i
Installation in Standalone Machine
Installation through NFS
Installation Through FTP
Installation Through HTTP
Installation Through KICKSTART
Creation Of File Systems
Understanding EXT2, EXT3 & EXT4 File Systems
Converting Ext2 to Ext3 File Systems
Reverting back from Ext3 to Ext2 File systems
Understanding fdisk, e2label, mount, umount commands
Understanding fstab and mtab Hles
File System Management Troubleshooting
Understanding different types of groups and creation of groups
Creation of users in different groups
Understanding Passwd, Shadow Files
Understanding Passwd Aging
Creation of Quotas for Users, Groups and File Systems
Understanding Users Security Files
The different commands for Monitoring the Users
User Management Troubleshooting
Understanding the different types of run-levels
Understanding different types of shutdown commands
Understanding run control scripts
Understanding NFS server and NFS clients
Understanding daemons and Files in NFS of boot phases
Configuring NFS server and different NFS clients
Configuration of autofs, NFS security
Understanding the features and advantages of FTP Server
Configuring FTP server and FTP clients
Configuring FTP server for anonymous and real Users with download and upload permissions
Configuring FTP User access, FTP security
Understanding FTP Basic Commands
Configuring of Anonymous FTP Server
Understanding XINETD based and non XINETD based services
Configuring XINETD based services
XINETD security
Understanding DNS Service and different types of DNS Servers
Configuring DNS (Master) DNS (Slave)
Understanding & Configuring forward (DNS) and cache (DNS) of boot phases
Understanding different types of files when the system is booting
DNS Troubleshooting
Creation of file systems and converting into LVM
Creation of Physical Partitions
Creation of Volume Groups
Creation of Logical Partitions
Extending the Volume Group
Extending the Logical Partitions
Understanding the features and advantages of RPM
Installation of RPM Packages
Up-gradation of RPM
Verification of RPM
Querying
RPM Troubleshooting
Understanding different types of File System Backup
Understanding different types of Files Backups
Understanding different types of Dump Levels
Understanding Monthly, Weekly, Daily Backups
Different types of Backup strategies
Understanding NIS and daemons at NIS (Server, Slave and Clients)
Configuring NIS (Master), NIS (Slave) and NIS clients
Integrating NIS ( Master and Slave) with NFS Server
Understanding of APACHE
Configuring APACHE Web Server with virtual hosting
Configuring APACHE Web Server with IP BASED, HOST BASED and PORT BASED
Understanding the features and advantages of Samba Server
Configuring SAMBA for heterogeneous environment
Sharing the resources between Unix to Unix using SAMBA
Sharing the resources between Windows to Unix (vice-versa)
SAMBA security
Users monitoring & logging
Log login attempts try
To log - login or tried attempts, that create the file /var/log/wtmp.
To log - bad login input or attempts, create the file /var/log/btmp.
To view or monitor all related authentication information – The file location would be at the /var/log/auth.log file ( need to install logwatch this might be a good choice or idea to simplify your log monitoring).
Prevent against brute force attacks
Limit the maximum fail login attempts using faillog. If the limit the maximum failed login attempts to 5 : faillog -m 5 -u "$USER"
There are numerous more ways to succeed account security on a Linux box. These few points might, however, be very helpful to a Linux admin beginner.
Don't miss out!