Linux Administration: Build 5 Hands - On Linux Projects 2023

Prkos

U P L O A D E R
6f73416d6fc584bf1527dfeec7e04479.jpg


Linux Administration: Build 5 Hands-On Linux Projects 2023
Last updated 9/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 8.41 GB | Duration: 16h 45m

Learn Linux by Doing with 5 Projects: Docker, Secure Linux, Run Web and DNS Servers, Run a Mail System, Automate Linux



What you'll learn
Become a professional Linux Engineer by Building 5 Hands-On Linux Projects.
Learn how to run containerized applications with Docker.
Learn to manage Docker images and containers.
Learn to tag and push images to Docker Hub.
Learn to build custom Docker images using Dockerfile.
Learn how to secure and harden Linux Systems.
You will MASTER Network Security Key Concepts (Encryption, Steganography, Reconnaissance, Iptables Firewall ...).
Learn to configure an authoritative DNS server (BIND9).
Learn to configure a Web Server (Apache2).
Learn to install and secure WordPress.
Learn to run a Mail System (Potsfix, Dovecot, MySql, OpenSSL, SMTP AUTH, Rspamd, ClamAV).
Acquire the skills to automate the most common Linux administrative tasks using Bash scripting and Ansible.
Learn to use Ansible in large Networks for Network Automation.
By the end of this course you will have a deep understand of the Linux operating system and be able to apply that knowledge in Real-World projects.


Requirements
A computer (Windows, Mac, or Linux) with an Internet connection. That's it!
Basic Linux knowledge is required. If you are a complete Linux beginner, this course might not be for you.
Your time and enthusiasm to learn.


Description
***Fully updated for 2023*** This practical Linux Administration course consists of Building 5 Hands-On Linux projects from scratch! It s the 2nd part of Linux Administration: The Complete Linux Bootcamp and requires basic Linux knowledge. The course is not recommended for complete beginners!Course Updates:Update: November 2022 - Updates to be 2023 readyUpdate: Summer 2022 - New Videos in the Security section, different other updatesUpdate: August 2021 - New Videos in the "Running a Mail System" project on fighting against malware (Postfix Access Restrictions In-Depth, Rspamd, Amavis & ClavAv)Update: April 2021 - New Videos in the "Running a Web Server" project on Apache Authorization and Authentication, HTTP Compression, mod_status, and many moreCourse Launch: January 10, 2021This course IS NOT like any other Linux Administration course you can take online. This course is focused on learning by doing. You ll learn what really matters and you ll get the skills to get ahead and gain an edge.Enrolling now in this project-focused Linux Administration course is the best investment in your career!By the end of this course, you'll have an in-depth knowledge of building real-world projects in Linux.This course is for you if you already have some basic Linux Knowledge and want to advance and dive deeper into Linux and learn how to build projects for the real world.You'll have access to my closed and Exclusive Online Group in order to provide you with improved, faster, and better support for your course-related questions.This course is taught by me, a Senior Network Engineer and a Professional Trainer. Why should you learn from me?I'm a Practitioner and an Enthusiast. Welcome to the real world! I ve been using Linux for the last 15 years in real-world projects. I m not just a random guy that teaches Linux Administration. Just imagine that during this time I ve learned and applied more and more almost on a daily basis. And now I m giving everything to you!I'm an Educator and I know how to make a Syllabus. I know exactly what is important and what is not. For the last 10 years, I've trained thousands of people on Linux Administration, Security, Networking, and Programming.After this course, you'll be an effective Linux System Engineer or Administrator!You'll have lifetime access and you can return and look at a specific Linux project anytime you want. And let's not forget, if you don't like the course, you are covered by a 30-day money-back guarantee, full refund, no questions asked!Project #1 - Running Containerized Applications with Docker- What is Docker? Why use it?- Installing Docker- The Docker Client- Pulling Images and Running Containers- Lab: Running a Web Server in a Docker Container- Listing Images and Containers- Removing Images and Containers- Getting Shell Access to a Container- Executing Commands in a Running Container- Getting Information about the Running Containers- Committing Container Changes into a New Image- Tagging and Pushing Custom Images to Docker Hub- Image Structure and Layers- Creating Custom Images using Dockerfile- Persistent Data: VolumesProject #2 - Securing and Hardening a Linux System- Linux Security Checklist- Securing the OpenSSH Server (sshd)- Securing the Boot Loader (Grub)- Enforcing Password Policy- Locking or Disabling User Accounts- Giving Limited root Privileges (sudoers and visudo)- Setting Users Limits (Running a DoS Attack Without root Access)- Intro to Cracking Passwords- Cracking Linux Passwords Using John the Ripper- Checking Files Integrity with AIDE - Part- Scanning for Rootkits (rkhunter and chkrootkit)- Scanning for Viruses with ClamAV- Full Disk Encryption Using dm-crypt and LUKS- Unlocking LUKS Encrypted Drives With A Keyfile- Symmetric Encryption Using GnuPG- Using an Encrypted Text Editor (EncryptPad)- Steganography Explained- Steganography In Depth- Hide Secret Messages Through Steganography with Steghide- Scanning Networks with Nmap- Nmap Advanced- Introduction to Linux Firewalls- Securing Your Linux System with a Firewall (Netfilter/Iptables)- Chains, Tables, Matches, and Targets In Depth- Stateful Firewall In DepthProject #3: Setting Up a Web and DNS Server- Getting a Domain Name- Diving into the DNS Protocol and Installing a DNS Server (BIND9)- Setting Up the Authoritative BIND9 DNS Server- Installing a Web Server (Apache2)- Setting Up Virtual Hosting- Securing Apache with OpenSSL and Digital Certificates- Access Control by Source IP Address- The <Files> Directive- The .htaccess File- HTTP Digest Authentication- The Options Directive and Indexing- HTTP Compression- SetHandler and Server Status- Installing PHP- Installing and Securing the MySql Server- Installing a Web Application (WordPress)- Securing WordPressProject #4 - Running a Virtual Mail Server- Overview of a Complete Virtual Mail System- Mail and DNS: MX Records and Reverse DNS- Checking the Prerequisites- Installing Software Packages- Configuring MySql and Connect it With Postfix- Configuring Postfix Using the Postconf Command- Configuring SMTP AUTH (SASLAUTHD and MySql)- Configuring Dovecot (POP3/IMAP)- Adding Domains and Virtual Users. Testing the System- Enabling SMTPS Port 465 in Postfix For Email Submission- Troubleshooting- Virus Scanning Using Amavis and ClamAV- Testing Amavis and ClamAV- Fighting Against Spam: Postfix Access Restrictions- Fighting Against Spam: Postfix HELO Restrictions- Fighting Against Spam: Postfix Sender Restrictions- Fighting Against Spam: Postfix Recipient Restrictions- Fighting Against Spam: Using Public RBLs- Intro to Spam Filtering Systems- Installing Rspamd and Postfix Integration- Configuring and Testing Rspamd- Postfix Log Monitoring Using pflogsummProject #5 - Automating Linux Administrative Tasks- Intro to Ansible- Prerequisites- Ansible Inventory File- Ansible Ad-Hoc Commands: The Shell Module- Ansible Ad-Hoc Commands: The Script Module- Ansible Ad-Hoc Commands: The APT Module- Task Automation and Scheduling Using Cron (crontab)- Scheduling Tasks Using Anacron- Dropping Packets Based on Source IP Address- Dropping a List of IP Addresses- System Administration Script using Bash Menus- Intro to Ansible- Ansible Inventory File- Ansible Ad-Hoc Commands- Ansible modules: raw, shell, command, scriptEvery project is complete and includes all the scripts and configuration files, a command section, lots of quizzes, slides, and many practice challenges.The skills you ll learn will boost your career and make you more valuable in the job market.See you in the courses!

Overview
Section 1: Getting Started

Lecture 1 How to Get the Most Out of This Course

Lecture 2 Running a Linux Server in the Cloud

Lecture 3 Securing SSH with Key Authentication

Lecture 4 Ubuntu and CentOS Download Links (OVA Files)

Lecture 5 Join Our Online Community!

Section 2: Project #1 - Running Containerized Applications with Docker

Lecture 6 Project Overview

Lecture 7 What is Docker? Why use it?

Lecture 8 Installing Docker

Lecture 9 Commands - Installing Docker

Lecture 10 The Docker Client

Lecture 11 Pulling Images and Running Containers

Lecture 12 Commands - The Docker CLI, Pulling Images & Running Containers

Lecture 13 Lab: Running a Web Server in a Docker Container

Lecture 14 Listing Images and Containers

Lecture 15 Removing Images and Containers

Lecture 16 Commands - Listing and Removing Images and Containers

Lecture 17 Getting Shell Access to a Container

Lecture 18 Executing Commands in a Running Container

Lecture 19 Commands - Executing Commands

Lecture 20 Getting Information about the Running Containers

Lecture 21 Committing Container Changes into a New Image

Lecture 22 Tagging and Pushing Custom Images to Docker Hub

Lecture 23 Commands - Committing Changes, Tagging and Pushing Images

Lecture 24 Image Structure and Layers

Lecture 25 Creating Custom Images using Dockerfile

Lecture 26 Persistent Data: Volumes

Lecture 27 Commands - Volumes

Section 3: Challenges - Docker

Lecture 28 Docker

Section 4: Project #2 - Securing and Hardening a Linux System

Lecture 29 Project Overview

Lecture 30 Linux Security Checklist

Lecture 31 Securing the OpenSSH Server (sshd)

Lecture 32 Commands - SSH

Lecture 33 Securing the Boot Loader (Grub)

Lecture 34 Enforcing Password Policy

Lecture 35 Locking or Disabling User Accounts

Lecture 36 Commands - Locking User Accounts

Lecture 37 Giving Limited root Privileges (sudoers and visudo) - Part 1

Lecture 38 Giving Limited root Privileges (sudoers and visudo) - Part 2

Lecture 39 Setting Users Limits (Running a DoS Attack Without root Access)

Lecture 40 Intro to Cracking Passwords

Lecture 41 Cracking Linux Passwords Using John the Ripper

Lecture 42 Commands - John the Ripper (JTR)

Lecture 43 Checking Files Integrity with AIDE - Part 1

Lecture 44 Checking Files Integrity with AIDE - Part 2

Lecture 45 Commands - AIDE

Lecture 46 Scanning for Rootkits (rkhunter and chkrootkit)

Lecture 47 Commands - rkhunter & chkrootkit

Lecture 48 Scanning for Viruses with ClamAV

Lecture 49 Commands - ClamAV

Lecture 50 Full Disk Encryption Using dm-crypt and LUKS

Lecture 51 Unlocking LUKS Encrypted Drives With A Keyfile

Lecture 52 Commands - Full Disk Encryption

Lecture 53 Symmetric Encryption Using GnuPG

Lecture 54 Using an Encrypted Text Editor (EncryptPad)

Lecture 55 Steganography Explained

Lecture 56 Steganography In Depth

Lecture 57 Hide Secret Messages Through Steganography with Steghide

Lecture 58 Commands - Steganography

Lecture 59 Scanning Networks with Nmap

Lecture 60 Nmap Advanced

Lecture 61 Commands - Nmap

Lecture 62 Introduction to Netfilter and Iptables

Lecture 63 Chain Traversal in a Nutshell

Lecture 64 Iptables Basic Usage

Lecture 65 Iptables Options (Flags) - Part 1

Lecture 66 Iptables Options (Flags) - Part 2

Lecture 67 Where Do We Write Iptables Rules

Lecture 68 Setting the Default Policy

Lecture 69 Deleting the Firewall

Lecture 70 Filter by IP Address

Lecture 71 Filter by Port

Lecture 72 Intro to Stateful Firewalls (Connection Tracking)

Lecture 73 Implementing Stateful Firewalls with Iptables

Lecture 74 Filter by MAC Address

Lecture 75 Match by Date and Time

Lecture 76 The ACCEPT and DROP Targets

Lecture 77 The LOG Target

Section 5: Challenges - Securing a Linux Server

Lecture 78 John The Ripper (JTR)

Lecture 79 Steganography

Lecture 80 Scanning with Nmap

Lecture 81 Challenges - Netfilter and Iptables

Section 6: Project #3 - Setting Up a Web and DNS Server

Lecture 82 Project Overview: The Big Picture

Lecture 83 Getting a Domain Name

Lecture 84 Diving into the DNS Protocol and Installing a DNS Server (BIND9)

Lecture 85 Setting Up the Authoritative BIND9 DNS Server

Lecture 86 Installing a Web Server (Apache2)

Lecture 87 Setting Up Virtual Hosting

Lecture 88 Securing Apache with OpenSSL and Digital Certificates

Lecture 89 Access Control by Source IP Address

Lecture 90 The Directive

Lecture 91 The .htaccess File

Lecture 92 HTTP Digest Authentication

Lecture 93 The Options Directive and Indexing

Lecture 94 HTTP Compression

Lecture 95 SetHandler and Server Status

Lecture 96 Installing PHP

Lecture 97 Installing and Securing the MySql Server

Lecture 98 Installing phpMyAdmin

Lecture 99 Securing phpMyAdmin

Lecture 100 Commands - phpMyAdmin

Lecture 101 Installing a Web Application (WordPress)

Lecture 102 Securing WordPress

Section 7: Challenges - DNS and WEB

Lecture 103 Challenges - DNS and BIND

Lecture 104 Challenges - Apache2

Section 8: Project #4 - Running a Virtual Mail Server

Lecture 105 Overview of a Complete Virtual Mail System

Lecture 106 Mail and DNS: MX Records and Reverse DNS

Lecture 107 Checking the Prerequisites

Lecture 108 Installing Software Packages

Lecture 109 Configuring MySql and Connect it With Postfix

Lecture 110 Configuring Postfix Using the Postconf Command

Lecture 111 Configuring SMTP AUTH (SASLAUTHD and MySql)

Lecture 112 Configuring Dovecot (POP3/IMAP)

Lecture 113 Adding Domains and Virtual Users. Testing the System

Lecture 114 Enabling SMTPS Port 465 in Postfix For Email Submission

Lecture 115 Troubleshooting

Lecture 116 Mail Project Archive (etc.tar.gz)

Lecture 117 Virus Scanning Using Amavis and ClamAV

Lecture 118 Amavis Installation Guide

Lecture 119 Testing Amavis and ClamAV

Lecture 120 Fighting Against Spam: Postfix Access Restrictions

Lecture 121 Fighting Against Spam: Postfix HELO Restrictions

Lecture 122 Fighting Against Spam: Postfix Sender Restrictions

Lecture 123 Fighting Against Spam: Postfix Recipient Restrictions

Lecture 124 Fighting Against Spam: Using Public RBLs

Lecture 125 Config - Postfix Access Restrictions

Lecture 126 Intro to Spam Filtering Systems

Lecture 127 Installing Rspamd and Postfix Integration

Lecture 128 Rspamd Installation Guide

Lecture 129 Configuring and Testing Rspamd

Lecture 130 Postfix Log Monitoring Using pflogsumm

Section 9: Project #5 - Automating Linux Administrative Tasks

Lecture 131 Project Overview

Lecture 132 Intro to Ansible

Lecture 133 Prerequisites

Lecture 134 Ansible Inventory File

Lecture 135 Ansible Ad-Hoc Commands: The Shell Module

Lecture 136 Ansible Ad-Hoc Commands: The Script Module

Lecture 137 Ansible Ad-Hoc Commands: The APT Module

Lecture 138 Ansible Ad-Hoc Commands: The Service Module

Lecture 139 Ansible Ad-Hoc Commands: The User Module

Lecture 140 Task Automation and Scheduling Using Cron (crontab)

Lecture 141 Commands - Cron

Lecture 142 Scheduling Tasks Using Anacron

Lecture 143 Moving to Automation With Bash Shell Scripting

Lecture 144 Dropping Packets Based on Source IP Address

Lecture 145 Dropping a List of IP Addresses

Lecture 146 System Administration Script using Bash Menus

Section 10: Challenges - Automating Administrative Tasks

Lecture 147 Ansible

Section 11: [EXTRA] Bash Shell Scripting

Lecture 148 Intro to Bash Shell Scripting

Lecture 149 The Bash Shebang and Comments

Lecture 150 Running Scripts

Lecture 151 Variables in Bash

Lecture 152 Getting User Input

Lecture 153 Special Variables and Positional Arguments

Lecture 154 Coding - Variables in Bash

Lecture 155 If, Elif and Else Statements

Lecture 156 Testing Conditions For Numbers

Lecture 157 Multiple Conditions and Nested If Statements

Lecture 158 Command Substitution

Lecture 159 Comparing Strings in If Statements

Lecture 160 Lab: Testing Network Connections

Lecture 161 Coding - If...Elif...Else Statements

Lecture 162 For Loops

Lecture 163 While Loops

Lecture 164 Case Statement

Lecture 165 Functions in Bash

Lecture 166 Variable Scope in Functions

Lecture 167 Menus in Bash. The Select Statement

Lecture 168 Intro to Bash Arrays

Lecture 169 Arrays In Depth

Lecture 170 Using the Readarray Command

Lecture 171 Iterating Over Arrays

Lecture 172 Project: Account Creation

Section 12: Challenges - Bash Scripting

Lecture 173 Bash Scripting Basics

Lecture 174 Flow Control (if...elif...else) and Command Substitution

Lecture 175 Loops in Bash: for, while

Lecture 176 Functions and Menus

Section 13: [EXTRA] The VIM Editor

Lecture 177 The Basics of VIM Text Editor

Lecture 178 The VIM Editor In Depth - Part 1

Lecture 179 The VIM Editor In Depth - Part 2

Section 14: Where To Go From Here?

Lecture 180 What's Next?

Section 15: BONUS SECTION

Lecture 181 Congratulations

Lecture 182 BONUS: THANK YOU GIFT!

People with some Linux experience who want to dive deeper into Linux.,Network Engineers who want to advance in Linux by building practical projects.,This is an intermediate Linux course. If you are a complete Linux beginner, this course might not be for you.


Homepage
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

452321635_178-the-vim-editor-in-depth-part-1_s.jpg


Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten