O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Learning Path: Linux Sysadmin Basics

Video Description

The Linux operating system is more relevant than ever for a wide range of everyday tasks. With the proper commands, you can perform remote system administration, back up data, lock down security, access network resources, and so much more. This Learning Path covers everything you need to be a competent Linux system administrator.

Prerequisite: General understanding of OSs recommended

Table of Contents

  1. Learning Linux System Administration, by Jim Strickland
    1. What Is System Administration? 00:01:55
    2. About The Author 00:01:35
    3. What To Expect From These Videos 00:02:12
    4. A Brief History Lesson 00:04:16
    5. How To Access Your Working Files 00:01:15
    6. Terminal Emulators And Bash 00:05:20
    7. Linux Directory Tree Navigation - Part 1 00:03:55
    8. Linux Directory Tree Navigation - Part 2 00:05:42
    9. Linux Directory Tree Navigation - Part 3 00:01:55
    10. Files And File Manipulation - Part 1 00:03:46
    11. Files And File Manipulation - Part 2 00:04:37
    12. Files And File Manipulation - Part 3 00:05:47
    13. Pipes And Redirects 00:04:02
    14. Regular Expressions - Part 1 00:06:04
    15. Regular Expressions - Part 2 00:05:03
    16. Grep And Sed - Part 1 00:02:39
    17. Grep And Sed - Part 2 00:01:46
    18. Grep And Sed - Part 3 00:03:31
    19. Grep And Sed - Part 4 00:01:58
    20. Whereis And Paths 00:03:11
    21. Power Boost Unlocked - Sudo And Su 00:03:43
    22. Reading The Fine Manual 00:03:24
    23. The Directory Tree Is A Lie - Part 1 00:04:37
    24. The Directory Tree Is A Lie - Part 2 00:05:04
    25. Partitions And Partition Tables - Part 1 00:06:29
    26. Partitions And Partition Tables - Part 2 00:04:21
    27. Partitions And Partition Tables - Part 3 00:06:57
    28. Logical Volume Management - Part 1 00:04:49
    29. Logical Volume Management - Part 2 00:04:42
    30. Logical Volume Management - Part 3 00:01:53
    31. Holding It All Together - FSTAB - Part 1 00:03:33
    32. Holding It All Together - FSTAB - Part 2 00:05:10
    33. Holding It All Together - FSTAB - Part 3 00:02:49
    34. Linux Kernel Introduction 00:02:28
    35. Processes and Daemons - part 1 00:05:59
    36. Processes and Daemons - part 2 00:05:49
    37. Processes and Daemons - part 3 00:07:13
    38. Virtual Memory - Part 1 00:07:04
    39. Virtual Memory - Part 2 00:04:12
    40. Virtual Memory - Part 3 00:01:55
    41. File Security - Part 1 00:05:20
    42. File Security - Part 2 00:05:48
    43. File Security - Part 3 00:04:59
    44. File Security - Part 4 00:04:37
    45. Account Anatomy 00:06:09
    46. Root - One Name For Many Things 00:03:07
    47. Boot Cycle - When It Works Right 00:05:07
    48. Dmesg And Logfiles 00:05:35
    49. System Will Not Boot 00:05:43
    50. System Hangs 00:04:58
    51. GUI Will Not Start 00:04:45
    52. File System Corruption 00:05:44
    53. Reinstallation 00:04:38
    54. Shutdown 00:00:58
    55. Wrap Up 00:01:58
  2. Learning DNS, by Cricket Liu
    1. What You Should Expect From This Video 00:01:10
    2. About The Author 00:01:14
    3. A Brief History Of The Domain Name System 00:04:11
    4. What Is The Domain Name System? 00:03:49
    5. Domains, Delegation And Zones 00:03:06
    6. The Internet Namespace 00:04:17
    7. Internationalized Domain Names 00:02:07
    8. Name Servers, Zones And Authority 00:01:26
    9. Resolvers 00:01:49
    10. Resolution And Recursion 00:04:22
    11. Queries And Responses 00:02:47
    12. Caching 00:02:23
    13. Server Selection And Retransmission 00:01:50
    14. Authoritative, Recursive And Caching Name Servers 00:02:15
    15. Primaries And Secondaries 00:03:09
    16. Forwarding And Forwarders 00:02:33
    17. Makes And Models - BIND, The Windows DNS Server, And More 00:02:16
    18. Resource Records 00:03:24
    19. The A Record 00:01:09
    20. The AAAA Record 00:01:14
    21. The PTR Record 00:03:24
    22. The CNAME Record 00:01:44
    23. The MX Record 00:02:13
    24. The SRV Record 00:02:45
    25. The TXT Record 00:00:58
    26. Infrastructure Records 00:07:44
    27. Wildcards 00:02:19
    28. RRset Order 00:01:24
    29. Tracing Resolution With dig 00:04:58
    30. Timeouts And Retransmissions 00:04:13
    31. Default Domains And Search Lists 00:03:33
    32. Dynamic Update 00:05:57
    33. NOTIFY 00:03:01
    34. IXFR 00:01:08
    35. Sender Policy Framework 00:03:23
    36. nslookup 00:08:43
    37. dig 00:08:49
    38. Conclusion 00:01:27
  3. TCP/IP, by Ric Messier
    1. What You Should Expect From This Video 00:02:27
    2. What You Should Know 00:03:04
    3. What You Will Learn 00:03:14
    4. History Of TCP/IP 00:05:39
    5. Using TCP/IP For Communication 00:04:12
    6. OSI Model 00:10:31
    7. TCP/IP Model 00:06:29
    8. Capturing Packets 00:06:54
    9. Using Wireshark 00:11:49
    10. IETF 00:09:33
    11. Protocols 00:04:17
    12. Networking Utilities 00:07:49
    13. Ethernet 00:06:11
    14. Layer 2 Addresses (Mac) 00:06:04
    15. PPP/Slip/PPPoe 00:06:29
    16. WAN Protocols - Sonet, ATM And Frame Relay 00:06:40
    17. VLANs And 802.1Q 00:04:22
    18. Purposes Of The Network Layer 00:05:33
    19. IP Headers 00:09:16
    20. IP Addresses And Subnets 00:07:29
    21. Routing 00:06:08
    22. BGP 00:06:14
    23. RIP 00:05:40
    24. OSPF 00:06:47
    25. ARP 00:04:52
    26. ARP Spoofing 00:04:53
    27. RARP 00:04:22
    28. Internet Registries 00:04:28
    29. Autoconfiguration - BootP And DHCP 00:07:24
    30. IP Configuration 00:04:42
    31. IP Fragmentation 00:05:17
    32. Uses Of ICMP 00:02:03
    33. ICMP Message Types 00:04:34
    34. Ping 00:04:26
    35. Error Messages And Handling 00:05:37
    36. ICMP Attacks 00:04:39
    37. Purposes Of The Transport Layer 00:02:33
    38. TCP Headers 00:07:15
    39. TCP Handshake 00:04:22
    40. Acknowledgements 00:04:08
    41. Sliding Windows 00:04:12
    42. Session Teardown 00:03:00
    43. TCP States 00:05:20
    44. Port Behavior 00:05:19
    45. Uses Of UDP 00:03:02
    46. Flags/Headers 00:03:27
    47. Streaming Audio And Video 00:05:11
    48. Purposes Of The Session Layer 00:02:07
    49. SSL/TLS 00:05:15
    50. SSH 00:06:34
    51. RTP Control Protocol 00:03:38
    52. RPC 00:09:01
    53. Purposes Of The Application Layer 00:03:48
    54. HTTP 00:07:57
    55. Telnet 00:07:08
    56. FTP 00:08:36
    57. SMTP 00:08:25
    58. POP3 And IMAP 00:04:52
    59. Windows File Sharing - SMB And CIFS 00:07:54
    60. DNS Basics 00:05:47
    61. DNS Protocol 00:06:31
    62. Firewalls 00:03:23
    63. Stateful - Determining State 00:05:35
    64. Stateless - Access Control Lists 00:03:41
    65. Application Layer Firewalls 00:05:37
    66. Intrusion Detection 00:05:10
    67. Spoofing Traffic 00:04:09
    68. Malicious Traffic 00:06:11
    69. Building Packets - PackETH 00:04:43
    70. Building Packets - HPing 00:04:33
    71. Wireless Fundamentals 00:03:38
    72. Searching For Wireless Networks 00:04:43
    73. Examining Wireless Packets 00:06:48
    74. Protecting Wireless With WEP 00:05:38
    75. Protecting Wireless With WPA 00:03:48
    76. Why IPv6 00:03:54
    77. IPv6 Vs. IPv4 00:05:02
    78. Using TCP With IPv6 00:03:02
    79. Using ICMPv6 00:03:39
    80. Next Steps 00:02:38
    81. About The Author 00:02:46
  4. Great Bash, by Carl Albing
    1. Writing Your First Scripts 00:33:11
    2. Making Decisions in Bash 00:22:17
    3. Variables 00:59:27
    4. Flow of Control 00:42:11
    5. Shell Math and Logic 00:30:38
    6. Functions 00:28:51
    7. Arrays 00:20:28
    8. Great Scripts 00:28:47
  5. Learning Linux Security, by Ric Messier
    1. Introduction 00:01:51
    2. What Will Be Covered 00:02:47
    3. What Is Linux 00:03:51
    4. Distributions 00:04:02
    5. Scratch Versus Binary 00:03:59
    6. Ubuntu Package Management 00:03:19
    7. RedHat Package Management 00:04:41
    8. The Boot Process 00:03:44
    9. Physical Protections 00:03:28
    10. The Boot Manager - GRUB 00:05:56
    11. Protecting The Boot Manager 00:04:02
    12. xinetd 00:04:14
    13. Runlevels 00:04:33
    14. Setting Default Runlevels 00:04:38
    15. GRUB2 00:03:13
    16. LILO 00:04:50
    17. Service Management 00:02:53
    18. Service Management With RHEL7 00:03:36
    19. TCP Wrappers 00:02:34
    20. Listening Ports 00:05:41
    21. Standard Postfix Configuration 00:06:06
    22. Apache Configuration 00:07:03
    23. Hardening Apache 00:07:12
    24. Virtual Hosts In Apache 00:03:55
    25. DNSSec 00:06:16
    26. MySQL 00:05:13
    27. PostgreSQL 00:04:00
    28. Tomcat 00:05:35
    29. JBoss 00:02:50
    30. mod_security 00:07:04
    31. SSL-TLS And Apache 00:06:32
    32. SPF And Greylisting In Postfix 00:04:12
    33. Syslog 00:05:57
    34. Remote Logging 00:03:51
    35. Reading Log Files 00:05:47
    36. Logwatch 00:06:28
    37. Log Aggregation 00:04:42
    38. utmp And wtmp 00:03:42
    39. Anti-Virus 00:03:43
    40. Tripwire 00:07:08
    41. Samhaim 00:03:13
    42. Prelude 00:03:37
    43. AIDE 00:03:39
    44. Snort 00:07:06
    45. Alerting With Snort 00:05:15
    46. Snort Console 00:03:54
    47. Reading Snort Traces With Wireshark 00:02:26
    48. RootKitHunter 00:03:35
    49. etc-shadow And etc-passwd Files 00:07:05
    50. Creating Users 00:03:21
    51. Securing Passwords 00:03:28
    52. Cracking Passwords 00:03:19
    53. Alternate User Management 00:03:10
    54. AppArmor 00:03:05
    55. Unix Permissions 00:04:00
    56. SELinux 00:02:51
    57. Modifying SELinux Permissions 00:03:25
    58. Restoring SELinux Permissions 00:02:38
    59. PAM 00:03:15
    60. netstat 00:03:58
    61. Process Management – top And ps 00:05:17
    62. Process Management – kill 00:04:08
    63. nmap 00:05:31
    64. OpenVAS 00:05:19
    65. Nexpose 00:05:53
    66. Find 00:03:50
    67. tcpdump 00:04:19
    68. Wireshark 00:05:31
    69. lspci And lsusb 00:02:43
    70. Linux Kernel 00:04:31
    71. Kernel Modules 00:04:15
    72. Managing Kernel Parameters 00:03:54
    73. Kernel Builds 00:05:11
    74. Kernel Config 00:02:49
    75. Viewing Kernel Config From Running Kernel 00:03:34
    76. iptables 00:01:22
    77. NAT With iptables 00:04:36
    78. iptables Tables 00:02:14
    79. Matching On Protocol 00:04:09
    80. Rate limiting 00:02:52
    81. New Versus Established Versus Related 00:03:51
    82. Targets 00:02:20
    83. iptables Logs 00:02:47
    84. iptables With Multiple Interfaces 00:02:57
    85. Firewalld 00:02:56
    86. Zones And Services 00:02:35
    87. Matching On Owner 00:03:06
    88. ufw 00:02:53
    89. gufw 00:02:12
    90. What We Covered 00:02:29
    91. What Comes Next 00:02:28
    92. Wrap-Up 00:00:33