Course Introduction
- 11m 23s
—Course Overview
2m 53s
—Lab Setup
1m 9s
—Unboxing the Course Contents
7m 20s
Introducing MySQL and MariaDB
- 45m 36s
—Meet MySQL and MariaDB
5m 39s
—Installing MySQL 5.5
5m 54s
—Creating Databases and Tables
4m 16s
—Demo: Creating the Staff Database and Department Table
5m 25s
—Inserting Data and Using Select
3m 25s
—Understanding Foreign Keys and Joins
7m 47s
—Demo: Foreign and Joins
4m 30s
—Summarizing Information With Order By and Group By
7m 7s
—Summary
1m 30s
Configuring NTP
- 39m 21s
—The Linux NTP Service
5m 5s
—Using sed to Clean Configuration Files
3m 57s
—NTP Configuration Directives
2m 28s
—Implementing Configuration Changes
7m 10s
—Understanding System and Hardware time
2m 49s
—Using Date and hwclock
3m 33s
—Introducing The NTP Tools
3m 30s
—Using NTP Tools to Manage and Monitor the Time Server
5m 25s
—Configuring NTP on CentOS 7
4m 40s
—Summary
0m 41s
Managing System Log Daemons
- 43m 1s
—Introduction to System logging
5m 9s
—Updating to Rsyslog 8.4
5m 5s
—Understanding the Ryslog.conf
4m 50s
—Configuring Rsyslog
7m 56s
—Ensuring Log Files Are Rotated
2m 31s
—Demonstration Using Logrotate
6m 28s
—Understanding Journalctl
3m 54s
—Using Journalctl: Demo
6m 23s
—Summary
0m 40s
Remote Access Using SSH
- 45m 42s
—The OpenSSH Suite
6m 13s
—Configuring an OpenSSH Server
5m 50s
—Demo: Server Configuration
4m 56s
—Configuring the OpenSSH Client
2m 28s
—Server Authentication Using StrictHostKeyCehecking
5m 10s
—Public Key Authentication
6m 48s
—Using PuTTY and Public Keys
5m 5s
—Tunneling With SSH
3m 0s
—Creating an SSH Tunnel
4m 58s
—Summary
1m 10s
Email MTA Basics
- 37m 27s
—Understanding MTAs in Linux
4m 13s
—Configuring the Postfix MTA
7m 30s
—Configuring the Sendmail Server
7m 10s
—Using the Exim MTA on Raspberry Pi
7m 19s
—Understanding Mail Tools
2m 19s
—Using Mail Tools
5m 13s
—What We Covered
3m 40s
Managing Printing in Linux
- 38m 37s
—Welcome to Linux Printing
6m 43s
—Global GUI Management With the Web Interface
8m 15s
—Adding Printers Using the Web Interface
3m 22s
—Understanding Client Printing Tools
3m 8s
—Using Client Printing Tools and Understanding Job History
9m 40s
—Creating Printers at the Command Line
5m 54s
—Summary
1m 32s
Configuring Network Protocols in Linux
- 46m 44s
—Introducing Network Addressing in Linux
4m 1s
—Understanding /etc/services Files by Using strace
4m 17s
—IPv4, IPv6, and Vanity IPv6 Addressing
3m 52s
—Using dig to Expose Vanity IPv6 Addresses
9m 40s
—Interface Configuration Files
7m 23s
—Persisting Address Changes
8m 46s
—Understanding Protocol Stacks
8m 41s
Networking Tools
- 42m 9s
—Unpacking the Armory of Networking Tools
2m 9s
—Using Nmap to Display Open Ports
6m 33s
—Netstat Unleashed
5m 25s
—May We Introduce Show Sockets
4m 41s
—Using Lsof to List Open Ports
4m 9s
—Testing Network Connectivity
5m 11s
—Name Resolution Tools on Hand
6m 27s
—Managing Interfaces and Wrap Up
7m 29s
Securing Access to Your Server
- 50m 7s
—Your Introduction to Securing the Linux Server
3m 41s
—Monitoring and Restricting Access to Server Resources
5m 42s
—Implementing ulimit Restrictions
6m 41s
—Creating and Protecting Against Fork Bombs
5m 19s
—Understanding the xinetd Super Daemon
3m 24s
—Implementing TFTP Using the xinetd Service
5m 5s
—Controlling Network Access Using TCP Wrappers
8m 1s
—Delegating Rights Using /etc/sudoers
8m 54s
—Module Wrap Up
3m 16s
—Introduction to the Encryption Technologies in Linux
2m 41s
—Using GPG to Encrypt Data Exchanged Between Users
11m 21s
—Understanding LUKS Full Disk Encryption
2m 9s
—Implementing LUKS
5m 43s
—Using EFS to Allow Secure Data Areas
7m 29s
—Summary
2m 8s