Master Windows & Linux - Ultimate Admin Bootcamp (2024)

dkmdkm

U P L O A D E R
abab9f0ddb79cc9f968255a734fdbfe9.jpg

Free Download Master Windows & Linux - Ultimate Admin Bootcamp (2024)
Published 8/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 27.07 GB | Duration: 91h 40m
IT Career Booster: Master AD, Linux, automation & security in Windows & Linux environments

What you'll learn
Master Windows Server administration, including Active Directory, Group Policy, and security best practices for enterprise environments.
Gain proficiency in Linux system administration, covering command-line operations, user management, and network configuration.
Develop advanced scripting skills in both PowerShell and Bash to automate tasks and enhance productivity across both platforms.
Implement and manage high availability solutions, including clustering and load balancing, for Windows and Linux servers.
Master essential security practices for both Windows and Linux, including hardening techniques, access control, and threat mitigation.
And much more...
Requirements
Basic IT knowledge and familiarity with computer concepts. No prior experience with Windows Server or Linux is required, but basic computer skills and understanding of networking fundamentals will be helpful. A computer with internet access and the ability to set up virtual machines (8GB RAM recommended) is needed for hands-on practice. We'll guide you through all necessary software installations. This course is designed to take you from beginner to advanced, so come with an eagerness to learn and you'll be well-prepared for the course!
Description
Master Windows Server and Linux Administration: The Ultimate Hands-On GuideElevate your IT career with our comprehensive 90+ hour course covering essential skills for managing Windows Server and Linux environments. Perfect for aspiring system administrators and IT professionals looking to expand their expertise and unlock new career opportunities.Key highlights:• Dive deep into Windows Server administration, from installation to advanced features• Explore Active Directory, Group Policy, and security best practices • Learn Linux fundamentals and advanced concepts across popular distributions• Master PowerShell and Bash scripting for efficient system management• Hands-on labs and real-world scenarios to reinforce your learningLinux in the Modern World:Linux powers much of the world's technology infrastructure, from web servers and cloud platforms to mobile devices and embedded systems. Its open-source nature, stability, and flexibility make it a top choice for enterprises, startups, and governments alike. By mastering Linux, you'll position yourself at the forefront of technological innovation and open doors to exciting career opportunities in cloud computing, DevOps, IoT, and more.Windows Server in Enterprise Environments:Windows Server remains a cornerstone of enterprise IT infrastructure, providing essential services for businesses of all sizes. From managing user identities and access to hosting critical business applications, Windows Server skills are in high demand. Proficiency in Windows Server administration will make you an invaluable asset to organizations relying on Microsoft technologies.The Power of Mastering Both:By acquiring skills in both Windows Server and Linux administration, you'll become a versatile and highly sought-after IT professional. This unique combination allows you to:• Seamlessly navigate and integrate diverse IT environments• Implement robust, cross-platform solutions for complex business needs• Adapt quickly to evolving technology landscapes and job requirements• Stand out in the job market with a broader skill set than most candidates• Contribute effectively to hybrid cloud and multi-cloud strategies• Solve a wider range of IT challenges, making you indispensable to employersCareer Advancement and Opportunities:Completing this course will significantly enhance your career prospects in the IT industry:• Qualify for in-demand roles such as Systems Administrator, Network Administrator, or IT Infrastructure Specialist• Boost your earning potential - skilled Windows/Linux admins command competitive salaries• Prepare for sought-after certifications in both Microsoft and Linux domains• Position yourself for career growth into roles like IT Manager or Cloud Architect• Gain the versatility to work across diverse IT environments and industries• Develop a strong foundation for specializing in cloud technologies, DevOps, or cybersecurityBy the end of this course, you'll have the confidence and skills to:• Deploy and manage Windows Server and Linux systems in enterprise environments• Implement robust security measures and troubleshoot common issues• Automate tasks with PowerShell and Bash scripting• Tackle certification exams with ease• Impress employers with your broad skill set and hands-on experienceWhether you're new to system administration or looking to level up your skills, this course provides the perfect blend of theory and practical knowledge to succeed in today's IT landscape. Start your journey to becoming a versatile and in-demand IT professional today!Invest in your future - gain the skills that will set you apart in the competitive IT job market and open doors to exciting career opportunities.Brief Course Outline:1. Windows Server Administration - Installation and configuration - Active Directory and Group Policy - Networking and storage management - High availability and disaster recovery - Security and performance optimization2. Linux Administration - Linux fundamentals and command line mastery - User and group management - File system administration - Network configuration and security - Package management and software installation3. PowerShell Scripting - PowerShell basics and syntax - Writing and executing scripts - Automating Windows Server tasks - Managing Active Directory with PowerShell4. Bash Scripting - Bash scripting fundamentals - Creating and debugging scripts - Automating Linux system administration tasks - Text processing and data manipulation5. Advanced Topics - Virtualization and containerization - Cloud integration - Configuration management tools (Ansible) - Monitoring and loggingWhat You'll Learn:- Install, configure, and manage Windows Server and Linux systems- Implement and administer Active Directory services- Configure and maintain network services on both platforms- Manage storage solutions, including RAID and LVM- Implement security best practices and hardening techniques- Write powerful scripts in PowerShell and Bash for task automation- Deploy and manage virtual machines and containers- Implement high availability and disaster recovery solutions- Monitor system performance and troubleshoot common issues- Integrate on-premises systems with cloud services- Use configuration management tools for efficient system administrationBy the end of this course, you'll have a comprehensive skill set covering both Windows and Linux environments, positioning you as a versatile and valuable IT professional ready to take on the challenges of modern infrastructure management.
Overview
Section 1: Introduction
Lecture 1 Instructor's Intro
Lecture 2 Introduction and Installing Windows Server 2022
Lecture 3 Activating Windows Server 2022
Lecture 4 Post-Install Tasks. Part 1
Lecture 5 Post-Install Tasks. Part 2
Lecture 6 Setting a Base Image with SYSPREP
Lecture 7 Recap
Lecture 8 Setting up your first DC
Lecture 9 Installing WAC and Joing a workstation to the domain
Lecture 10 Server Core
Lecture 11 Adding a Child Domain to the Lab
Lecture 12 Recap: Base Lab SOP
Lecture 13 AD DS Admin Tools
Lecture 14 Creating Users in our Lab
Lecture 15 Creating OU, Group, and User Template
Lecture 16 Manging AD DS Objects with Powershell
Lecture 17 Building Trusts between Forests
Lecture 18 Server Manager
Lecture 19 Getting started with Powershell
Lecture 20 Installing Hyper-V in Windows Server Lab
Lecture 21 Installing Hyper-V in Windows Server Lab. Part 2
Lecture 22 Networking basics
Lecture 23 Configuring Network Settings
Lecture 24 Installing updates and upgrading Windows Server 2019 to 2022
Lecture 25 Creating an automated answer file to automate the installation
Lecture 26 Module 1: Installing and configuring domain controllers. Overview
Lecture 27 AD DS components
Lecture 28 What is the AD DS schema?
Lecture 29 What is an AD DS forest?
Lecture 30 What is an AD DS domain?
Lecture 31 What are OUs?
Lecture 32 What is Azure AD?
Lecture 33 Overview of AD DS administration tools
Lecture 34 Demo 1: Overview of AD DS administration tools and components
Lecture 35 Demo 2: Overview of AD DS administration tools and components
Lecture 36 Demo 3: Active Directory Administrative Center to administer and manage AD DS
Lecture 37 Overview of AD DS domain controllers
Lecture 38 What is a domain controller?
Lecture 39 What is a global catalog?
Lecture 40 Demo: What is a global catalog?
Lecture 41 Overview of domain controller SRV records
Lecture 42 Demo: Overview of domain controller SRV records
Lecture 43 AD DS sign-in process
Lecture 44 Demo: AD DS sign-in process
Lecture 45 Demo: AD DS sign-in process
Lecture 46 What are operations masters?
Lecture 47 Transferring and seizing roles
Lecture 48 Deploying a domain controller: Overview
Lecture 49 Installing a domain controller from Server Manager
Lecture 50 Demo: Part 1. Installing a domain controller from Server Manager
Lecture 51 Demo: Part 2. Installing a domain controller from Server Manager
Lecture 52 Installing a domain controller on a Server Core installation of Windows Server
Lecture 53 Demo: Installing a domain controller on a Server Core
Lecture 54 Installing a domain controller by installing from media
Lecture 55 Cloning domain controllers
Lecture 56 Demonstration: Cloning domain controllers
Lecture 57 Demonstration: Adding Another domain controllers
Lecture 58 Demonstration: Installing a domain controller with Powershell
Lecture 59 Demonstration: FSMO Roles
Section 2: Managing user accounts
Lecture 60 Managing User Accounts Overview
Lecture 61 Creating user accounts
Lecture 62 Demo: Configuring user account attributes
Lecture 63 Demo: Managing user accounts
Lecture 64 Creating user profiles
Lecture 65 Demo: Creating user profiles
Lecture 66 Demo: User account templates
Lecture 67 Using Windows PowerShell cmdlets to manage user accounts
Lecture 68 Using Windows PowerShell to create users
Lecture 69 Using Windows PowerShell for bulk users operations
Lecture 70 Using Windows PowerShell to modify users' properties
Lecture 71 Using Windows PowerShell to add users to groups
Lecture 72 Using Windows PowerShell to modify users' properties. Part2
Lecture 73 Using Windows PowerShell to enable/move users
Lecture 74 Using Windows PowerShell to delete users
Section 3: Managing groups, computers, OU in AD DS
Lecture 75 Managing groups in AD DS Section Overview
Lecture 76 Group types
Lecture 77 Group types
Lecture 78 Group scopes
Lecture 79 Demo: Group scopes
Lecture 80 Implementing group management
Lecture 81 Demo: Implementing group management (IGDLA)
Lecture 82 Managing members with GPO
Lecture 83 Demo: Using Restricted Groups Setting
Lecture 84 Default groups
Lecture 85 Demo: Using Account Operators Groups and Delegate Control
Lecture 86 Special identities
Lecture 87 Demonstration: Managing groups in Windows Server
Lecture 88 Demo: Checking Groups Membership
Lecture 89 Managing computer objects in AD DS Section Overview
Lecture 90 Specifying the location of computer accounts
Lecture 91 Controlling permissions to create computer accounts
Lecture 92 Joining a computer to a domain
Lecture 93 Demo: Managing Computer Obejects
Lecture 94 Resetting the computer account (secure channel)
Lecture 95 Demo: Resetting the computer account (secure channel)
Lecture 96 Performing an offline domain join
Lecture 97 Lab Tasks: Managing objects in AD DS
Lecture 98 Lab Solution: Managing objects in AD DS
Lecture 99 Implementing and managing OUs Section Overview
Lecture 100 Planning OUs
Lecture 101 OU hierarchy considerations
Lecture 102 Considerations for using OUs
Lecture 103 AD DS permissions
Lecture 104 Delegating AD DS permissions
Lecture 105 Using Windows PowerShell for AD DS administration Section Overview
Lecture 106 Using Windows PowerShell cmdlets to manage groups
Lecture 107 PowerShell: Managing, configuring and modifying Group objects. Part 1
Lecture 108 PowerShell: Managing, configuring and modifying Group objects. Part 2
Lecture 109 PowerShell: Managing, configuring and modifying Group objects. Part 3
Lecture 110 PowerShell: Managing, configuring and modifying Group objects. Part 4
Lecture 111 PowerShell: Managing, configuring and modifying Group objects. Part 5
Lecture 112 Windows PowerShell cmdlets to manage computers and OUs
Lecture 113 PowerShell: Managing, configuring and modifying Computer objects. Part 1
Lecture 114 PowerShell: Managing, configuring and modifying Computer objects. Part 2
Section 4: Part 2
Lecture 115 Course Overview
Lecture 116 Section Overview
Lecture 117 Overview of domain and forest boundaries in an AD DS structure
Lecture 118 Why implement multiple domains?
Lecture 119 Why implement multiple forests?
Lecture 120 Deploying a domain controller in Azure IaaS
Lecture 121 Managing objects in complex AD DS deployments
Lecture 122 Deploying a distributed AD DS environment. Section Overview
Lecture 123 AD DS domain functional levels
Lecture 124 AD DS forest functional levels
Lecture 125 Demo: New domain and functional levels in Windows Server 2025
Lecture 126 Deploying new AD DS domains
Lecture 127 Considerations for implementing complex AD DS environments
Lecture 128 Demo: Installing a domain controller in a new domain in an existing forest
Lecture 129 Upgrading a previous version of AD DS to Windows Server 2016
Lecture 130 Migrating to Windows Server 2016 AD DS from a previous version
Lecture 131 Configuring AD DS trusts. Section Overview
Lecture 132 Overview of different AD DS trust types
Lecture 133 How trusts work in a forest
Lecture 134 How trusts work between forests
Lecture 135 Configuring advanced AD DS trust settings
Lecture 136 Course Overview
Lecture 137 Section Overview
Lecture 138 What are AD DS partitions?
Lecture 139 Characteristics of AD DS replication
Lecture 140 How AD DS replication works within a site
Lecture 141 Resolving replication conflicts
Lecture 142 How replication topology is generated
Lecture 143 How SYSVOL replication works
Lecture 144 Configuring AD DS sites Section Overview
Lecture 145 What are AD DS sites?
Lecture 146 Why implement additional sites?
Lecture 147 How replication works between sites
Lecture 148 What is the ISTG?
Lecture 149 Overview of SRV records
Lecture 150 How client computers locate domain controllers within sites
Lecture 151 Moving domain controllers between sites
Lecture 152 Configuring and monitoring AD DS replication Section Overview
Lecture 153 What are AD DS site links?
Lecture 154 What is site link bridging?
Lecture 155 What is universal group membership caching?
Lecture 156 Lab: Sites and Replication. Exercies and Tasks
Lecture 157 Lab: Sites and Replication. Solution
Section 5: Group Policy
Lecture 158 Course Overview
Lecture 159 What is Configuration Management
Lecture 160 Overview of Group Policy tools and consoles
Lecture 161 Computer Configuration and User Configuration
Lecture 162 Demonstration: Exploring Group Policy tools and consoles
Lecture 163 Benefits of using Group Policy
Lecture 164 Group Policy Objects
Lecture 165 Overview of GPO scope
Lecture 166 Overview of GPO inheritance
Lecture 167 The Group Policy Client service and client-side extensions
Lecture 168 What are domain-based GPOs?
Lecture 169 GPO storage
Lecture 170 What are starter GPOs?
Lecture 171 Common GPO management tasks
Lecture 172 Delegating administration of Group Policy
Lecture 173 Demo: Delegating administration of Group Policy
Lecture 174 Lesson 3: Group Policy scope and Group Policy processing
Lecture 175 What are GPO links?
Lecture 176 Group Policy processing order
Lecture 177 Configuring GPO inheritance and precedence
Lecture 178 Using security filtering to modify Group Policy scope
Lecture 179 What are WMI filters?
Lecture 180 How to enable or disable GPOs and GPO nodes
Lecture 181 Loopback policy processing
Lecture 182 Considerations for slow links and disconnected systems
Lecture 183 Identifying when settings become effective
Lecture 184 Lab A Tasks: Implementing a Group Policy infrastructure
Lecture 185 Lab A Solution: Implementing a Group Policy infrastructure
Lecture 186 Troubleshooting the application of GPOs Lesson Overview
Lecture 187 Refreshing GPOs
Lecture 188 What is RSoP and Generating RSoP Report
Lecture 189 Course Overview
Lecture 190 Section Overview
Lecture 191 What are administrative templates?
Lecture 192 What are .adm and .admx files?
Lecture 193 Overview of the central store
Lecture 194 Demonstration: Configuring settings with administrative templates
Lecture 195 Importing security templates
Lecture 196 Managing administrative templates
Lecture 197 Section Overview
Lecture 198 What is Folder Redirection?
Lecture 199 Settings for configuring Folder Redirection
Lecture 200 Security settings for redirected folders
Lecture 201 Demonstration: Configuring Folder Redirection
Lecture 202 Managing software with Group Policy
Lecture 203 Group Policy settings for applying scripts
Lecture 204 Demonstration: Configuring scripts with GPOs
Lecture 205 Section Overview
Lecture 206 What are Group Policy preferences? Comparing with Policy settings
Lecture 207 Features of Group Policy preferences
Lecture 208 Item-level targeting options
Lecture 209 Demonstration: Configuring Group Policy preferences
Lecture 210 Lab Tasks: Managing user settings with Group Policy
Lecture 211 Lab Solution: Managing user settings with Group Policy
Lecture 212 Lab Review: Managing user settings with Group Policy
Section 6: Securing domain controllers
Lecture 213 Section Overview
Lecture 214 Security risks that can affect domain controllers
Lecture 215 Demo: Installing and Using Nmap for Network Scanning and Vulnerability Assess
Lecture 216 Modifying the security settings of domain controllers
Lecture 217 Demo Example 1: Configuring and Verifying Domain Controller Security Policies
Lecture 218 Demo Example 2: Configuring Custom Security Policies for Domain Controllers
Lecture 219 Benefits of Custom GPOs for Domain Controllers: Best Practices and Consideration
Lecture 220 Implementing secure authentication
Lecture 221 Securing physical access to domain controllers
Lecture 222 What are RODCs?
Lecture 223 Deploying an RODC
Lecture 224 Planning and configuring an RODC password replication policy
Lecture 225 Demonstration: Configuring a password replication policy
Lecture 226 Separating RODC local administration
Lecture 227 Best Practices for Securing Active Directory
Lecture 228 Section Overview
Lecture 229 Password policies
Lecture 230 Account lockout policies
Lecture 231 Kerberos policies
Lecture 232 Demonstration: Configuring a fine-grained password policy
Lecture 233 Protecting groups in AD DS
Lecture 234 Fine-grained password and lockout policies
Lecture 235 Tools for creating PSOs
Lecture 236 Demonstration: Configuring authentication-related audit policies and viewing log
Lecture 237 PSO precedence and resultant PSO
Lecture 238 Account-security options
Lecture 239 Configuring user account policies
Lecture 240 Account logon and logon events skdlfdklsj lksdjflkdsjflkj lksdjfldsakjflkj dslkj
Lecture 241 Demonstration: Configuring authentication-related audit policies and viewing log
Lecture 242 Scoping audit policies
Lecture 243 Section Overview
Lecture 244 Overview of service accounts
Lecture 245 Challenges of using service accounts
Lecture 246 Overview of managed service accounts
Lecture 247 What are group MSAs?
Lecture 248 Demonstration: Configuring group MSAs
Lecture 249 Lab: Securing AD DS Exercises and Tasks
Lecture 250 Lab: Securing AD DS. Solution. Part 1
Lecture 251 Lab: Securing AD DS. Solution. Part 2
Lecture 252 Lab Review
Lecture 253 Module Review and Takeaways
Lecture 254 Plan Your Progress
Lecture 255 Course Overview
Lecture 256 Section Overview: Deploying CAs
Lecture 257 What is AD CS?
Lecture 258 Options for implementing CA hierarchies
Lecture 259 Standalone vs. enterprise CAs
Lecture 260 Considerations for deploying a root CA
Lecture 261 Demonstration: Deploying an enterprise root CA
Lecture 262 Considerations for deploying a subordinate CA
Lecture 263 How to use the CAPolicy.inf file for installing a CA
Lecture 264 Section Overview: Administering CAs
Lecture 265 Managing CAs
Lecture 266 Configuring CA security
Lecture 267 Security roles for CA administration
Lecture 268 Configuring CA policy and exit modules
Lecture 269 Configuring CDPs and AIA locations
Lecture 270 Demonstration: Configuring CA properties
Lecture 271 Section Overview: Troubleshooting CAs
Lecture 272 Renewing a CA certificate
Lecture 273 Moving a root CA to another computer
Lecture 274 Monitoring CA operations
Lecture 275 Lab Task: Deploying and managing AD CS
Lecture 276 Lab Demonstration Steps: Deploying and managing AD CS
Lecture 277 Course Overview
Lecture 278 Course Overview
Lecture 279 Section Overview
Lecture 280 What are certificates and certificate templates
Lecture 281 Certificate template versions in Windows Server
Lecture 282 Configuring certificate template permissions
Lecture 283 Configuring certificate template settings
Lecture 284 Options for updating a certificate template
Lecture 285 Demonstration: Modifying and enabling a certificate template
Lecture 286 Assess Your Knowledge. Section Overview: Managing certificate
Lecture 287 Certificate enrollment methods
Lecture 288 Overview of certificate autoenrollment
Lecture 289 What is an enrollment agent?
Lecture 290 How does certificate revocation work?
Lecture 291 Overview of key archival and recovery
Lecture 292 Demonstration: Configuring a CA for key archival
Lecture 293 Using certificates for SSL
Lecture 294 Using certificates for digital signatures
Lecture 295 Using certificates for content encryption
Lecture 296 Demonstration: Signing a document digitally. Encrypting a file
Lecture 297 Lab: Deploying and using certificates
Lecture 298 Lab Demonstration Steps: Deploying and using certificates
Lecture 299 Module Review and Takeaways
Lecture 300 Building a PKI Lab Environment with Hyper-V and Base Image
Lecture 301 Configuring Offline Root Certification Authority
Lecture 302 Configuring Root CA Settings
Lecture 303 Installing IIS Web Server and Importing Root CA Certificate
Lecture 304 Configuring IIS Virtual Directory and Settings for PKI
Lecture 305 Setting Up an Enterprise Subordinate Certification Authority
Lecture 306 Configuring CRL and AIA Distribution Points on Subordinate CA
Lecture 307 Building a PKI infrastructure lab on Windows Server Core VMs
Lecture 308 Building a PKI infrastructure lab on Windows Server Core VMs.
Lecture 309 Building a PKI infrastructure lab on Windows Server Core VMs.
Lecture 310 Managing disks in Windows Server
Lecture 311 Selecting a disk type
Lecture 312 Selecting a file system
Lecture 313 Implementing ReFS
Lecture 314 Implementing ReFS with Powershell
Lecture 315 Using .vhd and .vhdx file types
Lecture 316 Using .vhd and .vhdx file types
Lecture 317 Working with Dynamic Volumes
Lecture 318 Working with Diskpart
Lecture 319 Lab Assignment: Configuring Local Storage
Lecture 320 Lab Solution: Configuring Local Storage
Lecture 321 Selecting a disk type
Lecture 322 What is RAID?
Lecture 323 RAID levels
Lecture 324 What is DAS?
Lecture 325 What is NAS?
Lecture 326 What is a SAN?
Lecture 327 Comparison and scenarios for usage
Lecture 328 Block-level storage vs. file-level storage
Lecture 329 What is Fibre Channel?
Lecture 330 Considerations for implementing Fibre Channel
Lecture 331 What is iSCSI?
Lecture 332 iSCSI components
Lecture 333 Core storage components
Lecture 334 Demo: Configuring an iSCSI target
Lecture 335 What is iSNS?
Lecture 336 What is DCB?
Lecture 337 What is MPIO?
Lecture 338 Demo: Configuring MPIO
Lecture 339 What is SMB?
Lecture 340 Configuring SMB shares
Lecture 341 Demo: Configuring SMB shares by using Server Manager and
Lecture 342 What is NFS?
Lecture 343 Configuring NFS shares
Lecture 344 Demo: Configuring an NFS share by using Server Manager
Lecture 345 Lab Assignment: Implementing enterprise storage solutions
Lecture 346 Lab Solution: Implementing enterprise storage solutions
Lecture 347 Enterprise storage needs
Lecture 348 What are Storage Spaces?
Lecture 349 Components and features of Storage Spaces
Lecture 350 Demonstration: Configuring Storage Spaces
Lecture 351 Changes to file and storage services in Windows Server
Lecture 352 Storage Spaces usage scenarios
Lecture 353 Discussion: Comparing Storage Spaces to other storage sol
Lecture 354 Managing Storage Spaces
Lecture 355 Managing disk failure with Storage Spaces
Lecture 356 Storage pool expansion
Lecture 357 Demonstration: Managing Storage Spaces by using Windows P
Lecture 358 Event logs and performance counters
Lecture 359 Event logs and performance counters. Part 2
Lecture 360 Performance counters
Lecture 361 Lab A Tasks: Implementing Storage Spaces. Execrcise 1
Lecture 362 Lab A Tasks: Implementing Storage Spaces. Execrcise 2
Lecture 363 Lab A Solution: Implementing Storage Spaces. Execrcise 1
Lecture 364 Lab A Solution: Implementing Storage Spaces. Execrcise 2
Lecture 365 What is Data Deduplication?
Lecture 366 Data Deduplication components
Lecture 367 Deploying Data Deduplication
Lecture 368 Usage scenarios for Data Deduplication
Lecture 369 Monitoring and maintaining Data Deduplication
Lecture 370 Backup and restore considerations with Data Deduplication
Lecture 371 Lab B Tasks: Implementing Data Deduplication
Lecture 372 Lab B Tasks: Implementing Data Deduplication
Lecture 373 Lab B Solution: Implementing Data Deduplication
Lecture 374 Module Introduction
Lecture 375 New Hyper-V host features in Windows Server
Lecture 376 New Hyper-V virtual machine features
Lecture 377 Lesson 3: Configuring storage on Hyper-V host servers
Lecture 378 Considerations for virtual hard disk formats and types
Lecture 379 Demo: Managing storage in Hyper-V
Lecture 380 Lesson 4: Types of Hyper-V networks
Lecture 381 Best Practices for configuring Hyper-V virtual networks
Lecture 382 New Hyper-V networking features in Windows Server
Lecture 383 Demo: Configuring Hyper-V networks
Lecture 384 Lesson 5: Configuring Hyper-V virtual machines
Lecture 385 Virtual machine generation versions
Lecture 386 Virtual machine settings
Lecture 387 VMs features and best practice
Lecture 388 Demo: Virtual machine configuration versions
Lecture 389 Demo: Creating a virtual machine
Lecture 390 Demo: Creating a virtual machine with Powershell
Lecture 391 Lesson 6: Managing virtual machines
Lecture 392 Managing checkpoints
Lecture 393 Demo: Creating checkpoints
Lecture 394 Importing and exporting virtual machines
Lecture 395 Demo: Live migration of a virtual machine
Lecture 396 What is Docker?
Lecture 397 Demo: Installing Docker
Lecture 398 Module Overview
Lecture 399 What is high availability?
Lecture 400 What is continuous and availability?
Lecture 401 Creating a disaster recovery plan
Lecture 402 Highly available networking and storage
Lecture 403 Lesson 2: Planning high availability and disaster recover
Lecture 404 High availability considerations with Hyper-V virtual mac
Lecture 405 Overview of Live Migration
Lecture 406 Providing high availability with storage migration
Lecture 407 Demo: Configuring live migration
Lecture 408 Overview of Hyper-V Replica
Lecture 409 Demo: Configuring storage migration. Implementing Hyper-V
Lecture 410 Lesson 3: Backing up and restoring by using Windows Serve
Lecture 411 Lesson 4: High Availability with failover clustering in W
Lecture 412 What is failover clustering?
Lecture 413 Course Introduction
Lecture 414 Key Considerations for Designing a Highly Available Failo
Lecture 415 Identifying and Preparing Applications for Failover Clust
Lecture 416 Storage Options and Requirements for Failover Clusters
Lecture 417 Hardware and Network Requirements for Failover Clustering
Lecture 418 Configuring Software, Security, and Migration for Failove
Lecture 419 Cluster Configuration: Properties, Nodes, and Failover/Fa
Lecture 420 Quorum Modes and Configuration in Failover Clustering
Lecture 421 Deploying and Configuring Failover Clusters
Lecture 422 Demo: Creating a failover cluster
Lecture 423 Configuring Storage and Networking for Failover Clusters
Lecture 424 Setting Up and Administering Failover Clustering Roles
Lecture 425 Demo: Creating a general file-server failover cluster
Lecture 426 Configuring Cluster Quorum Settings
Lecture 427 Demo: Configuring the quorum
Lecture 428 Monitoring, Backing Up, and Maintaining Failover Clusters
Lecture 429 Demo: Configure failover and failback settings
Lecture 430 Failover Cluster Maintenance - Backup, Recovery, and Trou
Lecture 431 Optimizing Network Thresholds and Monitoring for Cluster
Lecture 432 Zero Downtime OS Updates Using Cluster-Aware Updating
Lecture 433 Demo: Configuring CAU
Lecture 434 Identifying and Resolving Failover Cluster Communication
Lecture 435 Troubleshooting Cluster Availability Issues Related to CN
Lecture 436 Monitoring and Diagnostic Tools for Failover Cluster Mana
Lecture 437 Deploying Stretch Clusters for Site Resiliency
Lecture 438 Deploying Highly Available Stretched Clusters Across Loca
Lecture 439 Understanding Synchronous vs Asynchronous Replication for
Lecture 440 Using Storage Replica for Stretched Clusters and Replicat
Lecture 441 Witness Selection for Site-Aware Stretched Failover Clust
Lecture 442 Implementing Site-Aware Failover Clustering
Lecture 443 Failover and Failback Procedures for Stretched Clusters
Lecture 444 Course intro
Lecture 445 What is NLB?
Lecture 446 Deployment requirements for NLB
Lecture 447 Network considerations for NLB
Lecture 448 Configuration options for NLB
Lecture 449 Designing applications and storage support for NLB
Lecture 450 Considerations for deploying an NLB cluster on virtual ma
Lecture 451 Considerations for securing NLB
Lecture 452 Considerations for scaling and upgrading NLB
Lecture 453 Demo: Implementing NLB
Lecture 454 Introduction
Lecture 455 Hands-On Lab Overview
Lecture 456 Hands-On Lab Part 1
Lecture 457 Hands-On Lab Part 2
Lecture 458 Hands-On Lab Part 3
Lecture 459 Hands-On Lab Part 4
Section 7: Linux
Lecture 460 Changing the directories, inspecting the system, examinin
Lecture 461 Displaying and setting time and date. Part 1
Lecture 462 Displaying and setting time and date. Part 2
Lecture 463 Getting device information and using compression/archivin
Lecture 464 Getting help (continued)
Lecture 465 Path and file types
Lecture 466 Creating files or directories and listing files or direct
Lecture 467 Copying, moving, renaming, removing files and directories
Lecture 468 File and directory control attributes
Lecture 469 Finding files. Part 1
Lecture 470 Finding files. Part 2
Lecture 471 Finding files. Part 3
Lecture 472 Finding files. Part 4
Lecture 473 Hands-On Task Demo: Finding Large Files and Creating a Lo
Lecture 474 File permissions. Part 1
Lecture 475 File permissions. Part 2
Lecture 476 Permissions for group collaboration
Lecture 477 Hands-On Task Demo: Configuring Linux Permissions for a D
Lecture 478 Getting Started with Vim Basics
Lecture 479 Creating, opening and saving a file. Moving around VIM ed
Lecture 480 Getting help in VIM
Lecture 481 Creating the first file in vim
Lecture 482 Basic vim commands
Lecture 483 VIM motion commands and search
Lecture 484 Opening and saving files in VIM
Lecture 485 Opening multiple files and splitting windows
Lecture 486 Switching between windows
Lecture 487 Introduction to Basic Navigation in Vim
Lecture 488 Hands-on Practice: Vim Installation and Basic Navigation
Lecture 489 Fundamentals of Editing in Vim
Lecture 490 Basic Vim Navigation
Lecture 491 Advanced Vim Navigation
Lecture 492 Vim Search and Replace
Lecture 493 Vim Copy and Insert
Lecture 494 Vim Fundamentals: A Comprehensive Review of Core Concepts
Lecture 495 Overview of Exercise Lessons. What will we learn?
Lecture 496 Exercise 1: Editing in Vim
Lecture 497 Exercise 2: Editing in Vim
Lecture 498 Exercise 3: Editing in Vim
Lecture 499 Navigating and Editing Multiple Files in Vim
Lecture 500 Advanced Vim Techniques for Managing Multiple Files
Lecture 501 Searching the needed info with grep&wc
Lecture 502 Cat and output redirection
Lecture 503 Using pipes
Lecture 504 Processes revealed
Lecture 505 Processes and jobs
Lecture 506 Exploring all running processes with top command
Lecture 507 Understanding process states
Lecture 508 Changing process priority with nice
Lecture 509 Controlling processes with signals
Lecture 510 Changing password with passwd and working withPATH
Lecture 511 Special characters and command-line keystrokes
Lecture 512 Chaining operators
Lecture 513 Sed and awk
Lecture 514 Sed and awk. Part 2
Lecture 515 Performing exit, reboot or shutdown on the system
Lecture 516 Using BASH history
Lecture 517 Using aliases to create your own commands
Lecture 518 Watching files and how they're changing live with watch c
Lecture 519 Gaining administrative privileges with sudo command
Lecture 520 Understanding Job Scheduling with cron and at commnds
Lecture 521 Packages overview
Lecture 522 Managing packages with rpm command
Lecture 523 Installing and modifying packages with rpm command
Lecture 524 Viewing pgp keys and verifying package attributes
Lecture 525 YUM package manager. Part 1
Lecture 526 YUM package manager. Part 2
Lecture 527 YUM package manager. Part 3
Lecture 528 Configuring hostname
Lecture 529 IPv4 concepts and traceroute command usage
Lecture 530 Using 'ip' command
Lecture 531 Validating and Troubleshooting Network Configuration
Lecture 532 Practice Lab: Examining Network Configuration
Lecture 533 Configuring Networking with nmcli
Lecture 534 Validating Network Configuration (with Guided Exercise)(
Lecture 535 Editing Network Configuration Files (with Guided Exercise
Lecture 536 Lab: Managing Networking
Lecture 537 Installing RHEL9
Lecture 538 Registering RHEL9
Lecture 539 Users: Intro, id command, passwd file
Lecture 540 Users: Gaining Superuser Access. su and sudo commands
Lecture 541 Users: Configuring sudo
Lecture 542 Users: Guided Exercise Using sudo
Lecture 543 Users: Using useradd, userdel and usermod
Lecture 544 Users: Practice excersise with useradd, userdel and userm
Lecture 545 Groups: groupadd, groupdel and groupmod
Lecture 546 Groups: adding users to groups
Lecture 547 Users: working with passwords
Lecture 548 Users: Practice. Working with passwords
Lecture 549 Lab: Managing Users and Groups
Lecture 550 File permissions
Lecture 551 Changing Permissions for Files and Directories
Lecture 552 Changing Ownership for Files and Directories
Lecture 553 Guided Exercise: Managing File System Permissions from th
Lecture 554 Umask and Managing Default Permissions and File Access
Lecture 555 Guided Exercise: Umask and Managing Default Permissions
Lecture 556 Lab: Controlling Access to Files
Lecture 557 Listing Processes and Process States. PS command options
Lecture 558 Controlling Jobs
Lecture 559 Guided Exercise: Controlling Jobs
Lecture 560 Killing Processes
Lecture 561 Monitoring process activity
Lecture 562 Lab: Monitoring and Managing Processes
Lecture 563 Controlling Services and Daemons
Lecture 564 Controlling Services and Daemons: Guided Exercises
Lecture 565 Accessing Comand Line with SSH
Lecture 566 Configuring SSH key-based authentication
Lecture 567 Configuring and securing SSH
Lecture 568 Describing System Log Architechture
Lecture 569 Reviewing Syslog Files
Lecture 570 Reviewing System Journal Entries
Lecture 571 Preserving the System Journal
Lecture 572 Maintaining Accurate Time
Lecture 573 Lab: Analyzing and Storing Logs
Lecture 574 Archiving and Compressing Files
Lecture 575 Transferring Files Between Systems Securely
Lecture 576 Using 'at' Package
Lecture 577 Scheduling Recurring Tasks with 'crontab'
Lecture 578 Scheduling Recurring System Jobs
Lecture 579 Guided Exercise: Scheduling Recurring System Jobs
Lecture 580 Managing Temporary Files
Lecture 581 Guided Exercise: Managing Temporary Files
Lecture 582 Adjusting Tuning Profiles
Lecture 583 Adjusting Process Scheduling
Lecture 584 Guided Exercise: Changing Process Scheduling
Lecture 585 Interpreting File ACLs
Lecture 586 Securing Files with ACLs
Lecture 587 Guided Exercise: Securing Files with ACLs
Lecture 588 Adding Partitions, File Systems, and Persistent Mounts
Lecture 589 Guided Exercise: Adding Partitions, File Systems, and Per
Lecture 590 Managing Swap Space
Lecture 591 Lab: Managing Basic Storage
Lecture 592 Managing Logical Volumes
Lecture 593 Extending Logical Volumes
Lecture 594 Guided Exercise: Extending Logical Volumes
Lecture 595 Lab: Managing Logical Volumes
Lecture 596 Managing Layered Storage with Stratis
Lecture 597 Guided Exercise: Managing Layered Storage with Stratis
Lecture 598 Compresson and Deduplicating Storage with VDO
Lecture 599 Lab: Implementing Advanced Stirage Features
Lecture 600 Accessing Network-Attached Storage
Lecture 601 Guided Exercise: Accessing Network-Attached Storage
Lecture 602 Describing the Boot Process
Lecture 603 Guided Exercise: Selecting the Boot Target
Lecture 604 Guided Exercise:Resetting the Root Password. Using Debug
Lecture 605 Lab: Controlling the Boot Process
Lecture 606 Describing Networking Concepts
Lecture 607 IPv4 settings. Defining subnets
Lecture 608 IPv4 Guided Exercises. Public and Private Adresses
Lecture 609 Lab: Planning an IPv4 network
Lecture 610 Using OpenSSL on Red Hat Linux to Create, Operate, and Se
Lecture 611 Creating Certificate Authority (Self-Signed)
Lecture 612 Hands-On Lab on OpenSSL
Lecture 613 Administration and Monitoring with udevadm
Lecture 614 UDEV Configuration and Device Management
Lecture 615 Kernel Module Management: Using modprobe and rmmod
Lecture 616 Installation and Package Management Troubleshooting
Lecture 617 USB Device Detection and Management in Linux: Using lsusb
Lecture 618 Using dmesg for System Monitoring and Troubleshooting in
Lecture 619 Understanding Linux Run Levels: System Maintenance and Tr
Lecture 620 Questions 1 -2: Using 'udevadm' and '/proc'
Lecture 621 Questions 3 -4: udev Configuration Location. Loading kern
Lecture 622 Questions 5- 6. Querying udev database. Listing USB devic
Lecture 623 Question 7: Using dmesg to view kernel ring buffer
Lecture 624 Writing Simple Bash Scripts
Lecture 625 Guided Exercise: Writing Your First Script
Lecture 626 Using Loops
Lecture 627 Guided Exercise: Using Loops
Lecture 628 Describing a Simple Regular Expression
Lecture 629 Guided Exercise: Using grep with RegEx
Lecture 630 Using grep with RegEx
Lecture 631 Lab: Your First Script
Lecture 632 Building Scripts: Using Variables and Redirecting Input/O
Lecture 633 Building Scripts: the if-then statements
Lecture 634 Building Scripts: Trying the Test command. Using Comparis
Lecture 635 Building Scripts: Using File Comparison
Lecture 636 Compound Testing. Working wit Advanced If-Then Statements
Lecture 637 A Practical Example
Lecture 638 Looping with the 'for' statement
Lecture 639 Looping with the 'for' statement. Part 2
Lecture 640 Using 'while' and 'until' commands. Using Loops
Lecture 641 Using Loops. Part 2
Lecture 642 Practical Examples Using Loops
Lecture 643 Passing Parameters
Lecture 644 Using Special Parameter Variables
Lecture 645 Working with Options
Lecture 646 Using Read Command
Lecture 647 A Practical Example
Lecture 648 Understanding Input and Output
Lecture 649 Redirecting Output in Scripts
Lecture 650 Read/Write file descriptors
Lecture 651 Supressing Command Output. Using temp files. Logging Mess
Lecture 652 A practical example: using input and output
Lecture 653 Signaling the Bash shell
Lecture 654 Using traps
Lecture 655 Running scripts in background
Lecture 656 Running Scripts without a Hang-up
Lecture 657 Controlling the Job. Viewing Jobs
Lecture 658 Your First Bash Script. Part 1
Lecture 659 Your First Bash Script. Part 2
Lecture 660 Bash Syntax Fundamentals. Part 1
Lecture 661 Bash Syntax Fundamentals. Part 2
Lecture 662 Bash Syntax Fundamentals. Part 3
Lecture 663 Working with Files and Permissions. Part 1
Lecture 664 Working with Files and Permissions. Part 2
Lecture 665 Working with Files and Permissions. Part 3
Lecture 666 Script Example: File Operations and Bash Concepts
Lecture 667 'if' Statement. Part 1
Lecture 668 'if' Statement. Part 2
Lecture 669 Loops in Bash. Part 1
Lecture 670 Loops in Bash. Part 2
Lecture 671 Hands-on Lab: Interactive Menu Script. Part 1
Lecture 672 Hands-on Lab: Interactive Menu Script. Part 2
Lecture 673 Hands-on Lab: Linux Administration Interactive Menu Scrip
Lecture 674 Hands-on Lab: Linux Administration Interactive Menu Scrip
Lecture 675 Functions in Bash. Part 1
Lecture 676 Functions in Bash. Part 2
Lecture 677 Error Handling and Debugging in Bash. Part 1
Lecture 678 Error Handling and Debugging in Bash. Part 2
Lecture 679 Error Handling and Debugging in Bash. Part 3
Lecture 680 Advanced Bash Scripting Techniques - Examples Explained.
Lecture 681 Advanced Bash Scripting Techniques - Examples Explained.
Lecture 682 Advanced Bash Scripting Techniques - Examples Explained.
Lecture 683 Advanced Bash Scripting Techniques - Practical Example Wa
Lecture 684 Bash Script Optimization and Performance. Part 1
Lecture 685 Bash Script Optimization and Performance. Part 2
Lecture 686 Bash Script Optimization and Performance. Part 3
Lecture 687 Bash Script Optimization and Performance. Part 4
Lecture 688 Bash Script Optimization and Performance. Practical Examp
Lecture 689 Intro to Vagrant
Lecture 690 Getting Installed
Lecture 691 Using Vagrant
Lecture 692 Using Vagrant. Part 2
Lecture 693 Using Vagrant. Part 3
Lecture 694 Using Vagrant. Part 4
Lecture 695 Using Vagrant. Part 5
Lecture 696 Using Vagrant. Part 6
Lecture 697 Using Vagrant. Part 7
Lecture 698 Using Vagrant. Part 8
Lecture 699 Creating VM in RHEL cockpit
Lecture 700 Configuring VMs
Lecture 701 Configuring the prerequisites on managed hosts
Lecture 702 Setting up SSH Key-based Authentication
Lecture 703 What is an Ansible Inventory?
Lecture 704 Building an Ansible Inventory
Lecture 705 Using Ansible Ad-Hoc Commands
Lecture 706 Ansible Ad-Hoc Commands: A Practical Demonstration
Lecture 707 Guided Exercise: Ansible Ad-Hoc Commands in Practice
Lecture 708 Intro to Ansible
Lecture 709 Getting Installed
Lecture 710 Configuring SSH
Lecture 711 Getting inventory
Lecture 712 Using modules
Lecture 713 Starting with Playbooks
Lecture 714 Starting with Playbooks. Part 2
Lecture 715 Starting with Playbooks. Part 3
Lecture 716 Starting with Playbooks. Part 4
Lecture 717 Building Ansible Lab Environment
Lecture 718 Describing Ansible Inventory Files
Lecture 719 Guided Exercise: Ansible Inventory Files
Lecture 720 Managing Ansible Configuaration Files
Lecture 721 Managing Connectivity and Configuaration Files
Lecture 722 Guided Exercise: Managing Ansible Configuaration Files
Lecture 723 Running Ad Hoc Commands
Lecture 724 Guided Exercise: Running Ad Hoc Commands
Lecture 725 Lab: Deploying Ansible
Lecture 726 Implementing Playbooks
Lecture 727 Guided Exercise: Implementing Playbooks
Lecture 728 Multiple Plays
Lecture 729 Guided Exercise: Multiple Plays
Lecture 730 Lab: Implementing Playbooks
Lecture 731 Managing Variables
Lecture 732 Guided Exercise: Managing Variables
Lecture 733 Managing Secrets
Lecture 734 Guided Exercise: Managing Secrets
Lecture 735 Managing Facts
Lecture 736 Guided Exercise: Managing Facts
Lecture 737 Lab: Managing Variables and Facts
Lecture 738 Writing Loops and Conditional Tasks
Lecture 739 Guided Exercise: Writing Loops and Conditional Tasks
Lecture 740 Implementing Handlers
Lecture 741 Handling Task Failure
Lecture 742 Guided Exercise: Handling Task Failure
Lecture 743 Guided Lab:Implementing Task Control
Lecture 744 Intro
Lecture 745 Getting Installed
Lecture 746 Configuring Git
Lecture 747 Your First Commit
Lecture 748 Using Push
Lecture 749 Clone and Pull
Lecture 750 Use Ignore
Lecture 751 History
Lecture 752 Use Branches
Section 8: Powershell
Lecture 753 Course overview
Lecture 754 Overview of Part 1
Lecture 755 Powershell Overview
Lecture 756 Powershell Versions
Lecture 757 Get to know Two Host Applications
Lecture 758 What Version are You Using
Lecture 759 Always Run the Shell as Administrator
Lecture 760 Tips and Tricks
Lecture 761 Configuring the Console
Lecture 762 Configuring the Console (demo)
Lecture 763 Configuring the ISE
Lecture 764 Configuring the ISE (demo)
Lecture 765 LAB 1 Exercise 1
Lecture 766 LAB 1 Exercise 1 Answer Video
Lecture 767 LAB 1 Exercise 2
Lecture 768 LAB 1 Exercise 2 Answer Video
Lecture 769 LAB Review
Lecture 770 Part 2 Overview
Lecture 771 Commands that Seem Familiar
Lecture 772 Learning Commands Syntax
Lecture 773 Viewing Help (demo)
Lecture 774 Finding Commands
Lecture 775 Finding Commands (demo)
Lecture 776 Interpreting Help
Lecture 777 Updating Help
Lecture 778 Updating and saving help files
Lecture 779 Demo: Updating and saving help files
Lecture 780 About Files
Lecture 781 About Files (demo)
Lecture 782 Part 3 Overview
Lecture 783 Full Command Syntax
Lecture 784 Specifying Multiple Parameter Value
Lecture 785 Shortened Command Syntax
Lecture 786 Show-Command Command
Lecture 787 Commands that Modify the System
Lecture 788 Show-Command (demo)
Lecture 789 Commands that Modify the System (demo)
Lecture 790 Lab B: Finding and Running Basic Commands Tasks
Lecture 791 Lab B Solution: Finding and Running Basic Commands
Lecture 792 Module Review and Takeaways
Lecture 793 Course overview
Lecture 794 Part 1 Overview
Lecture 795 Understanding the Pipeline. Part 1. Lesson 1
Lecture 796 Understanding the Pipeline. Part 1. Lesson 2
Lecture 797 Understanding the Pipeline. Part 1. Lesson 3
Lecture 798 Understanding the Pipeline. Part 1. Lesson 4
Lecture 799 Understanding the Pipeline. Part 1. Lesson 5
Lecture 800 Understanding the Pipeline. Part 1. Lesson 6
T professionals and aspiring system administrators looking to advance their careers by mastering both Windows Server and Linux administration skills.,Recent IT graduates or career changers aiming to build a strong foundation in enterprise-level server administration across multiple operating systems.,Experienced Windows administrators looking to add Linux skills to their repertoire, or Linux admins wanting to become proficient in Windows Server environments.,Network administrators seeking to expand their expertise to include cross-platform server management and automation techniques.
Homepage
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!




Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
No Password - Links are Interchangeable
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten