Master Windows & Linux: Ultimate Admin Bootcamp (2024)

Prkos

U P L O A D E R
206112a7c083ce7893ca9d106cf362ea.jpg


Master Windows & Linux: Ultimate Admin Bootcamp (2024)
Published 8/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 27.07 GB | Duration: 91h 40m

IT Career Booster: Master AD, Linux, automation & security in Windows & Linux environments



What you'll learn
Master Windows Server administration, including Active Directory, Group Policy, and security best practices for enterprise environments.
Gain proficiency in Linux system administration, covering command-line operations, user management, and network configuration.
Develop advanced scripting skills in both PowerShell and Bash to automate tasks and enhance productivity across both platforms.
Implement and manage high availability solutions, including clustering and load balancing, for Windows and Linux servers.
Master essential security practices for both Windows and Linux, including hardening techniques, access control, and threat mitigation.
And much more...

Requirements
Basic IT knowledge and familiarity with computer concepts. No prior experience with Windows Server or Linux is required, but basic computer skills and understanding of networking fundamentals will be helpful. A computer with internet access and the ability to set up virtual machines (8GB RAM recommended) is needed for hands-on practice. We'll guide you through all necessary software installations. This course is designed to take you from beginner to advanced, so come with an eagerness to learn and you'll be well-prepared for the course!

Description
Master Windows Server and Linux Administration: The Ultimate Hands-On GuideElevate your IT career with our comprehensive 90+ hour course covering essential skills for managing Windows Server and Linux environments. Perfect for aspiring system administrators and IT professionals looking to expand their expertise and unlock new career opportunities.Key highlights: Dive deep into Windows Server administration, from installation to advanced features Explore Active Directory, Group Policy, and security best practices Learn Linux fundamentals and advanced concepts across popular distributions Master PowerShell and Bash scripting for efficient system management Hands-on labs and real-world scenarios to reinforce your learningLinux in the Modern World:Linux powers much of the world's technology infrastructure, from web servers and cloud platforms to mobile devices and embedded systems. Its open-source nature, stability, and flexibility make it a top choice for enterprises, startups, and governments alike. By mastering Linux, you'll position yourself at the forefront of technological innovation and open doors to exciting career opportunities in cloud computing, DevOps, IoT, and more.Windows Server in Enterprise Environments:Windows Server remains a cornerstone of enterprise IT infrastructure, providing essential services for businesses of all sizes. From managing user identities and access to hosting critical business applications, Windows Server skills are in high demand. Proficiency in Windows Server administration will make you an invaluable asset to organizations relying on Microsoft technologies.The Power of Mastering Both:By acquiring skills in both Windows Server and Linux administration, you'll become a versatile and highly sought-after IT professional. This unique combination allows you to: Seamlessly navigate and integrate diverse IT environments Implement robust, cross-platform solutions for complex business needs Adapt quickly to evolving technology landscapes and job requirements Stand out in the job market with a broader skill set than most candidates Contribute effectively to hybrid cloud and multi-cloud strategies Solve a wider range of IT challenges, making you indispensable to employersCareer Advancement and Opportunities:Completing this course will significantly enhance your career prospects in the IT industry: Qualify for in-demand roles such as Systems Administrator, Network Administrator, or IT Infrastructure Specialist Boost your earning potential - skilled Windows/Linux admins command competitive salaries Prepare for sought-after certifications in both Microsoft and Linux domains Position yourself for career growth into roles like IT Manager or Cloud Architect Gain the versatility to work across diverse IT environments and industries Develop a strong foundation for specializing in cloud technologies, DevOps, or cybersecurityBy the end of this course, you'll have the confidence and skills to: Deploy and manage Windows Server and Linux systems in enterprise environments Implement robust security measures and troubleshoot common issues Automate tasks with PowerShell and Bash scripting Tackle certification exams with ease Impress employers with your broad skill set and hands-on experienceWhether you're new to system administration or looking to level up your skills, this course provides the perfect blend of theory and practical knowledge to succeed in today's IT landscape. Start your journey to becoming a versatile and in-demand IT professional today!Invest in your future - gain the skills that will set you apart in the competitive IT job market and open doors to exciting career opportunities.Brief Course Outline:1. Windows Server Administration - Installation and configuration - Active Directory and Group Policy - Networking and storage management - High availability and disaster recovery - Security and performance optimization2. Linux Administration - Linux fundamentals and command line mastery - User and group management - File system administration - Network configuration and security - Package management and software installation3. PowerShell Scripting - PowerShell basics and syntax - Writing and executing scripts - Automating Windows Server tasks - Managing Active Directory with PowerShell4. Bash Scripting - Bash scripting fundamentals - Creating and debugging scripts - Automating Linux system administration tasks - Text processing and data manipulation5. Advanced Topics - Virtualization and containerization - Cloud integration - Configuration management tools (Ansible) - Monitoring and loggingWhat You'll Learn:- Install, configure, and manage Windows Server and Linux systems- Implement and administer Active Directory services- Configure and maintain network services on both platforms- Manage storage solutions, including RAID and LVM- Implement security best practices and hardening techniques- Write powerful scripts in PowerShell and Bash for task automation- Deploy and manage virtual machines and containers- Implement high availability and disaster recovery solutions- Monitor system performance and troubleshoot common issues- Integrate on-premises systems with cloud services- Use configuration management tools for efficient system administrationBy the end of this course, you'll have a comprehensive skill set covering both Windows and Linux environments, positioning you as a versatile and valuable IT professional ready to take on the challenges of modern infrastructure management.

Overview
Section 1: Introduction

Lecture 1 Instructor's Intro

Lecture 2 Introduction and Installing Windows Server 2022

Lecture 3 Activating Windows Server 2022

Lecture 4 Post-Install Tasks. Part 1

Lecture 5 Post-Install Tasks. Part 2

Lecture 6 Setting a Base Image with SYSPREP

Lecture 7 Recap

Lecture 8 Setting up your first DC

Lecture 9 Installing WAC and Joing a workstation to the domain

Lecture 10 Server Core

Lecture 11 Adding a Child Domain to the Lab

Lecture 12 Recap: Base Lab SOP

Lecture 13 AD DS Admin Tools

Lecture 14 Creating Users in our Lab

Lecture 15 Creating OU, Group, and User Template

Lecture 16 Manging AD DS Objects with Powershell

Lecture 17 Building Trusts between Forests

Lecture 18 Server Manager

Lecture 19 Getting started with Powershell

Lecture 20 Installing Hyper-V in Windows Server Lab

Lecture 21 Installing Hyper-V in Windows Server Lab. Part 2

Lecture 22 Networking basics

Lecture 23 Configuring Network Settings

Lecture 24 Installing updates and upgrading Windows Server 2019 to 2022

Lecture 25 Creating an automated answer file to automate the installation

Lecture 26 Module 1: Installing and configuring domain controllers. Overview

Lecture 27 AD DS components

Lecture 28 What is the AD DS schema?

Lecture 29 What is an AD DS forest?

Lecture 30 What is an AD DS domain?

Lecture 31 What are OUs?

Lecture 32 What is Azure AD?

Lecture 33 Overview of AD DS administration tools

Lecture 34 Demo 1: Overview of AD DS administration tools and components

Lecture 35 Demo 2: Overview of AD DS administration tools and components

Lecture 36 Demo 3: Active Directory Administrative Center to administer and manage AD DS

Lecture 37 Overview of AD DS domain controllers

Lecture 38 What is a domain controller?

Lecture 39 What is a global catalog?

Lecture 40 Demo: What is a global catalog?

Lecture 41 Overview of domain controller SRV records

Lecture 42 Demo: Overview of domain controller SRV records

Lecture 43 AD DS sign-in process

Lecture 44 Demo: AD DS sign-in process

Lecture 45 Demo: AD DS sign-in process

Lecture 46 What are operations masters?

Lecture 47 Transferring and seizing roles

Lecture 48 Deploying a domain controller: Overview

Lecture 49 Installing a domain controller from Server Manager

Lecture 50 Demo: Part 1. Installing a domain controller from Server Manager

Lecture 51 Demo: Part 2. Installing a domain controller from Server Manager

Lecture 52 Installing a domain controller on a Server Core installation of Windows Server

Lecture 53 Demo: Installing a domain controller on a Server Core

Lecture 54 Installing a domain controller by installing from media

Lecture 55 Cloning domain controllers

Lecture 56 Demonstration: Cloning domain controllers

Lecture 57 Demonstration: Adding Another domain controllers

Lecture 58 Demonstration: Installing a domain controller with Powershell

Lecture 59 Demonstration: FSMO Roles

Section 2: Managing user accounts

Lecture 60 Managing User Accounts Overview

Lecture 61 Creating user accounts

Lecture 62 Demo: Configuring user account attributes

Lecture 63 Demo: Managing user accounts

Lecture 64 Creating user profiles

Lecture 65 Demo: Creating user profiles

Lecture 66 Demo: User account templates

Lecture 67 Using Windows PowerShell cmdlets to manage user accounts

Lecture 68 Using Windows PowerShell to create users

Lecture 69 Using Windows PowerShell for bulk users operations

Lecture 70 Using Windows PowerShell to modify users' properties

Lecture 71 Using Windows PowerShell to add users to groups

Lecture 72 Using Windows PowerShell to modify users' properties. Part2

Lecture 73 Using Windows PowerShell to enable/move users

Lecture 74 Using Windows PowerShell to delete users

Section 3: Managing groups, computers, OU in AD DS

Lecture 75 Managing groups in AD DS Section Overview

Lecture 76 Group types

Lecture 77 Group types

Lecture 78 Group scopes

Lecture 79 Demo: Group scopes

Lecture 80 Implementing group management

Lecture 81 Demo: Implementing group management (IGDLA)

Lecture 82 Managing members with GPO

Lecture 83 Demo: Using Restricted Groups Setting

Lecture 84 Default groups

Lecture 85 Demo: Using Account Operators Groups and Delegate Control

Lecture 86 Special identities

Lecture 87 Demonstration: Managing groups in Windows Server

Lecture 88 Demo: Checking Groups Membership

Lecture 89 Managing computer objects in AD DS Section Overview

Lecture 90 Specifying the location of computer accounts

Lecture 91 Controlling permissions to create computer accounts

Lecture 92 Joining a computer to a domain

Lecture 93 Demo: Managing Computer Obejects

Lecture 94 Resetting the computer account (secure channel)

Lecture 95 Demo: Resetting the computer account (secure channel)

Lecture 96 Performing an offline domain join

Lecture 97 Lab Tasks: Managing objects in AD DS

Lecture 98 Lab Solution: Managing objects in AD DS

Lecture 99 Implementing and managing OUs Section Overview

Lecture 100 Planning OUs

Lecture 101 OU hierarchy considerations

Lecture 102 Considerations for using OUs

Lecture 103 AD DS permissions

Lecture 104 Delegating AD DS permissions

Lecture 105 Using Windows PowerShell for AD DS administration Section Overview

Lecture 106 Using Windows PowerShell cmdlets to manage groups

Lecture 107 PowerShell: Managing, configuring and modifying Group objects. Part 1

Lecture 108 PowerShell: Managing, configuring and modifying Group objects. Part 2

Lecture 109 PowerShell: Managing, configuring and modifying Group objects. Part 3

Lecture 110 PowerShell: Managing, configuring and modifying Group objects. Part 4

Lecture 111 PowerShell: Managing, configuring and modifying Group objects. Part 5

Lecture 112 Windows PowerShell cmdlets to manage computers and OUs

Lecture 113 PowerShell: Managing, configuring and modifying Computer objects. Part 1

Lecture 114 PowerShell: Managing, configuring and modifying Computer objects. Part 2

Section 4: Part 2

Lecture 115 Course Overview

Lecture 116 Section Overview

Lecture 117 Overview of domain and forest boundaries in an AD DS structure

Lecture 118 Why implement multiple domains?

Lecture 119 Why implement multiple forests?

Lecture 120 Deploying a domain controller in Azure IaaS

Lecture 121 Managing objects in complex AD DS deployments

Lecture 122 Deploying a distributed AD DS environment. Section Overview

Lecture 123 AD DS domain functional levels

Lecture 124 AD DS forest functional levels

Lecture 125 Demo: New domain and functional levels in Windows Server 2025

Lecture 126 Deploying new AD DS domains

Lecture 127 Considerations for implementing complex AD DS environments

Lecture 128 Demo: Installing a domain controller in a new domain in an existing forest

Lecture 129 Upgrading a previous version of AD DS to Windows Server 2016

Lecture 130 Migrating to Windows Server 2016 AD DS from a previous version

Lecture 131 Configuring AD DS trusts. Section Overview

Lecture 132 Overview of different AD DS trust types

Lecture 133 How trusts work in a forest

Lecture 134 How trusts work between forests

Lecture 135 Configuring advanced AD DS trust settings

Lecture 136 Course Overview

Lecture 137 Section Overview

Lecture 138 What are AD DS partitions?

Lecture 139 Characteristics of AD DS replication

Lecture 140 How AD DS replication works within a site

Lecture 141 Resolving replication conflicts

Lecture 142 How replication topology is generated

Lecture 143 How SYSVOL replication works

Lecture 144 Configuring AD DS sites Section Overview

Lecture 145 What are AD DS sites?

Lecture 146 Why implement additional sites?

Lecture 147 How replication works between sites

Lecture 148 What is the ISTG?

Lecture 149 Overview of SRV records

Lecture 150 How client computers locate domain controllers within sites

Lecture 151 Moving domain controllers between sites

Lecture 152 Configuring and monitoring AD DS replication Section Overview

Lecture 153 What are AD DS site links?

Lecture 154 What is site link bridging?

Lecture 155 What is universal group membership caching?

Lecture 156 Lab: Sites and Replication. Exercies and Tasks

Lecture 157 Lab: Sites and Replication. Solution

Section 5: Group Policy

Lecture 158 Course Overview

Lecture 159 What is Configuration Management

Lecture 160 Overview of Group Policy tools and consoles

Lecture 161 Computer Configuration and User Configuration

Lecture 162 Demonstration: Exploring Group Policy tools and consoles

Lecture 163 Benefits of using Group Policy

Lecture 164 Group Policy Objects

Lecture 165 Overview of GPO scope

Lecture 166 Overview of GPO inheritance

Lecture 167 The Group Policy Client service and client-side extensions

Lecture 168 What are domain-based GPOs?

Lecture 169 GPO storage

Lecture 170 What are starter GPOs?

Lecture 171 Common GPO management tasks

Lecture 172 Delegating administration of Group Policy

Lecture 173 Demo: Delegating administration of Group Policy

Lecture 174 Lesson 3: Group Policy scope and Group Policy processing

Lecture 175 What are GPO links?

Lecture 176 Group Policy processing order

Lecture 177 Configuring GPO inheritance and precedence

Lecture 178 Using security filtering to modify Group Policy scope

Lecture 179 What are WMI filters?

Lecture 180 How to enable or disable GPOs and GPO nodes

Lecture 181 Loopback policy processing

Lecture 182 Considerations for slow links and disconnected systems

Lecture 183 Identifying when settings become effective

Lecture 184 Lab A Tasks: Implementing a Group Policy infrastructure

Lecture 185 Lab A Solution: Implementing a Group Policy infrastructure

Lecture 186 Troubleshooting the application of GPOs Lesson Overview

Lecture 187 Refreshing GPOs

Lecture 188 What is RSoP and Generating RSoP Report

Lecture 189 Course Overview

Lecture 190 Section Overview

Lecture 191 What are administrative templates?

Lecture 192 What are .adm and .admx files?

Lecture 193 Overview of the central store

Lecture 194 Demonstration: Configuring settings with administrative templates

Lecture 195 Importing security templates

Lecture 196 Managing administrative templates

Lecture 197 Section Overview

Lecture 198 What is Folder Redirection?

Lecture 199 Settings for configuring Folder Redirection

Lecture 200 Security settings for redirected folders

Lecture 201 Demonstration: Configuring Folder Redirection

Lecture 202 Managing software with Group Policy

Lecture 203 Group Policy settings for applying scripts

Lecture 204 Demonstration: Configuring scripts with GPOs

Lecture 205 Section Overview

Lecture 206 What are Group Policy preferences? Comparing with Policy settings

Lecture 207 Features of Group Policy preferences

Lecture 208 Item-level targeting options

Lecture 209 Demonstration: Configuring Group Policy preferences

Lecture 210 Lab Tasks: Managing user settings with Group Policy

Lecture 211 Lab Solution: Managing user settings with Group Policy

Lecture 212 Lab Review: Managing user settings with Group Policy

Section 6: Securing domain controllers

Lecture 213 Section Overview

Lecture 214 Security risks that can affect domain controllers

Lecture 215 Demo: Installing and Using Nmap for Network Scanning and Vulnerability Assess

Lecture 216 Modifying the security settings of domain controllers

Lecture 217 Demo Example 1: Configuring and Verifying Domain Controller Security Policies

Lecture 218 Demo Example 2: Configuring Custom Security Policies for Domain Controllers

Lecture 219 Benefits of Custom GPOs for Domain Controllers: Best Practices and Consideration

Lecture 220 Implementing secure authentication

Lecture 221 Securing physical access to domain controllers

Lecture 222 What are RODCs?

Lecture 223 Deploying an RODC

Lecture 224 Planning and configuring an RODC password replication policy

Lecture 225 Demonstration: Configuring a password replication policy

Lecture 226 Separating RODC local administration

Lecture 227 Best Practices for Securing Active Directory

Lecture 228 Section Overview

Lecture 229 Password policies

Lecture 230 Account lockout policies

Lecture 231 Kerberos policies

Lecture 232 Demonstration: Configuring a fine-grained password policy

Lecture 233 Protecting groups in AD DS

Lecture 234 Fine-grained password and lockout policies

Lecture 235 Tools for creating PSOs

Lecture 236 Demonstration: Configuring authentication-related audit policies and viewing log

Lecture 237 PSO precedence and resultant PSO

Lecture 238 Account-security options

Lecture 239 Configuring user account policies

Lecture 240 Account logon and logon events skdlfdklsj lksdjflkdsjflkj lksdjfldsakjflkj dslkj

Lecture 241 Demonstration: Configuring authentication-related audit policies and viewing log

Lecture 242 Scoping audit policies

Lecture 243 Section Overview

Lecture 244 Overview of service accounts

Lecture 245 Challenges of using service accounts

Lecture 246 Overview of managed service accounts

Lecture 247 What are group MSAs?

Lecture 248 Demonstration: Configuring group MSAs

Lecture 249 Lab: Securing AD DS Exercises and Tasks

Lecture 250 Lab: Securing AD DS. Solution. Part 1

Lecture 251 Lab: Securing AD DS. Solution. Part 2

Lecture 252 Lab Review

Lecture 253 Module Review and Takeaways

Lecture 254 Plan Your Progress

Lecture 255 Course Overview

Lecture 256 Section Overview: Deploying CAs

Lecture 257 What is AD CS?

Lecture 258 Options for implementing CA hierarchies

Lecture 259 Standalone vs. enterprise CAs

Lecture 260 Considerations for deploying a root CA

Lecture 261 Demonstration: Deploying an enterprise root CA

Lecture 262 Considerations for deploying a subordinate CA

Lecture 263 How to use the CAPolicy.inf file for installing a CA

Lecture 264 Section Overview: Administering CAs

Lecture 265 Managing CAs

Lecture 266 Configuring CA security

Lecture 267 Security roles for CA administration

Lecture 268 Configuring CA policy and exit modules

Lecture 269 Configuring CDPs and AIA locations

Lecture 270 Demonstration: Configuring CA properties

Lecture 271 Section Overview: Troubleshooting CAs

Lecture 272 Renewing a CA certificate

Lecture 273 Moving a root CA to another computer

Lecture 274 Monitoring CA operations

Lecture 275 Lab Task: Deploying and managing AD CS

Lecture 276 Lab Demonstration Steps: Deploying and managing AD CS

Lecture 277 Course Overview

Lecture 278 Course Overview

Lecture 279 Section Overview

Lecture 280 What are certificates and certificate templates

Lecture 281 Certificate template versions in Windows Server

Lecture 282 Configuring certificate template permissions

Lecture 283 Configuring certificate template settings

Lecture 284 Options for updating a certificate template

Lecture 285 Demonstration: Modifying and enabling a certificate template

Lecture 286 Assess Your Knowledge. Section Overview: Managing certificate

Lecture 287 Certificate enrollment methods

Lecture 288 Overview of certificate autoenrollment

Lecture 289 What is an enrollment agent?

Lecture 290 How does certificate revocation work?

Lecture 291 Overview of key archival and recovery

Lecture 292 Demonstration: Configuring a CA for key archival

Lecture 293 Using certificates for SSL

Lecture 294 Using certificates for digital signatures

Lecture 295 Using certificates for content encryption

Lecture 296 Demonstration: Signing a document digitally. Encrypting a file

Lecture 297 Lab: Deploying and using certificates

Lecture 298 Lab Demonstration Steps: Deploying and using certificates

Lecture 299 Module Review and Takeaways

Lecture 300 Building a PKI Lab Environment with Hyper-V and Base Image

Lecture 301 Configuring Offline Root Certification Authority

Lecture 302 Configuring Root CA Settings

Lecture 303 Installing IIS Web Server and Importing Root CA Certificate

Lecture 304 Configuring IIS Virtual Directory and Settings for PKI

Lecture 305 Setting Up an Enterprise Subordinate Certification Authority

Lecture 306 Configuring CRL and AIA Distribution Points on Subordinate CA

Lecture 307 Building a PKI infrastructure lab on Windows Server Core VMs

Lecture 308 Building a PKI infrastructure lab on Windows Server Core VMs.

Lecture 309 Building a PKI infrastructure lab on Windows Server Core VMs.

Lecture 310 Managing disks in Windows Server

Lecture 311 Selecting a disk type

Lecture 312 Selecting a file system

Lecture 313 Implementing ReFS

Lecture 314 Implementing ReFS with Powershell

Lecture 315 Using .vhd and .vhdx file types

Lecture 316 Using .vhd and .vhdx file types

Lecture 317 Working with Dynamic Volumes

Lecture 318 Working with Diskpart

Lecture 319 Lab Assignment: Configuring Local Storage

Lecture 320 Lab Solution: Configuring Local Storage

Lecture 321 Selecting a disk type

Lecture 322 What is RAID?

Lecture 323 RAID levels

Lecture 324 What is DAS?

Lecture 325 What is NAS?

Lecture 326 What is a SAN?

Lecture 327 Comparison and scenarios for usage

Lecture 328 Block-level storage vs. file-level storage

Lecture 329 What is Fibre Channel?

Lecture 330 Considerations for implementing Fibre Channel

Lecture 331 What is iSCSI?

Lecture 332 iSCSI components

Lecture 333 Core storage components

Lecture 334 Demo: Configuring an iSCSI target

Lecture 335 What is iSNS?

Lecture 336 What is DCB?

Lecture 337 What is MPIO?

Lecture 338 Demo: Configuring MPIO

Lecture 339 What is SMB?

Lecture 340 Configuring SMB shares

Lecture 341 Demo: Configuring SMB shares by using Server Manager and

Lecture 342 What is NFS?

Lecture 343 Configuring NFS shares

Lecture 344 Demo: Configuring an NFS share by using Server Manager

Lecture 345 Lab Assignment: Implementing enterprise storage solutions

Lecture 346 Lab Solution: Implementing enterprise storage solutions

Lecture 347 Enterprise storage needs

Lecture 348 What are Storage Spaces?

Lecture 349 Components and features of Storage Spaces

Lecture 350 Demonstration: Configuring Storage Spaces

Lecture 351 Changes to file and storage services in Windows Server

Lecture 352 Storage Spaces usage scenarios

Lecture 353 Discussion: Comparing Storage Spaces to other storage sol

Lecture 354 Managing Storage Spaces

Lecture 355 Managing disk failure with Storage Spaces

Lecture 356 Storage pool expansion

Lecture 357 Demonstration: Managing Storage Spaces by using Windows P

Lecture 358 Event logs and performance counters

Lecture 359 Event logs and performance counters. Part 2

Lecture 360 Performance counters

Lecture 361 Lab A Tasks: Implementing Storage Spaces. Execrcise 1

Lecture 362 Lab A Tasks: Implementing Storage Spaces. Execrcise 2

Lecture 363 Lab A Solution: Implementing Storage Spaces. Execrcise 1

Lecture 364 Lab A Solution: Implementing Storage Spaces. Execrcise 2

Lecture 365 What is Data Deduplication?

Lecture 366 Data Deduplication components

Lecture 367 Deploying Data Deduplication

Lecture 368 Usage scenarios for Data Deduplication

Lecture 369 Monitoring and maintaining Data Deduplication

Lecture 370 Backup and restore considerations with Data Deduplication

Lecture 371 Lab B Tasks: Implementing Data Deduplication

Lecture 372 Lab B Tasks: Implementing Data Deduplication

Lecture 373 Lab B Solution: Implementing Data Deduplication

Lecture 374 Module Introduction

Lecture 375 New Hyper-V host features in Windows Server

Lecture 376 New Hyper-V virtual machine features

Lecture 377 Lesson 3: Configuring storage on Hyper-V host servers

Lecture 378 Considerations for virtual hard disk formats and types

Lecture 379 Demo: Managing storage in Hyper-V

Lecture 380 Lesson 4: Types of Hyper-V networks

Lecture 381 Best Practices for configuring Hyper-V virtual networks

Lecture 382 New Hyper-V networking features in Windows Server

Lecture 383 Demo: Configuring Hyper-V networks

Lecture 384 Lesson 5: Configuring Hyper-V virtual machines

Lecture 385 Virtual machine generation versions

Lecture 386 Virtual machine settings

Lecture 387 VMs features and best practice

Lecture 388 Demo: Virtual machine configuration versions

Lecture 389 Demo: Creating a virtual machine

Lecture 390 Demo: Creating a virtual machine with Powershell

Lecture 391 Lesson 6: Managing virtual machines

Lecture 392 Managing checkpoints

Lecture 393 Demo: Creating checkpoints

Lecture 394 Importing and exporting virtual machines

Lecture 395 Demo: Live migration of a virtual machine

Lecture 396 What is Docker?

Lecture 397 Demo: Installing Docker

Lecture 398 Module Overview

Lecture 399 What is high availability?

Lecture 400 What is continuous and availability?

Lecture 401 Creating a disaster recovery plan

Lecture 402 Highly available networking and storage

Lecture 403 Lesson 2: Planning high availability and disaster recover

Lecture 404 High availability considerations with Hyper-V virtual mac

Lecture 405 Overview of Live Migration

Lecture 406 Providing high availability with storage migration

Lecture 407 Demo: Configuring live migration

Lecture 408 Overview of Hyper-V Replica

Lecture 409 Demo: Configuring storage migration. Implementing Hyper-V

Lecture 410 Lesson 3: Backing up and restoring by using Windows Serve

Lecture 411 Lesson 4: High Availability with failover clustering in W

Lecture 412 What is failover clustering?

Lecture 413 Course Introduction

Lecture 414 Key Considerations for Designing a Highly Available Failo

Lecture 415 Identifying and Preparing Applications for Failover Clust

Lecture 416 Storage Options and Requirements for Failover Clusters

Lecture 417 Hardware and Network Requirements for Failover Clustering

Lecture 418 Configuring Software, Security, and Migration for Failove

Lecture 419 Cluster Configuration: Properties, Nodes, and Failover/Fa

Lecture 420 Quorum Modes and Configuration in Failover Clustering

Lecture 421 Deploying and Configuring Failover Clusters

Lecture 422 Demo: Creating a failover cluster

Lecture 423 Configuring Storage and Networking for Failover Clusters

Lecture 424 Setting Up and Administering Failover Clustering Roles

Lecture 425 Demo: Creating a general file-server failover cluster

Lecture 426 Configuring Cluster Quorum Settings

Lecture 427 Demo: Configuring the quorum

Lecture 428 Monitoring, Backing Up, and Maintaining Failover Clusters

Lecture 429 Demo: Configure failover and failback settings

Lecture 430 Failover Cluster Maintenance - Backup, Recovery, and Trou

Lecture 431 Optimizing Network Thresholds and Monitoring for Cluster

Lecture 432 Zero Downtime OS Updates Using Cluster-Aware Updating

Lecture 433 Demo: Configuring CAU

Lecture 434 Identifying and Resolving Failover Cluster Communication

Lecture 435 Troubleshooting Cluster Availability Issues Related to CN

Lecture 436 Monitoring and Diagnostic Tools for Failover Cluster Mana

Lecture 437 Deploying Stretch Clusters for Site Resiliency

Lecture 438 Deploying Highly Available Stretched Clusters Across Loca

Lecture 439 Understanding Synchronous vs Asynchronous Replication for

Lecture 440 Using Storage Replica for Stretched Clusters and Replicat

Lecture 441 Witness Selection for Site-Aware Stretched Failover Clust

Lecture 442 Implementing Site-Aware Failover Clustering

Lecture 443 Failover and Failback Procedures for Stretched Clusters

Lecture 444 Course intro

Lecture 445 What is NLB?

Lecture 446 Deployment requirements for NLB

Lecture 447 Network considerations for NLB

Lecture 448 Configuration options for NLB

Lecture 449 Designing applications and storage support for NLB

Lecture 450 Considerations for deploying an NLB cluster on virtual ma

Lecture 451 Considerations for securing NLB

Lecture 452 Considerations for scaling and upgrading NLB

Lecture 453 Demo: Implementing NLB

Lecture 454 Introduction

Lecture 455 Hands-On Lab Overview

Lecture 456 Hands-On Lab Part 1

Lecture 457 Hands-On Lab Part 2

Lecture 458 Hands-On Lab Part 3

Lecture 459 Hands-On Lab Part 4

Section 7: Linux

Lecture 460 Changing the directories, inspecting the system, examinin

Lecture 461 Displaying and setting time and date. Part 1

Lecture 462 Displaying and setting time and date. Part 2

Lecture 463 Getting device information and using compression/archivin

Lecture 464 Getting help (continued)

Lecture 465 Path and file types

Lecture 466 Creating files or directories and listing files or direct

Lecture 467 Copying, moving, renaming, removing files and directories

Lecture 468 File and directory control attributes

Lecture 469 Finding files. Part 1

Lecture 470 Finding files. Part 2

Lecture 471 Finding files. Part 3

Lecture 472 Finding files. Part 4

Lecture 473 Hands-On Task Demo: Finding Large Files and Creating a Lo

Lecture 474 File permissions. Part 1

Lecture 475 File permissions. Part 2

Lecture 476 Permissions for group collaboration

Lecture 477 Hands-On Task Demo: Configuring Linux Permissions for a D

Lecture 478 Getting Started with Vim Basics

Lecture 479 Creating, opening and saving a file. Moving around VIM ed

Lecture 480 Getting help in VIM

Lecture 481 Creating the first file in vim

Lecture 482 Basic vim commands

Lecture 483 VIM motion commands and search

Lecture 484 Opening and saving files in VIM

Lecture 485 Opening multiple files and splitting windows

Lecture 486 Switching between windows

Lecture 487 Introduction to Basic Navigation in Vim

Lecture 488 Hands-on Practice: Vim Installation and Basic Navigation

Lecture 489 Fundamentals of Editing in Vim

Lecture 490 Basic Vim Navigation

Lecture 491 Advanced Vim Navigation

Lecture 492 Vim Search and Replace

Lecture 493 Vim Copy and Insert

Lecture 494 Vim Fundamentals: A Comprehensive Review of Core Concepts

Lecture 495 Overview of Exercise Lessons. What will we learn?

Lecture 496 Exercise 1: Editing in Vim

Lecture 497 Exercise 2: Editing in Vim

Lecture 498 Exercise 3: Editing in Vim

Lecture 499 Navigating and Editing Multiple Files in Vim

Lecture 500 Advanced Vim Techniques for Managing Multiple Files

Lecture 501 Searching the needed info with grep&wc

Lecture 502 Cat and output redirection

Lecture 503 Using pipes

Lecture 504 Processes revealed

Lecture 505 Processes and jobs

Lecture 506 Exploring all running processes with top command

Lecture 507 Understanding process states

Lecture 508 Changing process priority with nice

Lecture 509 Controlling processes with signals

Lecture 510 Changing password with passwd and working withPATH

Lecture 511 Special characters and command-line keystrokes

Lecture 512 Chaining operators

Lecture 513 Sed and awk

Lecture 514 Sed and awk. Part 2

Lecture 515 Performing exit, reboot or shutdown on the system

Lecture 516 Using BASH history

Lecture 517 Using aliases to create your own commands

Lecture 518 Watching files and how they're changing live with watch c

Lecture 519 Gaining administrative privileges with sudo command

Lecture 520 Understanding Job Scheduling with cron and at commnds

Lecture 521 Packages overview

Lecture 522 Managing packages with rpm command

Lecture 523 Installing and modifying packages with rpm command

Lecture 524 Viewing pgp keys and verifying package attributes

Lecture 525 YUM package manager. Part 1

Lecture 526 YUM package manager. Part 2

Lecture 527 YUM package manager. Part 3

Lecture 528 Configuring hostname

Lecture 529 IPv4 concepts and traceroute command usage

Lecture 530 Using 'ip' command

Lecture 531 Validating and Troubleshooting Network Configuration

Lecture 532 Practice Lab: Examining Network Configuration

Lecture 533 Configuring Networking with nmcli

Lecture 534 Validating Network Configuration (with Guided Exercise)(

Lecture 535 Editing Network Configuration Files (with Guided Exercise

Lecture 536 Lab: Managing Networking

Lecture 537 Installing RHEL9

Lecture 538 Registering RHEL9

Lecture 539 Users: Intro, id command, passwd file

Lecture 540 Users: Gaining Superuser Access. su and sudo commands

Lecture 541 Users: Configuring sudo

Lecture 542 Users: Guided Exercise Using sudo

Lecture 543 Users: Using useradd, userdel and usermod

Lecture 544 Users: Practice excersise with useradd, userdel and userm

Lecture 545 Groups: groupadd, groupdel and groupmod

Lecture 546 Groups: adding users to groups

Lecture 547 Users: working with passwords

Lecture 548 Users: Practice. Working with passwords

Lecture 549 Lab: Managing Users and Groups

Lecture 550 File permissions

Lecture 551 Changing Permissions for Files and Directories

Lecture 552 Changing Ownership for Files and Directories

Lecture 553 Guided Exercise: Managing File System Permissions from th

Lecture 554 Umask and Managing Default Permissions and File Access

Lecture 555 Guided Exercise: Umask and Managing Default Permissions

Lecture 556 Lab: Controlling Access to Files

Lecture 557 Listing Processes and Process States. PS command options

Lecture 558 Controlling Jobs

Lecture 559 Guided Exercise: Controlling Jobs

Lecture 560 Killing Processes

Lecture 561 Monitoring process activity

Lecture 562 Lab: Monitoring and Managing Processes

Lecture 563 Controlling Services and Daemons

Lecture 564 Controlling Services and Daemons: Guided Exercises

Lecture 565 Accessing Comand Line with SSH

Lecture 566 Configuring SSH key-based authentication

Lecture 567 Configuring and securing SSH

Lecture 568 Describing System Log Architechture

Lecture 569 Reviewing Syslog Files

Lecture 570 Reviewing System Journal Entries

Lecture 571 Preserving the System Journal

Lecture 572 Maintaining Accurate Time

Lecture 573 Lab: Analyzing and Storing Logs

Lecture 574 Archiving and Compressing Files

Lecture 575 Transferring Files Between Systems Securely

Lecture 576 Using 'at' Package

Lecture 577 Scheduling Recurring Tasks with 'crontab'

Lecture 578 Scheduling Recurring System Jobs

Lecture 579 Guided Exercise: Scheduling Recurring System Jobs

Lecture 580 Managing Temporary Files

Lecture 581 Guided Exercise: Managing Temporary Files

Lecture 582 Adjusting Tuning Profiles

Lecture 583 Adjusting Process Scheduling

Lecture 584 Guided Exercise: Changing Process Scheduling

Lecture 585 Interpreting File ACLs

Lecture 586 Securing Files with ACLs

Lecture 587 Guided Exercise: Securing Files with ACLs

Lecture 588 Adding Partitions, File Systems, and Persistent Mounts

Lecture 589 Guided Exercise: Adding Partitions, File Systems, and Per

Lecture 590 Managing Swap Space

Lecture 591 Lab: Managing Basic Storage

Lecture 592 Managing Logical Volumes

Lecture 593 Extending Logical Volumes

Lecture 594 Guided Exercise: Extending Logical Volumes

Lecture 595 Lab: Managing Logical Volumes

Lecture 596 Managing Layered Storage with Stratis

Lecture 597 Guided Exercise: Managing Layered Storage with Stratis

Lecture 598 Compresson and Deduplicating Storage with VDO

Lecture 599 Lab: Implementing Advanced Stirage Features

Lecture 600 Accessing Network-Attached Storage

Lecture 601 Guided Exercise: Accessing Network-Attached Storage

Lecture 602 Describing the Boot Process

Lecture 603 Guided Exercise: Selecting the Boot Target

Lecture 604 Guided Exercise:Resetting the Root Password. Using Debug

Lecture 605 Lab: Controlling the Boot Process

Lecture 606 Describing Networking Concepts

Lecture 607 IPv4 settings. Defining subnets

Lecture 608 IPv4 Guided Exercises. Public and Private Adresses

Lecture 609 Lab: Planning an IPv4 network

Lecture 610 Using OpenSSL on Red Hat Linux to Create, Operate, and Se

Lecture 611 Creating Certificate Authority (Self-Signed)

Lecture 612 Hands-On Lab on OpenSSL

Lecture 613 Administration and Monitoring with udevadm

Lecture 614 UDEV Configuration and Device Management

Lecture 615 Kernel Module Management: Using modprobe and rmmod

Lecture 616 Installation and Package Management Troubleshooting

Lecture 617 USB Device Detection and Management in Linux: Using lsusb

Lecture 618 Using dmesg for System Monitoring and Troubleshooting in

Lecture 619 Understanding Linux Run Levels: System Maintenance and Tr

Lecture 620 Questions 1 -2: Using 'udevadm' and '/proc'

Lecture 621 Questions 3 -4: udev Configuration Location. Loading kern

Lecture 622 Questions 5- 6. Querying udev database. Listing USB devic

Lecture 623 Question 7: Using dmesg to view kernel ring buffer

Lecture 624 Writing Simple Bash Scripts

Lecture 625 Guided Exercise: Writing Your First Script

Lecture 626 Using Loops

Lecture 627 Guided Exercise: Using Loops

Lecture 628 Describing a Simple Regular Expression

Lecture 629 Guided Exercise: Using grep with RegEx

Lecture 630 Using grep with RegEx

Lecture 631 Lab: Your First Script

Lecture 632 Building Scripts: Using Variables and Redirecting Input/O

Lecture 633 Building Scripts: the if-then statements

Lecture 634 Building Scripts: Trying the Test command. Using Comparis

Lecture 635 Building Scripts: Using File Comparison

Lecture 636 Compound Testing. Working wit Advanced If-Then Statements

Lecture 637 A Practical Example

Lecture 638 Looping with the 'for' statement

Lecture 639 Looping with the 'for' statement. Part 2

Lecture 640 Using 'while' and 'until' commands. Using Loops

Lecture 641 Using Loops. Part 2

Lecture 642 Practical Examples Using Loops

Lecture 643 Passing Parameters

Lecture 644 Using Special Parameter Variables

Lecture 645 Working with Options

Lecture 646 Using Read Command

Lecture 647 A Practical Example

Lecture 648 Understanding Input and Output

Lecture 649 Redirecting Output in Scripts

Lecture 650 Read/Write file descriptors

Lecture 651 Supressing Command Output. Using temp files. Logging Mess

Lecture 652 A practical example: using input and output

Lecture 653 Signaling the Bash shell

Lecture 654 Using traps

Lecture 655 Running scripts in background

Lecture 656 Running Scripts without a Hang-up

Lecture 657 Controlling the Job. Viewing Jobs

Lecture 658 Your First Bash Script. Part 1

Lecture 659 Your First Bash Script. Part 2

Lecture 660 Bash Syntax Fundamentals. Part 1

Lecture 661 Bash Syntax Fundamentals. Part 2

Lecture 662 Bash Syntax Fundamentals. Part 3

Lecture 663 Working with Files and Permissions. Part 1

Lecture 664 Working with Files and Permissions. Part 2

Lecture 665 Working with Files and Permissions. Part 3

Lecture 666 Script Example: File Operations and Bash Concepts

Lecture 667 'if' Statement. Part 1

Lecture 668 'if' Statement. Part 2

Lecture 669 Loops in Bash. Part 1

Lecture 670 Loops in Bash. Part 2

Lecture 671 Hands-on Lab: Interactive Menu Script. Part 1

Lecture 672 Hands-on Lab: Interactive Menu Script. Part 2

Lecture 673 Hands-on Lab: Linux Administration Interactive Menu Scrip

Lecture 674 Hands-on Lab: Linux Administration Interactive Menu Scrip

Lecture 675 Functions in Bash. Part 1

Lecture 676 Functions in Bash. Part 2

Lecture 677 Error Handling and Debugging in Bash. Part 1

Lecture 678 Error Handling and Debugging in Bash. Part 2

Lecture 679 Error Handling and Debugging in Bash. Part 3

Lecture 680 Advanced Bash Scripting Techniques - Examples Explained.

Lecture 681 Advanced Bash Scripting Techniques - Examples Explained.

Lecture 682 Advanced Bash Scripting Techniques - Examples Explained.

Lecture 683 Advanced Bash Scripting Techniques - Practical Example Wa

Lecture 684 Bash Script Optimization and Performance. Part 1

Lecture 685 Bash Script Optimization and Performance. Part 2

Lecture 686 Bash Script Optimization and Performance. Part 3

Lecture 687 Bash Script Optimization and Performance. Part 4

Lecture 688 Bash Script Optimization and Performance. Practical Examp

Lecture 689 Intro to Vagrant

Lecture 690 Getting Installed

Lecture 691 Using Vagrant

Lecture 692 Using Vagrant. Part 2

Lecture 693 Using Vagrant. Part 3

Lecture 694 Using Vagrant. Part 4

Lecture 695 Using Vagrant. Part 5

Lecture 696 Using Vagrant. Part 6

Lecture 697 Using Vagrant. Part 7

Lecture 698 Using Vagrant. Part 8

Lecture 699 Creating VM in RHEL cockpit

Lecture 700 Configuring VMs

Lecture 701 Configuring the prerequisites on managed hosts

Lecture 702 Setting up SSH Key-based Authentication

Lecture 703 What is an Ansible Inventory?

Lecture 704 Building an Ansible Inventory

Lecture 705 Using Ansible Ad-Hoc Commands

Lecture 706 Ansible Ad-Hoc Commands: A Practical Demonstration

Lecture 707 Guided Exercise: Ansible Ad-Hoc Commands in Practice

Lecture 708 Intro to Ansible

Lecture 709 Getting Installed

Lecture 710 Configuring SSH

Lecture 711 Getting inventory

Lecture 712 Using modules

Lecture 713 Starting with Playbooks

Lecture 714 Starting with Playbooks. Part 2

Lecture 715 Starting with Playbooks. Part 3

Lecture 716 Starting with Playbooks. Part 4

Lecture 717 Building Ansible Lab Environment

Lecture 718 Describing Ansible Inventory Files

Lecture 719 Guided Exercise: Ansible Inventory Files

Lecture 720 Managing Ansible Configuaration Files

Lecture 721 Managing Connectivity and Configuaration Files

Lecture 722 Guided Exercise: Managing Ansible Configuaration Files

Lecture 723 Running Ad Hoc Commands

Lecture 724 Guided Exercise: Running Ad Hoc Commands

Lecture 725 Lab: Deploying Ansible

Lecture 726 Implementing Playbooks

Lecture 727 Guided Exercise: Implementing Playbooks

Lecture 728 Multiple Plays

Lecture 729 Guided Exercise: Multiple Plays

Lecture 730 Lab: Implementing Playbooks

Lecture 731 Managing Variables

Lecture 732 Guided Exercise: Managing Variables

Lecture 733 Managing Secrets

Lecture 734 Guided Exercise: Managing Secrets

Lecture 735 Managing Facts

Lecture 736 Guided Exercise: Managing Facts

Lecture 737 Lab: Managing Variables and Facts

Lecture 738 Writing Loops and Conditional Tasks

Lecture 739 Guided Exercise: Writing Loops and Conditional Tasks

Lecture 740 Implementing Handlers

Lecture 741 Handling Task Failure

Lecture 742 Guided Exercise: Handling Task Failure

Lecture 743 Guided Lab:Implementing Task Control

Lecture 744 Intro

Lecture 745 Getting Installed

Lecture 746 Configuring Git

Lecture 747 Your First Commit

Lecture 748 Using Push

Lecture 749 Clone and Pull

Lecture 750 Use Ignore

Lecture 751 History

Lecture 752 Use Branches

Section 8: Powershell

Lecture 753 Course overview

Lecture 754 Overview of Part 1

Lecture 755 Powershell Overview

Lecture 756 Powershell Versions

Lecture 757 Get to know Two Host Applications

Lecture 758 What Version are You Using

Lecture 759 Always Run the Shell as Administrator

Lecture 760 Tips and Tricks

Lecture 761 Configuring the Console

Lecture 762 Configuring the Console (demo)

Lecture 763 Configuring the ISE

Lecture 764 Configuring the ISE (demo)

Lecture 765 LAB 1 Exercise 1

Lecture 766 LAB 1 Exercise 1 Answer Video

Lecture 767 LAB 1 Exercise 2

Lecture 768 LAB 1 Exercise 2 Answer Video

Lecture 769 LAB Review

Lecture 770 Part 2 Overview

Lecture 771 Commands that Seem Familiar

Lecture 772 Learning Commands Syntax

Lecture 773 Viewing Help (demo)

Lecture 774 Finding Commands

Lecture 775 Finding Commands (demo)

Lecture 776 Interpreting Help

Lecture 777 Updating Help

Lecture 778 Updating and saving help files

Lecture 779 Demo: Updating and saving help files

Lecture 780 About Files

Lecture 781 About Files (demo)

Lecture 782 Part 3 Overview

Lecture 783 Full Command Syntax

Lecture 784 Specifying Multiple Parameter Value

Lecture 785 Shortened Command Syntax

Lecture 786 Show-Command Command

Lecture 787 Commands that Modify the System

Lecture 788 Show-Command (demo)

Lecture 789 Commands that Modify the System (demo)

Lecture 790 Lab B: Finding and Running Basic Commands Tasks

Lecture 791 Lab B Solution: Finding and Running Basic Commands

Lecture 792 Module Review and Takeaways

Lecture 793 Course overview

Lecture 794 Part 1 Overview

Lecture 795 Understanding the Pipeline. Part 1. Lesson 1

Lecture 796 Understanding the Pipeline. Part 1. Lesson 2

Lecture 797 Understanding the Pipeline. Part 1. Lesson 3

Lecture 798 Understanding the Pipeline. Part 1. Lesson 4

Lecture 799 Understanding the Pipeline. Part 1. Lesson 5

Lecture 800 Understanding the Pipeline. Part 1. Lesson 6

T professionals and aspiring system administrators looking to advance their careers by mastering both Windows Server and Linux administration skills.,Recent IT graduates or career changers aiming to build a strong foundation in enterprise-level server administration across multiple operating systems.,Experienced Windows administrators looking to add Linux skills to their repertoire, or Linux admins wanting to become proficient in Windows Server environments.,Network administrators seeking to expand their expertise to include cross-platform server management and automation techniques.

Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

_master_windows_linux_ultimate_admin_bootcamp_2024.jpg


Download from RapidGator
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

Premium Links
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

Download from Keep2Share
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!

Download from UploadGig
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten