password history
Use chage to enumerate and change user accounts’ attributes associated with system policy

PAM Tally
Explain applications of pam_tally
Identify failed logins log file: /var/log/faillog
Identify PAM authentication messages in /var/log/messages
Compare and contrast pam_tally with faillog
Use pam_tally to display user’s tally
Enable pam_tally system-wide with desired policy
Fail to login multiple times, exceeding the system policy and evaluate results
Reset user’s login count using pam_tally and faillog
Redirect PAM log messages using Syslog-NG

PAM Password Quality Check (pam_passwdqc)
Identify pam_passwdqc using RPM
Discuss features
Enumerate the supported password character classes – Complex passwords
Replace pam_pwcheck with pam_passwdqc using at least 2 character classes
Test password policy in non-enforcing mode
Evaluate the effects
Enable password policy in enforcing mode and evaluate
Alter character class and length (complexity) requirements and evaluate

PAM Time – Time-based Access Control
Discuss features
Explain configuration file syntax
Impose restrictions on common services
Evaluate results

PAM Nologin
Discuss features
Explain configuration file syntax
Implement nologin module via /etc/nologin
Evaluate results

PAM Limits – System Resource Limits Controlled by PAM
Discuss features
Explain configuration file syntax
Impose restrictions on system resources
Evaluate results

PAM Authentication with Apache
Discuss features and desired result
Install Apache and development modules providing apxs support
Download PAM Apache module
Compile and install PAM Apache module
Configure Apache web site to support PAM
Evaluate results

PAM Make $HOME Dir
Explore features
Implement pam_mkhomedir
Create new accounts without $HOME
Evaluate module results

PAM Execute Processes
Discuss applicability
Implement pam_exec with various types
Evaluate module results

PAM Password History | Policy Enforcement
Discuss benefits
Implement pam_pwhistory
Tweak defaults
Evaluate module results
Implement pam_pwcheck
Contrast with pam_pwhistory
Apply policy to all users
Evaluate resuls

PAM Wheel
Consider applications
Implement pam_wheel
Evaluate resuls

Read More: http://www.linuxcbt.com/products_linuxcbt_pam_edition.php

download LinuxCBT – PAM Edition Training
With a Premium account you can download files having Fullspeed !
Download from Uploaded
http://uploaded.net/file/4mmrb66f/201356185923_80074.part1.rar
http://uploaded.net/file/k9nmh7bx/201356185923_80074.part2.rar

Download from Extabit
http://extabit.com/file/279ut76b3l11a/201356185923_80074.part1.rar
http://extabit.com/file/279ut76b3lalq/201356185923_80074.part2.rar

Download from Rapidgator
http://rapidgator.net/file/48b55154c7da36b747d620e47bc643a4/201356185923_80074.part1.rar
http://rapidgator.net/file/7939d30b768a16b87fa6af01d1392d6d/201356185923_80074.part2.rar

The post LinuxCBT – PAM Edition Training appeared first on Download for Training.

LinuxCBT – PAM Edition

$
0
0

7a5b28c6f0035c7af5de6346af95e98b LinuxCBT – PAM Edition

LinuxCBT – PAM Edition
English | Video 800×600 | E-Learning | 558.10 MB
Focus: Pluggable Authenticaiton Modules (PAM)

Course Objective

PAM Security – Module VII

Introduction – Topology – Features
Discuss course outline
Explore system configuration
Explore network topology
Identify primary PAM systems
Enumerate and discuss key PAM features

PAM Rules Files & Syntax
Identify key PAM configuration files
Explain the purpose of the /etc/pam.d/other PAM rules file
Discuss PAM’s 4 management tasks
Identify the 4 tokens supported within PAM rules files
Explain possible values for the 4 supported rules file tokens
Discuss PAM’s stacking of rules for the 4 management tasks
Examine the /etc/pam.d/sshd PAM rules file for the SSHD service/daemon
Explore the contents of included PAM rules files

Common PAMs – Identify & Discuss Commonly Implemented PAMs
Explain the purpose and implementation of pam_echo
Test pam_echo using SSH
Explain the purpose and implementation of pam_warn
Explain the purpose and implementation of pam_deny
Identify instances of pam_warn and pam_deny modules
Explain the purpose and implementation of pam_unix2
Identify instances of pam_unix2 module
Explain the purpose and implementation of pam_env
Explain the purpose and implementation of pam_ftp
Peruse /etc/pam.d/vsftpd and discuss the implemenation of pam_ftp
Explain the purpose and implementation of pam_lastlog
Explain the purpose and implementation of pam_limits
Explain the purpose and implementation of pam_listfile
Explain the purpose and implementation of pam_nologin

Account Policies with PAM
Explain authentication flow when using PAM
Discuss account policies features
Identify and peruse the default account policies file: /etc/login.defs
Discus PAM’s usage of /etc/login.defs as it pertains to system security
Discuss pam_pwcheck is maintaining system policy
Configure pam_pwcheck to support minimum password length
Correlate pam_pwcheck system policy to user accounts database
Configure pam_pwcheck to support password history
Use chage to enumerate and change user accounts’ attributes associated with system policy

PAM Tally
Explain applications of pam_tally
Identify failed logins log file: /var/log/faillog
Identify PAM authentication messages in /var/log/messages
Compare and contrast pam_tally with faillog
Use pam_tally to display user’s tally
Enable pam_tally system-wide with desired policy
Fail to login multiple times, exceeding the system policy and evaluate results
Reset user’s login count using pam_tally and faillog
Redirect PAM log messages using Syslog-NG

PAM Password Quality Check (pam_passwdqc)
Identify pam_passwdqc using RPM
Discuss features
Enumerate the supported password character classes – Complex passwords
Replace pam_pwcheck with pam_passwdqc using at least 2 character classes
Test password policy in non-enforcing mode
Evaluate the effects
Enable password policy in enforcing mode and evaluate
Alter character class and length (complexity) requirements and evaluate

PAM Time – Time-based Access Control
Discuss features
Explain configuration file syntax
Impose restrictions on common services
Evaluate results

PAM Nologin
Discuss features
Explain configuration file syntax
Implement nologin module via /etc/nologin
Evaluate results

PAM Limits – System Resource Limits Controlled by PAM
Discuss features
Explain configuration file syntax
Impose restrictions on system resources
Evaluate results

PAM Authentication with Apache
Discuss features and desired result
Install Apache and development modules providing apxs support
Download PAM Apache module
Compile and install PAM Apache module
Configure Apache web site to support PAM
Evaluate results

PAM Make $HOME Dir
Explore features
Implement pam_mkhomedir
Create new accounts without $HOME
Evaluate module results

PAM Execute Processes
Discuss applicability
Implement pam_exec with various types
Evaluate module results

PAM Password History | Policy Enforcement
Discuss benefits
Implement pam_pwhistory
Tweak defaults
Evaluate module results
Implement pam_pwcheck
Contrast with pam_pwhistory
Apply policy to all users
Evaluate resuls

PAM Wheel
Consider applications
Implement pam_wheel
Evaluate resuls

download LinuxCBT – PAM Edition
With a Premium account you can download files having Fullspeed !
Download from Uploaded
http://uploaded.net/file/4myz8esu/20134613321_79920.part1.rar
http://uploaded.net/file/83sr18l6/20134613321_79920.part2.rar

Download from Extabit
http://extabit.com/file/279ut76azvepa/20134613321_79920.part1.rar
http://extabit.com/file/279ut76azu6im/20134613321_79920.part2.rar

Download from Rapidgator
http://rapidgator.net/file/37c8ff1ee459d1054cc04791f7c95c04/20134613321_79920.part1.rar
http://rapidgator.net/file/1e522e441252d9b2e4256571c022073d/20134613321_79920.part2.rar

The post LinuxCBT – PAM Edition appeared first on Download for Training.

LinuxCBT – Ruby Edition Training

$
0
0

3b4e3401b3fefb36d211c7bc967b3191 LinuxCBT – Ruby Edition Training

LinuxCBT – Ruby Edition Training | 725.92 MB
Course Objective

Ruby on Windows | Linux Scripting Environment – Module VII

Features & Basics
Discuss key features
Install on Windows
Explore interactive | non-interactive environments
Draw parallels to Python & Perl
Define and manipulate common string-type VARs
Evaluate results

Arrays | Hashes
Discuss applicability
Define sample arrays & hashes
Manipulate using applicable methods
Evaluate results

Simple Class Definition
Discuss Ruby OO-environment
Define simple class with references to predefined methods
Instantiate and call accordingly
Update as needed with enhanced functionality
Evaluate results

Iteration | Conditions
Explain the Ruby iteration model
Generate enumerable types and iterate
Discuss traditional iteration support
Trap and manipulate enumerable entities
Explore various conditional forms
Branch code with appropriate conditional test
Evaluate resutls

Regular Expressions (RegExes)
Discuss applicability
Enumerate useful metacharacters
Perform matches as needed
Filter data and evaluate

File IO Introdution
Discuss capabilities
Identify key classes & methods
Construct references to file IO classes & methods
Process data accordingly
Prepare to write scripts with File IO classes

Ruby Scripts
Discuss features & beneftis
Mass Copy | Move script for general purposes
Normalize files based on criteria
Compare and contrast with other languages
Evaluate results

Logger Class
Discuss relevance & applicability
Construct skeleton class with desired functionality
Extend capabilities of class as needed
Commit class to library
Require class in front-end scripts
Explore both Windows | Linux operability
Evaluate results

Exception Handling | Parameter Validation
Explain exception handling model
Compare and contrast with traditional erro-handling scheme
Trap important code within exception blocks
Handle errors accordingly
Validate input parameters
Evaluate results
Read More:http://www.linuxcbt.com/products_linuxcbt_ruby_edition.php

download LinuxCBT – Ruby Edition Training
With a Premium account you can download files having Fullspeed !
Download from Uploaded
http://uploaded.net/file/hnt1ny7r/2013561924_80073.part1.rar
http://uploaded.net/file/q3nqdst1/2013561924_80073.part2.rar

Download from Extabit
http://extabit.com/file/279ut76azupge/2013561924_80073.part1.rar
http://extabit.com/file/279ut76b0hg5a/2013561924_80073.part2.rar

Download from Rapidgator
http://rapidgator.net/file/b9cc1f680319080920c59a6e0be4a041/2013561924_80073.part1.rar
http://rapidgator.net/file/da8cce2e8d309e00d80dafee84582091/2013561924_80073.part2.rar

The post LinuxCBT – Ruby Edition Training appeared first on Download for Training.

LinuxCBT – WebScan Edition Tutorial

$
0
0

1b1d908a47727d680c80a0ea5b7bae67 LinuxCBT – WebScan Edition Tutorial

LinuxCBT – WebScan Edition
English | Audio: aac, 44100 Hz, mono (eng)
MOV | Video: h264, yuv420p, 1358×766, 5.00 fps(r) (eng) | 738 MB
Genre: Video Training

Focus: Web Server Scanning, System Requirements: Browser | [HTML5] | Flash | javascript, User Agents: Chrome | Safari | Firefox | IE9+ | Opera, Mobile Platforms: Droid | IOS | Mobiles | Tablets, Certificate of Completion: Auto-Generated, Duration: 4 Hours

Intro to Web Server Scanning with Nikto – Module XV
Introduction – Nikto – Features
Discuss Nikto Features
Pinpoint useful online resources
Identify key systems in topology
Explore possible scan targets

Nikto Installation
Download Nikto Web Scanner
Perform Installation
Explore run-time environment
Discuss Plugins – Signatures – DBs
Peruse configuration entries
Mention key CLI options

Staging Scan
Identify Staging targets
Scan Staging to ascertain server metadata
Perform comprehensive scans of targets
Watch web logs while scans are ongoing
Alter display of Web Scan Requests and Responses
Rule-out false-positives
Adjust security posture where applicable
Re-scan and compare and contrast

Production Scan
Identify PROD web instance
Discern useful metadata with reconnaissance
Drill deeper to determine more relevant attributes
Attempt to identify vulnerabilities on target
Peruse findings accordingly
Suggest methods of filtering false-positives

Reporting | Logging
Compare STDOUT to Report Data
Discuss Logging | Reporting options and formats
Enable Reports on various scans
Vary target reports for Cron mode
Tweak scans and redirect output accordingly

SSL Scans
Discuss applicabilitiy
Identify key options
Enable SSL scanning on targets
Compare Staging and Production output
Examine supported ciphers on targets
Search for cipher weaknesses
Evaluate results

Proxy Server Relay Scans
Discus pros and cons of Proxy Usage
Identify Squid Proxy Facility
Update Nikto configuration to support Proxy Usage
Perform Proxy Scans from multiple Web Scanners
Evaluate Proxy Requests | Responses in Real-Time
Compar and Contrast performance differentials
Evaluate results

Nikto Scan Tuning
Discuss features and benefits
Identify key Tuning Options
Filter scans to focus on targeted Plugins
Initiate multiple Tuned Scans
Evaluate Results

download LinuxCBT – WebScan Edition Tutorial
With a Premium account you can download files having Fullspeed !
Download from Uploaded
http://uploaded.net/file/im1wkoi8/2013561952_80072.part1.rar
http://uploaded.net/file/30fu4612/2013561952_80072.part2.rar

Download from Extabit
http://extabit.com/file/279ut76azuj5a/2013561952_80072.part1.rar
http://extabit.com/file/279ut76azupgu/2013561952_80072.part2.rar

Download from Rapidgator
http://rapidgator.net/file/ae9c4482be337874bab6ea21ecd05b5e/2013561952_80072.part1.rar
http://rapidgator.net/file/01b033a18d3ecaac8ea4135401e7438e/2013561952_80072.part2.rar

The post LinuxCBT – WebScan Edition Tutorial appeared first on Download for Training.


LinuxCBT – Win-Awk-Sed Edition Training

$
0
0

44f891e71b914c13ac065d427f8a5684 LinuxCBT – Win Awk Sed Edition Training

LinuxCBT – Win-Awk-Sed Edition Training | 773.57 MB
Course Objective

Awk & Sed on Windows – Field & Stream Transformation – Module V

Sed – Basics
Download & Install
Explore environment
Update accordingly to provide access
Discuss key features
Peruse usage options

Sed – Search & Replace
Discuss features
Regular Expressions review
Access ranges of data
Remove content from data feeds
Discuss applicable options
Transform various data
Incorporate back-references into data-selection
Confront common escape sequences

Sed – File Names & Paths
Prepare sample data
Develop RegExes to parse accordingly
Debug as necessary
Parse Windows and Unix | Linux paths
Parse HTML content
Evaluate results

Sed – Scripts & Tasks
Explain typical usage
Write scripts for various tasks
Remove HTML tags
Explore common tasks

Awk – Basics
Discuss common features
Explore addresses and patterns
Compare and contrast with Sed

Awk – Transform Delimiters
Identify typical tasks
Prepare data-set
Parse and transform delimiters as necessary
Evaluate results

Awk – Scripts & Tasks
Explain script structure
Exploit structural options
Note escaping concerns
Reference built-ins as needed
Produce reports on processed data
Explore record separators

Awk – Log Parsing – Miscellaneous
Stage typical scenario
Parse IIS web logs to suit criteria
Process system logs
Explore miscellaneous commands
Evaluate results
Read More: http://www.linuxcbt.com/products_linuxcbt_win-awk-sed_edition.php

download LinuxCBT – Win Awk Sed Edition Training
With a Premium account you can download files having Fullspeed !
Download from Uploaded
http://uploaded.net/file/g6titp8x/201356191832_80068.part1.rar
http://uploaded.net/file/sw8gss5x/201356191832_80068.part2.rar

Download from Extabit
http://extabit.com/file/279ut76b3l472/201356191832_80068.part1.rar
http://extabit.com/file/279ut76b3l13i/201356191832_80068.part2.rar

Download from Rapidgator
http://rapidgator.net/file/1a6530bc7d5f81d32c1590a0dded5db4/201356191832_80068.part1.rar
http://rapidgator.net/file/82afa2e8f4d8ed10b90c3180d1af2c12/201356191832_80068.part2.rar

The post LinuxCBT – Win-Awk-Sed Edition Training appeared first on Download for Training.

LinuxCBT – WinPython Edition Tutorial

$
0
0

34681437d5bd61c18175ae9dd9803e5a LinuxCBT – WinPython Edition Tutorial

LinuxCBT – WinPython Edition
English | Audio: aac, 44100 Hz, mono (eng)
MOV | Video: h264, yuv420p, 1280×720, 5.00 fps(r) (eng) | 743 MB
Genre: Video Training

Focus: Windows® Python Scripting, System Requirements: Browser | [HTML5] | Flash | javascript, User Agents: Chrome | Safari | Firefox | IE9+ | Opera, Mobile Platforms: Droid | IOS | Mobiles | Tablets, Certificate of Completion: Auto-Generated

Python on Windows
Basics
Discuss features
Download & Install
Explore environment
Derive OS-related values
Peruse variables: scalar, sequences, tuples, sets
Use interactive | non-interactive modes
Transform & slice data accordingly
Manage lists with relevant functions

Conditions
Discuss applications
Confirm and validate supplied arguments
Integrate Regular Expressions (RegEx)
Navigate standard conditional branches

Loops
Cycle through sequences using FOR
Traverse lists
Generate sequences with range()
Iterate over the contents of textual data
Use WHILE similarly
Evaluate

Error Handling with Exceptions
Discuss features and benefits
Implement error handling using TRY and EXCEPT
Trap various errors based on classes of interest
Provision catchall exceptions

File I/O
Discuss features and modes
Open content as string and list
Integrate exception handling
Strip superfluous delimiters
Modify I/O stream to suit objectives
Write transformed I/O
Ascertain OS statistics as needed

Checksum Generation
Discuss necessity
Identify key hash library and supported checksums
Integrate glob() function
Auto-generate checksums on specified content
Evaluate results

Mass Copy & Normalization of Files
Define objective
Parse delimiters as needed
Segregate file elements accordingly
Substitute desired delimiters
Normalize format
Determine delimiters from source files
Evaluate output

FTP
Implement FTP client library with encryption support to remote instance
Parse and retrieve latest content as per objective
Confirm results

Directory Tree Copy
Identify limitations
Import relevant modules
Duplicate desired directory trees
Confirm results

Process Execution
Discuss applicability
Implement system calls
Parse returned results
Evaluate accordingly

URL Library
Explain features
Import relevant modules
Implement HTTP client access
Submit variables to server-side process
Evaluate returned data

download LinuxCBT – WinPython Edition Tutorial
With a Premium account you can download files having Fullspeed !
Download from Uploaded
http://uploaded.net/file/aok499vh/20135619849_80071.part1.rar
http://uploaded.net/file/tylzzamm/20135619849_80071.part2.rar

Download from Extabit
http://extabit.com/file/279ut76azv5b2/20135619849_80071.part1.rar
http://extabit.com/file/279ut76azv25a/20135619849_80071.part2.rar

Download from Rapidgator
http://rapidgator.net/file/da611b39122eae007def6e8b6ea165c7/20135619849_80071.part1.rar
http://rapidgator.net/file/c359669384a43a4083efca2686f795eb/20135619849_80071.part2.rar

The post LinuxCBT – WinPython Edition Tutorial appeared first on Download for Training.

LinuxCBT – BASH II Edition Training

$
0
0

c39098e2774f9d0e971fb4326a66a7b4 LinuxCBT – BASH II Edition Training

LinuxCBT – BASH II Edition Training | 850MB

Course Objective

Bourne Again Shell (BASH) Scripting II

INIT & Cron Scripts
Identify features & characteristics
Parse INIT & Cron scripts
Explore variables & function references
Evaluate system applicability
Command Line Interface (CLI) Arguments
Explain features
Explore defaults
Pass arguments and evaluate interpolation
Expose CLI argument counter
Ensure appropriate CLI arguments upon invocation
Find Failed Logins
Auto-generate requisite directory structure
Identify relevant logs
Default searched user
Integrate ? ?awk? ™ & ? ?sed? ™ accordingly
Correlate search string with defined user
Core Dump Removal Simulation
Generate core dumps in disparate file system locations
Invoke simultaneous logs of activity
Qualify references
Mail process results
Storage Availability Stub
Discuss relevance
Integrate ? ?df? ™, ? ?awk? ™, & ? ?grep? ™
Parse interesting output
Compare derivation with defined thresholds
Check Remote Service
Explain objective
Identify remote service
Integrate SSH
Trap service status accordingly
Loop variable hosts
Debug appropriately
Backup Snapshots
Identify need
Integrate storage availability stub
Enlist ? ?tar? ™ & ? ?bzip2? ?
Flex script to handle differential snapshots
Vary snapshot by day
Tidy remnants
Extend process to encrypt snapshots
Error-Handling
Restructure process to handle errors
Except positive & negative results
Define appropriate functions
Promulgate function references
Test efficacy
Free Memory & Swap
Define reusable stub
Integrate with existing processes
Vary thresholds
Execute and evalute
Logger Stub
Reveal usefulness
Define and contain parameters in a function
Integrate function accordingly
Checksum Generator
Identify objective
Integrate CLI ARGS stub
Integrate logger stub
Generate desired checksums for variable content
Purge History
Justify applicability
Explore history environment
Ensure history management across shell invocations
Monitor Page Loads
Explain scenario
Integrate ? ?wget? ™
Define thresholds
Code appropriate traps
Average page loads over time

download LinuxCBT – BASH II Edition Training
With a Premium account you can download files having Fullspeed !
Download from Uploaded
http://uploaded.net/file/vqwjxmf3/201366123920_80209.part1.rar
http://uploaded.net/file/fr7m0g5f/201366123920_80209.part2.rar

Download from Extabit
http://extabit.com/file/279ut81zy3wzi/201366123920_80209.part1.rar
http://extabit.com/file/279ut81zy3wy6/201366123920_80209.part2.rar

Download from Rapidgator
http://rapidgator.net/file/b2e962ae83160a32a5d5afbb86feb026/201366123920_80209.part1.rar
http://rapidgator.net/file/c10827e471f366511e01a70d99cc0f31/201366123920_80209.part2.rar

The post LinuxCBT – BASH II Edition Training appeared first on Download for Training.

UnixCBT – BSD9x Edition Training

$
0
0

e3c6da83296662b343401932e8de73b0 UnixCBT – BSD9x Edition Training

UnixCBT – BSD9x Edition Training | 2.32 Gb

Course Objective

Introduction | Features | Installations
Explore features of FreeBSD
Obtain appropo installation images
Perform standard installation
Obtain minimal boot images
Execute Internet installation
Discuss Intranet installation applications and benefits
Synch Base System to local Web Instance
Perform Intranet installation
Evaluate results
Post-Installation Exploration and Checks
Peruse Console dump
Confirm kernel hardware environment via ? ?dmesg? ™ logs
Check allocated storage
Confirm hostname configuration
Identify IP configuration
Ensure proper name resolver(s) are configured
Explore IP re-configuration as an alternative
Identify and discuss Key BSD Files
Evaluate accordingly

Package Management ? ” Ports | Packages | Updates
Discuss available package management facilities
Explain Ports applications
Peruse Ports environment
Install Ports and confirm accordingly
Discuss Port Audit applications
Install Port Audit on various targets
Attempt to install Ports post Port Audit and evaluate
Remedy Port Audit discrepancies where applicable
Discuss PortSnap applicability
Install PortSnap on various targets
Update Ports Trees as needed with PortSnap
Discuss pros and cons of Binary Packages
Install Binary Package as needed
Confirm ALL installed packages: Ports and Packages
Evaluate results
Unix Basics ? ” Users ? ” Permissions ? ” Symlinks
Explore User | Group management with BSD Tools
Provision users | groups as needed on various targets
Manipulate provisioned objects using standard tools
Explore standard Unix File System Permissions
Apply common permissions to various objects
Test accessibility and debug accordingly
Discuss features of Symbolic Links
Implement Soft Links as needed
Confirm Soft Link behaviour | limitations
Implement Hard Links as needed
Contrast Hard | Soft Links
Consider applicability of various linking mechanisms
Evaluate results
Storage Management ? ” GPART | GrowFS | SWAP
Discuss traditional BSD storage management facilities
Highlight limitations of various models
Introduce the attributes of GPART
Use GPART to dynamically provision partitions
Overlay File Systems as needed
Test storage of content
Backup | Restore Partition metadata
Extend existing partitions as desired
Re-provision File System overlays as needed
Discuss partition extension caveats
Evaluate results
Systems Management Basics ? ” Kernel Environment | Client Tools | Cron
Explore standard BSD kernel environment
Highlight important files
Identify supported kernel options
Discuss loadable module support
Explore common client resolution tools
Use key network client tools to ascertain information
Explore system scheduler configuration
Provision scheduled item and monitor
Evaluate results

Log Management | Consolidation Syslog | Newsyslog
Discuss available facilities
Explore standard Syslog configuration
Consolidate Syslogs across target BSD instances
Confirm log consolidation
Explore log rotation mechanism

download UnixCBT – BSD9x Edition Training
With a Premium account you can download files having Fullspeed !
Download from Uploaded
http://uploaded.net/file/yrv6em1n/201366101029_80227.part1.rar
http://uploaded.net/file/828v3fpg/201366101029_80227.part2.rar
http://uploaded.net/file/dtutn6mr/201366101029_80227.part3.rar
http://uploaded.net/file/9eyc0yg7/201366101029_80227.part4.rar
http://uploaded.net/file/yuw278t0/201366101029_80227.part5.rar

Download from Extabit
http://extabit.com/file/279ut81zyqtr2/201366101029_80227.part1.rar
http://extabit.com/file/279ut81zyploe/201366101029_80227.part2.rar
http://extabit.com/file/279ut81zyqtu6/201366101029_80227.part3.rar
http://extabit.com/file/279ut81zyqqoe/201366101029_80227.part4.rar
http://extabit.com/file/279ut81zyqqpq/201366101029_80227.part5.rar

Download from Rapidgator
http://rapidgator.net/file/1e1c25864443d239b4a9500a22c9e7d2/201366101029_80227.part1.rar
http://rapidgator.net/file/40a01f4102b0ba60cae2bc187c045142/201366101029_80227.part2.rar
http://rapidgator.net/file/02ade48435cb7c815d5481401de51087/201366101029_80227.part3.rar
http://rapidgator.net/file/29e54098949864c9f0c9aa831bd16cd2/201366101029_80227.part4.rar
http://rapidgator.net/file/d6e1052d3fdbd34327858e6d86331f86/201366101029_80227.part5.rar

The post UnixCBT – BSD9x Edition Training appeared first on Download for Training.

Linux CBT OpenLDAP Edition

$
0
0

 Linux CBT OpenLDAP Edition

Linux CBT OpenLDAP Edition
English | mp4 | H264 796×596 | AAC 2 ch 54 kbps | 15 hrs 21 min | 1.11 GB
eLearning

Course Objective

Introduction – Features
Discuss LDAP history
Enumerate key features
Discuss typical LDAP applications
Compare and contrast LDAP namespace to DNS namespace
Discuss key offline|online administrative tools
Identify key systems to be used

Course Objective

Introduction – Features
Discuss LDAP history
Enumerate key features
Discuss typical LDAP applications
Compare and contrast LDAP namespace to DNS namespace
Discuss key offline|online administrative tools
Identify key systems to be used

LDAP Concepts
Explore target Directory Information Tree (DIT)
Discuss Distinguished Names (DNs)
Directory Information Tree (DIT)
Discuss Object Classes
Discuss Attributes
Discuss the importance of Schemas
Explain how LDAP interacts with PAM and NSS to authenticate users

Master Server Configuration
Explore PAM and NSS configuration
Install and explore OpenLDAP packages
Configure Master server to serve the default LDAP namespace
Initiate LDAP server

Define Directory Information Tree (DIT)
Search the default DIT using ‘ldapsearch’
Update /etc/hosts files with participating LDAP servers
Use LDAP Browser GUI to explore LDAP DIT
Explain LDIF entries
Create the top-level LDAP DIT container object using ‘ldapadd’ with LDIF file
Create second-level Organizational Units (OUs) for functional groups
Create users within each second-level OU
Verify results
Attempt to create duplicate entries

Configure Replication
Discuss features and benefits
Explore network topology
Install required packages on LDAP replication partner (replica)
Enumerate and execute replication configuration steps
Evaluate results on master and replica LDAP servers

LDAP on Solaris Configuration
Discuss features and benefits
Download and install LDAP and required packages
Update /etc/hosts configuration on replica
Configure server as LDAP replica
Verify results

LDAP Add
Discuss features and benefits
Explain ‘ldapadd’ usage
Add users to remaining OUs
Verify results
Use ‘ldapadd’ with: STDIN and LDIF file
Use ‘ldapadd’ from replica
Evaluate results using ‘ldapsearch’ and LDAP Browser GUI

LDAP Delete
Discuss features and benefits
Explain ‘ldapdelete’ usage
Delete specific LDAP objects remotely
Evaluate results
Delete multiple LDAP objects using STDIN and LDIF
Evaluate results
Use ‘ldapsearch’ to derive applicable LDIF statements
Attempt to delete non-existing and existing items
Evaluate results using: ‘ldapsearch’ and LDAP Browser GUI

LDAP Modify
Discuss features and benefits
Confirm current state of DIT on master and replicas using ‘ldapsearch’
Rebuild the DIT using ‘ldapmodify’
Confirm results with LDAP Browser GUI
Modify attributes using ‘ldapmodify’ with LDIF
Delete objects using ‘ldapmodify’
Evaluate results

LDAP Search
Discuss features and benefits
Discuss supported boolean operators
Discuss filter operators
Use wildcards in searches
Peform string searches
Search distinct OUs for all object types
Search the DIT for OUs
Search the DIT for specific attributes
Search the DIT for specific user objects
Perform boolean searches
Evaluate results

Logging
Discuss features and applications
Explore master server logging and syslog configuration
Discuss debugging levels
Start LDAP server in desired debug level
Evaluate results
Vary logging verbosity
Configure logging on replica server
Evaluate results

LDIF
Discuss features and benfits
Use ‘ldapsearch’ to explore LDIF entries
Discuss LDIF structure
Discuss key object types
Create a new user object using LDIF
Delete using LDIF
Modify using LDIF
Evaluate results

LDAP Schemas
Discuss features and benefits
Explain applicability
Examine ‘slapd.conf’
Explore default schema files on master and replica servers
Correlate schemas to LDIF entries

Migrate to LDAP Authentication
Discuss features and benefits
Migrate primary server to LDAP authentication
Confirm configuration
Migrate replica servers to LDAP authentication
Evaluate results
Migrate local users from master and replica servers to LDAP DIT
Confirm results using ‘ldapsearch’
Confirm authentication of LDAP users on master and replica servers
Migrate other useful Linux|Unix tables

Syncrepl Replication
Discuss features and benefits
Migrate from ‘slurpd’ to ‘syncrepl’
Evaluate results

LDAP Security
Discuss features and benefits
Explore Access Control Lists (ACLs)
Configure SSL/TLS encryption
Evaluate results

download Linux CBT OpenLDAP Edition
With a Premium account you can download files having Fullspeed !
Download from Uploaded
http://uploaded.net/file/40vkk5aq/201311622500.part1.rar
http://uploaded.net/file/x6th7qu6/201311622500.part2.rar
http://uploaded.net/file/ub9vny31/201311622500.part3.rar

Download from Extabit
http://extabit.com/file/2b3l25tj56ger/201311622500.part1.rar
http://extabit.com/file/2b3l25tj56gb7/201311622500.part2.rar
http://extabit.com/file/2b3l25tj56dar/201311622500.part3.rar

Download from Rapidgator
http://rapidgator.net/file/7792129987e156f6ffbe78fa3ac0e7d8/201311622500.part1.rar
http://rapidgator.net/file/ee74b099109726c58b7953c46eb9ba8f/201311622500.part2.rar
http://rapidgator.net/file/f6953dca8f368ff63571477e329ddf0d/201311622500.part3.rar

The post Linux CBT OpenLDAP Edition appeared first on Download for Training.

LinuxCBT Parallel-SSH Edition

$
0
0

 LinuxCBT Parallel SSH Edition

LinuxCBT Parallel-SSH Edition
English | mov | H264 1280×720 | AAC 1 ch 64 kbps | 4 hrs 7 min | 616 MB
eLearning

Course Objective

Parallel Secure Shell | Features | Usage | Implementation

Course Objective

Parallel Secure Shell | Features | Usage | Implementation

Introduction – Parallel-SSH – Features
Explore features and benefits
Provide use-case examples
Contrast standard SSH with Parallel-SSH
Identify Target Hosts
Explore topography
Explore environment

Standard Secure Shell | Features | Usage | Implementation
Contrast both toolkits
Explore ‘ssh’ use-cases
Use ‘scp’ for non-interactive secure copies
Use ‘sftp’ to interactively move data
Identify existing usage keys
Generate requisite usage keys
Populate usage keys on target nodes
Confirm node accessibility
Run simple commands on distributed nodes
Confirm PROD environment

Parallel-SSH | Features | Usage
Enumerate important features
Prep list of distributed | cluster nodes
Evaluate Password-AUTH
Enable PKI Password-less AUTH
Specify hosts manually and automatically
Perform tasks on multiple nodes simultaneously
Confirm tasks have been executed
Troubleshoot as needed

Parallel-SCP | Features | Usage
Discuss use cases
Discuss caveats
Contrast with traditional ‘scp’
Propagate content to distributed nodes in parallel
Restrict parallelism to improve performance
Confirm content availability
Address issues that arise

Parallel-RSYNC | Features | Usage
Discuss key opportunities
Contrast with traditional ‘rsync’
Highlight ‘rsync’ benefits
Explore general usage
Mirror content via recursion
Troubleshoot missing ‘rsync’
Move data as conjured
Evaluate overall usage

Parallel-SLURP | Use-Cases
Discuss features
Contrast with common Parallel-SSH tools
Contrast with traditional Linux | Unix equivalents
Explore general usage
Test with wildcard
Archive system configuration files ad-hoc
Contrast with defaults
Enable temporary synchronization configuration
Consider non-existing files on targets
Evaluate footprint of slurps
Highlight caveats
Evaluate results

Parallel-NUKE | Use-Cases
Highlight features
Contrast with $SHELL access
Launch processes for execution
Execute various processes
Execute arbitrary service
Contrast service with regular process
Trace service execution results
Evaluate results

download LinuxCBT Parallel SSH Edition
With a Premium account you can download files having Fullspeed !
Download from Uploaded
http://uploaded.net/file/z9rnw1rr/2013116224011.part1.rar
http://uploaded.net/file/mzzpwp9p/2013116224011.part2.rar

Download from Extabit
http://extabit.com/file/2b3l25tj4j0lv/2013116224011.part1.rar
http://extabit.com/file/2b3l25tj4ja0j/2013116224011.part2.rar

Download from Rapidgator
http://rapidgator.net/file/0967e71e3ca729b594d90a2273d388fd/2013116224011.part1.rar
http://rapidgator.net/file/76b015250b8b3d30f818b60eafa3f2fb/2013116224011.part2.rar

The post LinuxCBT Parallel-SSH Edition appeared first on Download for Training.

LinuxCBT Ruby Edition

$
0
0

 LinuxCBT Ruby Edition

LinuxCBT Ruby Edition
Genre: eLearningEnglish | mov | H264 1280×720 | AAC 1 ch 64 kbps | 7 hrs 14 min | 726 MB
eLearning

Course Objective

Ruby on Windows | Linux Scripting Environment – Module VII

LinuxCBT Ruby Edition
Genre: eLearningEnglish | mov | H264 1280×720 | AAC 1 ch 64 kbps | 7 hrs 14 min | 726 MB
eLearning
Course Objective

Ruby on Windows | Linux Scripting Environment – Module VII

Features & Basics
Discuss key features
Install on Windows
Explore interactive | non-interactive environments
Draw parallels to Python & Perl
Define and manipulate common string-type VARs
Evaluate results

Arrays | Hashes
Discuss applicability
Define sample arrays & hashes
Manipulate using applicable methods
Evaluate results

Simple Class Definition
Discuss Ruby OO-environment
Define simple class with references to predefined methods
Instantiate and call accordingly
Update as needed with enhanced functionality
Evaluate results

Iteration | Conditions
Explain the Ruby iteration model
Generate enumerable types and iterate
Discuss traditional iteration support
Trap and manipulate enumerable entities
Explore various conditional forms
Branch code with appropriate conditional test
Evaluate resutls

Regular Expressions (RegExes)
Discuss applicability
Enumerate useful metacharacters
Perform matches as needed
Filter data and evaluate

File IO Introdution
Discuss capabilities
Identify key classes & methods
Construct references to file IO classes & methods
Process data accordingly
Prepare to write scripts with File IO classes

Ruby Scripts
Discuss features & beneftis
Mass Copy | Move script for general purposes
Normalize files based on criteria
Compare and contrast with other languages
Evaluate results

Logger Class
Discuss relevance & applicability
Construct skeleton class with desired functionality
Extend capabilities of class as needed
Commit class to library
Require class in front-end scripts
Explore both Windows | Linux operability
Evaluate results

Exception Handling | Parameter Validation
Explain exception handling model
Compare and contrast with traditional erro-handling scheme
Trap important code within exception blocks
Handle errors accordingly
Validate input parameters
Evaluate results

download LinuxCBT Ruby Edition
With a Premium account you can download files having Fullspeed !
Download from Uploaded
http://uploaded.net/file/oljrbrsp/201311622230.part1.rar
http://uploaded.net/file/gkq9i0f2/201311622230.part2.rar

Download from Extabit
http://extabit.com/file/2b3l25tj55877/201311622230.part1.rar
http://extabit.com/file/2b3l25tj554zn/201311622230.part2.rar

Download from Rapidgator
http://rapidgator.net/file/1a0d9508f81d099cbad25c8777dc8008/201311622230.part1.rar
http://rapidgator.net/file/012ae6689f76edfe5f55d1878511e696/201311622230.part2.rar

The post LinuxCBT Ruby Edition appeared first on Download for Training.


LinuxCBT – Mail Edition

$
0
0

76ea1a442554c93cb38aa932c6e4d37a LinuxCBT – Mail Edition

LinuxCBT – Mail Edition
English | Flash | javascript | XviD | 672?448 | 29.97fps 1255 Kbps | AC3 192 Kbps 48.0khz | ISO | 1.65 GB
Genre: eLearning

LinuxCBT Mail Edition focuses on the 4 leading Mail Transfer Agents (MTAs) and ancillary components:
LinuxCBT Sendmail v8 Edition ? Module I
Sendmail ? Installation
Sendmail ? Mail Submission Program (MSP) mode
Sendmail ? Mail Transfer Agent (MTA) mode
Sendmail ? Local Mail
Sendmail ? Logs
Sendmail ? Aliases
Sendmail ? Simple Mail Transfer Protocol (SMTP) Mail
Sendmail ? Mail Exchange (MX) based messaging
Sendmail ? m4 Configuration Technique
Sendmail ? Masquerading
Sendmail ? Relay Control
Sendmail ? Smart Host Configuration
Sendmail ? Null Client Configuration
Sendmail ? Virtual Domains
Sendmail ? Malware Framework
Sendmail ? Transport Layer Security (TLS) Configuration
LinuxCBT Postfix Edition ? Module II
Postfix ? Installation
Postfix ? Local Mail & Queueing
Postfix ? Aliases
Postfix ? Simple Mail Transfer Protocol (SMTP)
Postfix ? Rewriting Features ? Canonical Maps ? BCC Maps
Postfix ? Relay Control
Postfix ? Smart Host & Null Client configuration
Postfix ? Virtual Domains
Postfix ? Mailbox Formats
Postfix ? Network-based Mail Retrieval
Postfix ? Web-based Mail Retrieval
Postfix ? Malware Framework
Postfix ? Log Analysis
Postfix ? Transport Layer Security (TLS)
Postfix ? SMTP AUTH ? Dovecot
LinuxCBT qmail Edition ? Module III
qmail ? Installation
qmail ? Local Mail
qmail ? Mail Storage Formats
qmail ? Aliases
qmail ? Remote Mail
qmail ? Relay Control
qmail ? Network-based Mail Retrieval
qmail ? Web-based Mail Retrieval
qmail ? Virtual Domains
qmail ? Malware Framework ? OpenProtect, Bad Senders, TLS
LinuxCBT Exim Edition ? Module IV
Exim ? Features
Exim ? Explore Environment
Exim ? Local Mail
Exim ? Remote Mail
Exim ? Aliases
Exim ? Relay Configuration
Exim ? Smart Host Configuration
Exim ? Queue Management
Exim ? Log Configuration
Exim ? Utilities
Exim ? Virtual Domains
Exim ? SMTP Authentication
Exim ? SSL | TLS Configuration
Linux/UNIX systems are responsible for moving the overwhelming majority of electronic mail across private and public networks. Consequently, savvy Systems Admins. are expected to have a solid foundation in MTAs and ancillary components for general and automated mail-based applications.
Let LinuxCBT Mail Edition help to solidify your understanding of key MTAs and ancillary components.

download LinuxCBT – Mail Edition
With a Premium account you can download files having Fullspeed !
Download from Lumfile
http://lumfile.com/kfqmo07fjpt0/2013226112140_82743.part1.rar.html
http://lumfile.com/azmh89upvorl/2013226112140_82743.part2.rar.html
http://lumfile.com/ky4enoql884e/2013226112140_82743.part3.rar.html
http://lumfile.com/78rikdplr5cb/2013226112140_82743.part4.rar.html

Download from Uploaded
http://uploaded.net/file/waoufn3q/2013226112140_82743.part1.rar
http://uploaded.net/file/kv15ca3c/2013226112140_82743.part2.rar
http://uploaded.net/file/pa7no7zj/2013226112140_82743.part3.rar
http://uploaded.net/file/j8j88544/2013226112140_82743.part4.rar

Download from Extabit
http://extabit.com/file/29frigcdc8k8d/2013226112140_82743.part1.rar
http://extabit.com/file/29frigcdc8k71/2013226112140_82743.part2.rar
http://extabit.com/file/29frigcdc8dwt/2013226112140_82743.part3.rar
http://extabit.com/file/29frigcdc8kbh/2013226112140_82743.part4.rar

The post LinuxCBT – Mail Edition appeared first on Download for Training.

LinuxCBT – Proxy Edition Training

$
0
0

a273a4086fa6f735108da77225214eb3 LinuxCBT – Proxy Edition Training

LinuxCBT – Proxy Edition Training | 972.22 MB
Course Objective

Proxy Security – Module II
Squid Proxy Initialization
Discuss Squid concepts & applications
Discuss DNS application
Configure DNS on primary SuSE Linux server for the Squid Proxy environment
Confirm DNS environment
Start Squid and evaluate default configuration
Install Squid Proxy server
General Proxy Usage
Configure web browser to utilize proxy services
Grant permissions to permit local hosts to utilize proxy services
Discuss ideal file system layout – partitioning
Explore key configuration files
Use client to test the performance of proxy services
Discuss HIT/MISS logic for serving content
Configure proxy support for text-based (lftp/wget/lynx) HTTP clients
Squid Proxy Logs
Discuss Squid Proxy logging mechanism
Identify key log files
Discuss & explore the Access log to identify HITS and/or MISSES
Discuss & explore the Store log to identify cached content
Discuss key CLF fields
Configure Webalizer to process Squid-CLF logs
Revert to Squid Native logs
Discuss key Native log fields
Configure Webalizer to process Squid Native logs
Squid Network Configuration & System Stats
Discuss cachemgr.cgi Common Gateway Interface(CGI) script
Explore the available metrics provided by cachemgr.cgi
Change default Squid Proxy port
Modify text/graphical clients and test communications
Discuss Safe Ports – usage & applications
Squid Access Control Lists (ACLs)
Intro to Access Control Lists (ACLs) – syntax
Define & test multiple HTTP-based ACLs
Define & test ACL lists – to support multiple hosts/subnets
Define & test time-based ACLs
Nest ACLs to tighten security
Implement destination domain based ACLs
Exempt destination domains from being cached to ensure content freshness
Define & test Anded ACLs
Discuss the benefits of Regular Expressions (Regexes)
Implement Regular Expressions ACLs to match URL patterns
Exempt hosts/subnets from being cached or using the Squid cache
Force cache usage
Configure enterprise-class Cisco PIX firewall to deny outbound traffic
Configure DNS round-robin with multiple Squid Proxy caches for load-balancing
Discuss delay pool concepts & applications – bandwidth management
Configure delay pools – to support rate-limiting
Examine results of various delay pool classes
Enforce maximum connections to deter Denial of Service (DoS) attacks
Verify maximum connections comply with security policy
Squid Proxy Hierarchies
Discuss Squid cache hierarchy concepts & applications
Ensure communications through a primary cache server – double-auditing
Discuss and configure parent-child bypass based on ACLs
Configure Intranet ACLs for peer-cache bypass
Discuss & implement Squid cache hierarchy siblings
Configure transparent proxy services
Squid on Windows
Manipulate configuration
Test connectivity from multiple platforms
Evaluate results
Reverse Proxy
Install Squid3
Configure forward proxy access for local subnet
Test connectivity
Discuss reverse proxy features
Configure reverse proxy
Evaluate results

download LinuxCBT – Proxy Edition Training
With a Premium account you can download files having Fullspeed !
Download from Lumfile
http://lumfile.com/egvhjo0al1hg/2013226112452_82742.part1.rar.html
http://lumfile.com/hp6fvan7yn53/2013226112452_82742.part2.rar.html

Download from Uploaded
http://uploaded.net/file/8eeokkc0/2013226112452_82742.part1.rar
http://uploaded.net/file/v7mj3h30/2013226112452_82742.part2.rar

Download from Extabit
http://extabit.com/file/29frigcdblnf1/2013226112452_82742.part1.rar
http://extabit.com/file/29frigcdblndp/2013226112452_82742.part2.rar

The post LinuxCBT – Proxy Edition Training appeared first on Download for Training.

LinuxCBT OpenSSHv2 Edition

$
0
0

5f8de12cb86fdcc707d78417440c8282 LinuxCBT  OpenSSHv2 Edition

LinuxCBT : OpenSSHv2 Edition
English | MOV | System Requirements: Browser | [HTML5] | Flash | javascript | Duration: 16 Hours | 1.19 GB
Genre: Video Training

…org traffic to localhost via SSH

Bind ‘ssh’ to specific source IP address and test connectivity

Execute commands on remote system without allocating a pseudo-terminal

Debug ‘ssh’ connectivity

Explore the system-wide client configuration file

Explore user configuration file

Secure Copy Program (SCP) – /scp/

Discuss features and benefits

Locate ‘scp’ on the file system

Discuss usage

Copy, non-interactively, previously generated data to remote systems

Test ‘scp’ with global and user configuration directives

Debug ‘scp’ connectivity

Limit transfer rate to conserve bandwidth

Secure File Transfer Program (SFTP) – /sftp/

Discuss features and benefits

Locate ‘sftp’ on the file system

Discuss usage

Connect to remote system using ‘sftp’ interactive shell

Issue puts and gets and evaluate results

Identify the sftp-server subsystem

Peruse process list while connected to OpenSSHv2 server

Illustrate batch file usage

SSH Key Scan Utility – /ssh-keyscan/

Discuss features and benefits

Locate ‘ssh-keyscan’ on the file system

Discuss usage

Scan the network from STDIN for OpenSSHv2 public keys – RSA (SSHv1 & SSHv2) | DSA

Scan the network based on a file with a list of hosts for OpenSSHv2 public keys

Populate ~/.ssh/known_hosts file using ‘ssh-keyscan’ with BASH for loop

Compare and contrast STDOUT with the output file

SSH Key Generation Utility – /ssh-keygen/

Discuss features and benefits

Locate ‘ssh-keygen’ on the file system

Discuss usage

Generate RSA-2 usage keys

Identify RSA-2 public and private key pair

Generate DSA usage keys

Identify DSA public and private key pair

Expose usage keys’ fingerprint using ‘ssh-keygen’

Generate RSA-2 | DSA usage keys for all hosts

Public Key Infrastructure (PKI) – Password-less Logins

Discuss features and benefits

Identify key files for client and server implemenation of password-less (PKI-based) logins

Copy manually, RSA-2 | DSA public keys to remote system’s ~/.ssh/authorized_keys file

Test password-less logins

Use ‘ssh-copy-id’ to seamlessly populate remote system with RSA-2 | DSA usage keys

Test password-less connectivity after using ‘ssh-copy-id’

Confirm password-less connectivity using SSH clients /ssh|scp|sftp/ in debug mode

Connect to privileged account from non-privileged account using PKI

Configure RSA-1 connectivity using PKI

System-wide OpenSSHv2 Configuration Directives

Identify key directory and files associated with client | server configuration

Explore primary server configuration file

Discuss applicability of directives

Alter and test several SSHD directives

Explore OpenSSHv2 configuration on RedHat Linux

Explore OpenSSHv2 configuration on Solaris 10

Port Forwarding – Pseudo-VPN Support – /Local|Remote|Gateway/

Discuss features and benefits

Implement local port forwarding using ‘ssh’

Configure remote port forwarding using ‘ssh’

Test circumvention of local firewall using remote port forwarding

Implement gateway ports to share forwarded /local|remote/ with connected users

Test connectivity

Windows Integration – /PuTTY|WinSCP/

Discuss features and applications

Buy Premium Account To Download More Files With Fast Speed.

download LinuxCBT  OpenSSHv2 Edition
With a Premium account you can download files having Fullspeed !
Download from Lumfile
http://lumfile.com/ylqv6otuiy9f/2013296134726_83329.part1.rar.html
http://lumfile.com/zljbts1wtj3h/2013296134726_83329.part2.rar.html
http://lumfile.com/0uncv4cufh51/2013296134726_83329.part3.rar.html

Download from Uploaded
http://uploaded.net/file/sc2to4mi/2013296134726_83329.part1.rar
http://uploaded.net/file/vcjefmpi/2013296134726_83329.part2.rar
http://uploaded.net/file/ph82a387/2013296134726_83329.part3.rar

Download from Extabit
http://extabit.com/file/29frielhbzs6l/2013296134726_83329.part1.rar
http://extabit.com/file/29friellll5l9/2013296134726_83329.part2.rar
http://extabit.com/file/29frielhbzp2l/2013296134726_83329.part3.rar

The post LinuxCBT OpenSSHv2 Edition appeared first on Download for Training.

LinuxCBT – PDNS Edition Training

$
0
0

6f513f5c4265a5e491b8b781d81b0ad3 LinuxCBT – PDNS Edition Training

LinuxCBT – PDNS Edition Training | 601.75 MB
Course Objective
Intro to DNS Services – PowerDNS (PDNS) – Usage

Introduction – PowerDNS – Features
Discuss features and benefits
Contrast with BIND DNS Services
Identify DNS Servers
Identify applicable systems
Confirm Configuration
Explore environment

PowerDNS – Recursive DNS
Discuss applicability of Recursion Server
Install Recursion Server
Explore configuration footprint
Generate various Queries
Obtain PDNS Statistics
Bind PDNS to relevant Sockets
Dump DNS Cache as needed
Maniuplate DNS Recursive Cache on-demand
Discuss various PDNS Caches
Continue Exploration of Recursive Services

Authoritative DNS Services
Discuss Features
Contrast with BIND
Disable BIND as needed
Incorporate BIND Zones into PowerDNS
Disable Recursive Services
Initiate Authoritative Services
Control PowerDNS via applicable client
Obtain Statistics as needed
Re-configure Recursive Server to co-exist with Authoritative Services
Connect both instances accordingly
Perform Authoritative and Recursive Queries as needed
Manipulate DNS Database and Confirm PowerDNS Functionality

DNS Slave Services | BIND Compatibility
Discuss common applications
Configure BIND Slave for Replication and Confirm
Provision PowerDNS Slave Services
Replicate DNS Zone Information to Windows DNS
Update Master Services accordingly
Notify DNS Slaves of various changes
Confirm traditional DNS Replication Services
Debug as needed
Contrast Master | Slave Model with PowerDNS DBMS Capabilities

MySQL DBMS DNS Back-End – Integration
Consider applicable opportunities
Contrast with traditional DNS Services
Prep MySQL DBMS to house DNS Information
Define appropriate schema
Import DNS records for new Zone
Operate PowerDNS with BIND and DBMS Back-Ends
Perform Queries to confirm Record Set
Add | Remove | Update DNS Records accordingly
Integrate additional PowerDNS Front-End Authoritative Servers
Configure NATIVE Mode DNS Front-Ends
Query ALL Front-End PowerDNS participants
Evaluate results

BIND | MySQL DBMS | DNS Zone Migration
Contrast both models
Identify orphaned DNS Zones
Generate SQL for migration
Discuss SQL nuances and confirm
Migrate Forward and Reverse DNS BIND Zones
Confirm Record Sets accordingly
Disable BIND Compatibility Mode
Configure NATIVE PowerDNS Mode on ALL Front-Ends
Confirm Queries against Front-Ends
Evaluate accordingly

download LinuxCBT – PDNS Edition Training
With a Premium account you can download files having Fullspeed !
Download from Lumfile
http://lumfile.com/ojeotch8sk24/20132576013_85168.part1.rar.html
http://lumfile.com/ih06i02dcuuy/20132576013_85168.part2.rar.html

Download from Uploaded
http://uploaded.net/file/shcqjhqi/20132576013_85168.part1.rar
http://uploaded.net/file/x6p3dxat/20132576013_85168.part2.rar

The post LinuxCBT – PDNS Edition Training appeared first on Download for Training.

LinuxCBT NIDS Edition

$
0
0

5b6df8d47d4d3a343a7cf969ac9c389d LinuxCBT NIDS Edition

LinuxCBT NIDS Edition
English | .MOV | h264, yuv420p, 800×600, 77 kb/s, 5.00 fps | aac, 44100 Hz, 1 channels, s16, 62 kb/s | 1.21 GB
Genre: eLearning

Network Intrusion Detection System (NIDS) Security – Module V

Snort NIDS – Installation
Peruse the LinuxCBT Security Edition classroom network topology
Download Snort
Import G/PGP public key and verify package integrity
Identify & download key Snort dependencies
Install current libpcap – Packet Capture Library
Establish security configuration baseline

Snort NIDS – Sniffer Mode
Discuss sniffer mode concepts & applications
Sniff IP packet headers – layer-3/4
Sniff data-link headers – layer-2
Sniff application payload – layer-7
Sniff application/ip packet headers/data-link headers – all layers except physical
Examine packets & packet loss
Sniff traffic traversing interesting interfaces
Sniff clear-text traffic
Sniff encrypted streams

Snort NIDS – Logging Mode
Discuss logging mode concepts & applications
Log traffic using default PCAP/TCPDump format
Log traffic using ASCII mode & examine output
Discuss directory structure created by ASCII logging mode
Control verbosity of ASCII logging mode & examine output
Enhance packet logging analysis by defaulting to binary logging
Discuss default nomenclature for binary/TCPDump files
Alter binary output options
Use Snort NIDS to read binary/TCPDump files

Snort NIDS – Berkeley Packet Filters (BPFs)
Explain the advantages to utilizing BPFs
Discuss BPF directional, type, and protocol qualifiers
Identify clear-text based network applications and define appropriate BPFs
Execute Snort NIDS in sniffer mode with BPFs enabled to match interesting traffic
Log to the active pseudo-terminal console and examine the packet flows
Combine BPF qualifiers to increase packet-matching capabilities
Use logical operators to define more flexible BPFs
Read binary TCPDump files using Snort & BPFs
Execute Snort NIDS in logging/daemon mode

Snort NIDS – Cisco Switch Configuration
Examine the current network configuration
Identify Snort NIDS sensors and centralized DBMS Server
Create multiple VLANs on the Cisco Switch
Secure the Cisco Switch configuration
Isolate internal and external hosts, sensors and DBMS systems
Configure SPAN – Port Mirroring for internal and external Snort NIDS Sensors
Examine internal and external packet flows

Snort NIDS – Network Intrusion Detection System (NIDS) Mode
Discuss NIDS concepts & applications
Prepare /etc/snort – configuration directory for NIDS operation
Explore the snort.conf NIDS configuration file
Discuss all snort.conf sections
Download & install community rules
Execute Snort in NIDS mode with TCPDump compliant output plugin
Download & install Snort Vulnerability Research Team (VRT) rules
Compare & contrast community rules to VRT rules

Snort NIDS – Output Plugin – Barnyard Configuration
Discuss features & benefits
Configure Syslog based logging and examine results
Configure Snort to log sequentially to multiple output locations
Implement unified binary output logging to enhance performance
Discuss concepts & features associated with post-processing Snort logs
Download and install current barnyard post-processor
Use barnyard to post-process logs to multiple output destinations

Snort NIDS – BASE – MySQL Implementation
Discuss benefits of centralized console reporting for 1 or more Snort sensors
Re-compile Snort on both sensors to support MySQL logging
Configure MySQL on Database Management System (DBMS) Host
Implement Snort database schema on DBMS Host
Configure Snort to log output to MySQL DBMS Host
Confirm output logging to the MySQL DBMS Host
Prepare DBMS Host for BASE console installation
Install BASE and complete schema extension
Peruse BASE interface

Snort NIDS – Rules Configuration & Updates
Discuss the concept of rules as related to Snort NIDS
Examine Snort rule syntax
Peruse pre-defined Snort rules
Download & configure oinkmaster to automatically update Snort rules
Confirm oinkmaster operation

download LinuxCBT NIDS Edition
With a Premium account you can download files having Fullspeed !
Download from Lumfile
http://lumfile.com/ehx33v7mf2b4/2013257172233_85185.part1.rar.html
http://lumfile.com/vsxmvvbewidx/2013257172233_85185.part2.rar.html
http://lumfile.com/9xzf1uy8um98/2013257172233_85185.part3.rar.html

Download from Uploaded
http://uploaded.net/file/hfqgx2vr/2013257172233_85185.part1.rar
http://uploaded.net/file/ed2j4z5b/2013257172233_85185.part2.rar
http://uploaded.net/file/44b7ldl3/2013257172233_85185.part3.rar

The post LinuxCBT NIDS Edition appeared first on Download for Training.

Viewing all 94 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>