Enterprise Linux Network Services Training in Fort Collins

Enroll in or hire us to teach our Enterprise Linux Network Services class in Fort Collins, Colorado by calling us @303.377.6176. Like all HSG classes, Enterprise Linux Network Services may be offered either onsite or via instructor led virtual training. Consider looking at our public training schedule to see if it is scheduled: Public Training Classes
Provided there are enough attendees, Enterprise Linux Network Services may be taught at one of our local training facilities.
We offer private customized training for groups of 3 or more attendees.

Course Description

 
This 5 day expansive course covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement these services securely, and to the trouble - shooting skills which will be necessary for real - world administration of these network services. The course material is designed to provide extensive hands - on experience. Topics include: Security with SELinux and Netfilter, DNS concepts and implementation with Bind; LDAP concepts and implementation usin g OpenLDAP; Web services with Apache; FTP with vsftpd; caching, filtering proxies with Squid; SMB/CIFS (Windows networking) with Samba; and e - mail concepts and implementation with Postfix combined with either Dovecot or Cyrus.
Course Length: 5 Days
Course Tuition: $2090 (US)

Prerequisites

Students should already be comf ortable with basic Linux or U NIX administration, and have a good understanding of network concepts, the TCP/IP protoc ol suite is also assumed.

Course Outline

 
  1. SECURING SERVICES
    1. Xinetd
    2. Xinetd Connection Limiting and Access Control
    3. Xinetd: Resource limits, redirection, logging
    4. TCP Wrappers
    5. The /etc/hosts.allow & /etc/hosts.deny Files
    6. /etc/hosts.{allow,deny} Shortcuts
    7. Advanced TCP Wrappers
    8. SUSE Basic Firewall Configuration
    9. FirewallD
    10. Netfilter: Stateful Packet Filter Firewall
    11. Netfilter Concepts
    12. Using the iptables Command
    13. Netfilter Rule Syntax
    14. Targets
    15. Common match_specs
    16. Extended Packet Matching Modules
    17. Connection Tracking
    LAB TASKS
    1. Securing xinetd Services
    2. Enforcing Security Policy with xinetd
    3. Securing Services with TCP Wrappers
    4. Securing Services with SuSEfirewall2
    5. Securing Services with Netfilter
    6. FirewallD
    7. Troubleshooting Practice
  2. SELINUX AND LSM
    1. AppArmor
    2. SELinux Security Framework
    3. Choosing an SELinux Policy
    4. SELinux Commands
    5. SELinux Booleans
    6. SELinux Policy Tools
    LAB TASKS
    1. Exploring AppArmor Modes
    2. SELinux File Contexts
  3. DNS CONCEPTS
    1. Naming Services
    2. DNS – A Better Way
    3. The Domain Name Space
    4. Delegation and Zones
    5. Server Roles
    6. Resolving Names
    7. Resolving IP Addresses
    8. Basic BIND Administration
    9. Configuring the Resolver
    10. Testing Resolution
    LAB TASKS
    1. Configuring a Slave Name Server
  4. CONFIGURING BIND
    1. BIND Configuration Files
    2. named.conf Syntax
    3. named.conf Options Block
    4. Creating a Site-Wide Cache
    5. rndc Key Configuration
    6. Zones In named.conf
    7. Zone Database File Syntax
    8. SOA – Start of Authority
    9. A, AAAA, & PTR – Address & Pointer Records
    10. NS – Name Server
    11. TXT, CNAME, & MX – Text, Alias, & Mail Host
    12. SRV – SRV Service Records
    13. Abbreviations and Gotchas
    14. $GENERATE, $ORIGIN, and $INCLUDE
    LAB TASKS
    1. Use rndc to Control named
    2. Configuring BIND Zone Files
  5. CREATING DNS HIERARCHIES
    1. Subdomains and Delegation
    2. Subdomains
    3. Delegating Zones
    4. in-addr.arpa. Delegation
    5. Issues with in-addr.arpa.
    6. RFC2317 & in-addr.arpa.
    LAB TASKS
    1. Create a Subdomain in an Existing Domain
    2. Subdomain Delegation
  6. ADVANCED BIND DNS FEATURES
    1. Address Match Lists & ACLs
    2. Split Namespace with Views
    3. Restricting Queries
    4. Restricting Zone Transfers
    5. Running BIND in a chroot
    6. Dynamic DNS Concepts
    7. Allowing Dynamic DNS Updates
    8. DDNS Administration with nsupdate
    9. Common Problems
    10. Common Problems
    11. Securing DNS With TSIG
    LAB TASKS
    1. Configuring Dynamic DNS
    2. Securing BIND DNS
  7. USING APACHE
    1. HTTP Operation
    2. Apache Architecture
    3. Dynamic Shared Objects
    4. Adding Modules to Apache
    5. Apache Configuration Files
    6. httpd.conf – Server Settings
    7. httpd.conf – Main Configuration
    8. HTTP Virtual Servers
    9. Virtual Hosting DNS Implications
    10. httpd.conf – VirtualHost Configuration
    11. Port and IP based Virtual Hosts
    12. Name-based Virtual Host
    13. Apache Logging
    14. Log Analysis
    15. The Webalizer
    LAB TASKS
    1. Apache Architecture
    2. Apache Content
    3. Configuring Virtual Hosts
  8. APACHE SECURITY
    1. Virtual Hosting Security Implications
    2. Delegating Administration
    3. Directory Protection
    4. Directory Protection with AllowOverride
    5. Common Uses for .htaccess
    6. Symmetric Encryption Algorithms
    7. Asymmetric Encryption Algorithms
    8. Digital Certificates
    9. TLS Using mod_ssl.so
    LAB TASKS
    1. Using .htaccess Files
    2. Using TLS Certificates with Apache
    3. Use SNI and TLS with Virtual Hosts
  9. APACHE SERVER-SIDE SCRIPTING ADMINISTRATION
    1. Dynamic HTTP Content
    2. PHP: Hypertext Preprocessor
    3. Developer Tools for PHP
    4. Installing PHP
    5. Configuring PHP
    6. Securing PHP
    7. Security Related php.ini Configuration
    8. Java Servlets and JSP
    9. Apache's Tomcat
    10. Installing Java SDK
    11. Installing Tomcat Manually
    12. Using Tomcat with Apache
    LAB TASKS
    1. CGI Scripts in Apache
    2. Apache's Tomcat
    3. Using Tomcat with Apache
    4. Installing Applications with Apache and Tomcat
  10. IMPLEMENTING AN FTP SERVER
    1. The FTP Protocol
    2. Active Mode FTP
    3. Passive Mode FTP
    4. ProFTPD
    5. Pure-FTPd
    6. vsftpd
    7. Configuring vsftpd
    8. Anonymous FTP with vsftpd
    LAB TASKS
    1. Configuring vsftpd
  11. THE SQUID PROXY SERVER
    1. Squid Overview
    2. Squid File Layout
    3. Squid Access Control Lists
    4. Applying Squid ACLs
    5. Tuning Squid & Configuring Cache Hierarchies
    6. Bandwidth Metering
    7. Monitoring Squid
    8. Proxy Client Configuration
    LAB TASKS
    1. Installing and Configuring Squid
    2. Squid Cache Manager CGI
    3. Proxy Auto Configuration
    4. Configure a Squid Proxy Cluster
  12. SQL FUNDAMENTALS AND MARIADB
    1. Popular SQL Databases
    2. SELECT Statements
    3. INSERT Statements
    4. UPDATE Statements
    5. DELETE Statements
    6. JOIN Clauses
    7. MariaDB
    8. MariaDB Installation and Security
    9. MariaDB User Account Management
    10. MariaDB Replication
    LAB TASKS
    1. SQL with Sqlite3
    2. Installing and Securing MariaDB
    3. Creating a Database in MariaDB
    4. Create a Database Backed Application
  13. LDAP CONCEPTS AND CLIENTS
    1. LDAP: History and Uses
    2. LDAP: Data Model Basics
    3. LDAP: Protocol Basics
    4. LDAP: Applications
    5. LDAP: Search Filters
    6. LDIF: LDAP Data Interchange Format
    7. OpenLDAP Client Tools
    8. Alternative LDAP Tools
    LAB TASKS
    1. Querying LDAP
  14. OPENLDAP SERVERS
    1. Popular LDAP Server Implementations
    2. OpenLDAP: Server Architecture
    3. OpenLDAP: Backends
    4. OpenLDAP: Replication
    5. Managing slapd
    6. OpenLDAP: Configuration Options
    7. OpenLDAP: Configuration Sections
    8. OpenLDAP: Global Parameters
    9. OpenLDAP: Database Parameters
    10. OpenLDAP Server Tools
    11. Native LDAP Authentication and Migration
    12. Enabling LDAP-based Login
    13. System Security Services Daemon (SSSD)
    LAB TASKS
    1. Building An OpenLDAP Server
    2. Enabling TLS For An OpenLDAP Server
    3. Enabling LDAP-based Logins
  15. SAMBA CONCEPTS AND CONFIGURATION
    1. Introducing Samba
    2. NetBIOS and NetBEUI
    3. Samba Daemons
    4. Accessing Windows/Samba Shares from Linux
    5. Samba Utilities
    6. Samba Configuration Files
    7. The smb.conf File
    8. Mapping Permissions and ACLs
    9. Mapping Linux Concepts
    10. Mapping Users
    11. Sharing Home Directories
    12. Sharing Printers
    13. Share Authentication
    14. Share-Level Access
    15. User-Level Access
    16. Samba Account Database
    17. User Share Restrictions
    LAB TASKS
    1. Samba Share-Level Access
    2. Samba User-Level Access
    3. Samba Group Shares
    4. Handling Symbolic Links with Samba
    5. Samba Home Directory Shares
  16. SMTP THEORY
    1. SMTP
    2. SMTP Terminology
    3. SMTP Architecture
    4. SMTP Commands
    5. SMTP Extensions
    6. SMTP AUTH
    7. SMTP STARTTLS
    8. SMTP Session
  17. POSTFIX
    1. Postfix Features
    2. Postfix Architecture
    3. Postfix Components
    4. Postfix Configuration
    5. master.cf
    6. main.cf
    7. Postfix Map Types
    8. Postfix Pattern Matching
    9. Advanced Postfix Options
    10. Virtual Domains
    11. Postfix Mail Filtering
    12. Configuration Commands
    13. Management Commands
    14. Postfix Logging
    15. Logfile Analysis
    16. Postfix, Relaying and SMTP AUTH
    17. SMTP AUTH Server and Relay Control
    18. SMTP AUTH Clients
    19. Postfix / TLS
    20. TLS Server Configuration
    21. Postfix Client Configuration for TLS
    22. Other TLS Clients
    23. Ensuring TLS Security
    LAB TASKS
    1. Configuring Postfix
    2. Postfix Virtual Host Configuration
    3. Postfix Network Configuration
    4. Postfix SMTP AUTH Configuration
    5. Postfix STARTTLS Configuration
    6. SUSE Postfix Configuration Cleanup
  18. MAIL SERVICES AND RETRIEVAL
    1. Filtering Email
    2. Procmail
    3. SpamAssassin
    4. Bogofilter
    5. amavisd-new Mail Filtering
    6. Accessing Email
    7. The IMAP4 Protocol
    8. Dovecot POP3/IMAP Server
    9. Cyrus IMAP/POP3 Server
    10. Cyrus IMAP MTA Integration
    11. Cyrus Mailbox Administration
    12. Fetchmail
    13. Roundcube Webmail
    14. Mailing Lists
    15. GNU Mailman
    16. Mailman Configuration
    LAB TASKS
    1. Configuring Procmail & SpamAssassin
    2. Configuring Cyrus IMAP
    3. Dovecot TLS Configuration
    4. Configuring Roundcube
    5. Base Mailman Configuration
    6. Basic Mailing List
    7. Private Mailing List
  1. NIS
    1. NIS Overview
    2. NIS Limitations and Advantages
    3. NIS Client Configuration
    4. NIS Server Configuration
    5. NIS Troubleshooting Aids
    LAB TASKS
    1. Using NIS for Centralized User Accounts
    2. Configuring NIS
    3. NIS Slave Server
    4. NIS Failover
    5. Troubleshooting Practice: NIS

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Linux Unix Uses & Stats

Linux Unix is Used For:
Desktop Mainframe Computers Mobile Devices Embedded Devices
Difficulty
Popularity
Year Created
1991/1971
Pros
Performance:
Linux supports many efficient tools and operates them seamlessly. Because it's architecture is lightweight it runs faster than both Windows 8.1 and 10. 
 
Security:
Because Linux is an open-source software,  anyone can contribute code to help enhance the users’ experience i.e., adding features, fixing bugs, reducing security risks, and more.
 
 
Software Development:
The terminal in Linux is a *wild card*. You can do almost anything with it. This includes software installation, application and server configurations, file system management, and etc.
 
Large-scale:
Open-source projects benefit from having an attentive community. As a result, Linux is more secure than Windows. Instead of installing anti viruses to clean malware, you just have to stick to the recommended repositories. 
 
Efficient: 
Developers have the convenience of running servers, training machine learning models, accessing remote machines, and compiling and running scripts from the same terminal window. 
 
Free: 
Linux is free (you can put it on as many systems as you like) and you can change it to suit your needs.
Cons
Learning Curve: 
Linux is not for everyone, there is a learning curve in switching to Ubuntu. To actually learn Linux efficiently would take a user one to several years.
 
No Tech Support:
Unlike Windows, there isn’t a dedicated tech support, so getting help for things is up to you. 
 
Designer Compatabilty:
Linux is not as user friendly as Windows or as ‘straight out of the box design’ As an example for design choices, Adobe hasn’t released any of its products to Linux users. So it’s impossible to run them directly. The Ubuntu alternative is a free software called GIMP. 
 
Gaming Capabilities: 
Most games aren’t available in Linux. But that’s not to say you can’t make it happen, it's just not as easy.   
Linux Unix Job Market
Average Salary
$85k-$105k
Job Count
n/a
Top Job Locations

New York City
Boston
San Francisco 

Complimentary Skills to have along with Linux Unix
The following are types of jobs that may require Linux skills.  The top 15 job titles on Dice.com that mention Linux in their postings are:
- DevOps Engineer
- Software Engineer
- Java Developer
- Systems Engineer
- Systems Administrator
- Senior Software Engineer
- Network Engineer
- Python Developer
- Linux Systems Administrator
- Software Developer
- System Administrator
- Linux Administrator
- Linux Engineer
- Senior Java Developer
- C++ Developer

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.