Linux Administration: Build 5 Hands-On Linux Projects

Linux Administration: Build 5 Hands-On Linux Projects

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 16h 09m | 7.70 GB

Learn Linux by Doing with 5 Projects: Docker, Securing Linux, Run Web and DNS Servers, Run a Mail Server, Automate Linux

This practical Linux Administration course consists of Building 5 Hands-On Linux projects from scratch! It’s the 2nd part of “Master Linux Administration: The Complete Linux Bootcamp” and requires basic Linux knowledge. The course is not recommended for complete beginners!

This course IS NOT like any other Linux Administration course you can take online. This course is focused on learning by doing. You’ll learn what really matters and you’ll get the skills to get ahead and gain an edge.

Project #1 – Running Containerized Applications with Docker

– What is Docker? Why use it?
– Installing Docker
– The Docker Client
– Pulling Images and Running Containers
– Lab: Running a Web Server in a Docker Container
– Listing Images and Containers
– Removing Images and Containers
– Getting Shell Access to a Container
– Executing Commands in a Running Container
– Getting Information about the Running Containers
– Committing Container Changes into a New Image
– Tagging and Pushing Custom Images to Docker Hub
– Image Structure and Layers
– Creating Custom Images using Dockerfile
– Persistent Data: Volumes

Project #2 – Securing and Hardening a Linux System

– Linux Security Checklist
– Securing the OpenSSH Server (sshd)
– Securing the Boot Loader (Grub)
– Enforcing Password Policy
– Locking or Disabling User Accounts
– Giving Limited root Privileges (sudoers and visudo)
– Setting Users’ Limits (Running a DoS Attack Without root Access)
– Intro to Cracking Passwords
– Cracking Linux Passwords Using John the Ripper
– Checking Files Integrity with AIDE – Part
– Scanning for Rootkits (rkhunter and chkrootkit)
– Scanning for Viruses with ClamAV
– Full Disk Encryption Using dm-crypt and LUKS
– Unlocking LUKS Encrypted Drives With A Keyfile
– Symmetric Encryption Using GnuPG
– Using an Encrypted Text Editor (EncryptPad)
– Steganography Explained
– Steganography In Depth
– Hide Secret Messages Through Steganography with Steghide
– Scanning Networks with Nmap
– Nmap Advanced
– Introduction to Linux Firewalls
– Securing Your Linux System with a Firewall (Netfilter/Iptables)
– Chains, Tables, Matches, and Targets In Depth
– Stateful Firewall In Depth

Project #3: Setting Up a Web and DNS Server

– Getting a Domain Name
– Diving into the DNS Protocol and Installing a DNS Server (BIND9)
– Setting Up the Authoritative BIND9 DNS Server
– Installing a Web Server (Apache2)
– Setting Up Virtual Hosting
– Securing Apache with OpenSSL and Digital Certificates
– Access Control by Source IP Address
– The Directive
– The .htaccess File
– HTTP Digest Authentication
– The Options Directive and Indexing
– HTTP Compression
– SetHandler and Server Status
– Installing PHP
– Installing and Securing the MySql Server
– Installing a Web Application (WordPress)
– Securing WordPress

Project #4 – Running a Virtual Mail Server

– Overview of a Complete Virtual Mail System
– Mail and DNS: MX Records and Reverse DNS
– Checking the Prerequisites
– Installing Software Packages
– Configuring MySql and Connect it With Postfix
– Configuring Postfix Using the Postconf Command
– Configuring SMTP AUTH (SASLAUTHD and MySql)
– Configuring Dovecot (POP3/IMAP)
– Adding Domains and Virtual Users. Testing the System
– Enabling SMTPS Port 465 in Postfix For Email Submission
– Troubleshooting
– Virus Scanning Using Amavis and ClamAV
– Testing Amavis and ClamAV
– Fighting Against Spam: Postfix Access Restrictions
– Fighting Against Spam: Postfix HELO Restrictions
– Fighting Against Spam: Postfix Sender Restrictions
– Fighting Against Spam: Postfix Recipient Restrictions
– Fighting Against Spam: Using Public RBLs
– Intro to Spam Filtering Systems
– Installing Rspamd and Postfix Integration
– Configuring and Testing Rspamd
– Postfix Log Monitoring Using pflogsumm

Project #5 – Automating Linux Administrative Tasks

– Intro to Ansible
– Prerequisites
– Ansible Inventory File
– Ansible Ad-Hoc Commands: The Shell Module
– Ansible Ad-Hoc Commands: The Script Module
– Ansible Ad-Hoc Commands: The APT Module
– Task Automation and Scheduling Using Cron (crontab)
– Scheduling Tasks Using Anacron
– Dropping Packets Based on Source IP Address
– Dropping a List of IP Addresses
– System Administration Script using Bash Menus
– Intro to Ansible
– Ansible Inventory File
– Ansible Ad-Hoc Commands
– Ansible modules: raw, shell, command, script

Every project is complete and includes all the scripts and configuration files, a command section, lots of quizzes, slides, and many practice challenges.

What you’ll learn

  • Become a professional Linux Engineer by Building 5 Hands-On Linux Projects
  • Learn how to run containerized applications with Docker
  • Learn to manage Docker images and containers
  • Learn to tag and push Images to Docker Hub
  • Learn to build custom Docker Images using Dockerfile
  • Learn how to secure and harden Linux System
  • You will MASTER Network Security Key Concepts (Encryption, Steganography, Reconnaissance, Iptables Firewall …).
  • Learn to configure and authoritative DNS server (BIND9)
  • Learn to configure a Web Server (Apache2)
  • Learn to install and secure WordPress
  • Learn to run a Mail System (Potsfix, Dovecot, MySql, OpenSSL, SMTP AUTH, Rspamd, ClamAV)
  • Acquire the skills to automate the most common Linux administrative tasks using Bash Scripting and Ansible
  • Learn to use Ansible in large Networks for Network Automation
  • By the end of this course you will have a deep understand of the Linux operating system and be able to apply that knowledge in Real-
  • World projects
Table of Contents

Getting Started
1 How to Get the Most Out of This Course
2 Running a Linux Server in the Cloud
3 Securing SSH with Key Authentication
4 How to Get Better and Faster Support
5 Ubuntu and CentOS Download Links (OVA Files)

Project #1 – Running Containerized Applications with Docker
6 Project Overview
7 What is Docker Why use it
8 Installing Docker
9 The Docker Client
10 Pulling Images and Running Containers
11 Lab Running a Web Server in a Docker Container
12 Listing Images and Containers
13 Removing Images and Containers
14 Getting Shell Access to a Container
15 Executing Commands in a Running Container
16 Getting Information about the Running Containers
17 Committing Container Changes into a New Image
18 Tagging and Pushing Custom Images to Docker Hub
19 Image Structure and Layers
20 Creating Custom Images using Dockerfile
21 Persistent Data Volumes
22 Commands – Committing Changes, Tagging and Pushing Images
23 Commands – Executing Commands
24 Commands – Installing Docker
25 Commands – Listing and Removing Images and Containers
26 Commands – The Docker CLI, Pulling Images & Running Containers
27 Commands – Volumes

Challenges – Docker
28 Docker

Project #2 – Securing and Hardening a Linux System
29 Project Overview
30 Linux Security Checklist
31 Securing the OpenSSH Server (sshd)
32 Securing the Boot Loader (Grub)
33 Enforcing Password Policy
34 Locking or Disabling User Accounts
35 Giving Limited root Privileges (sudoers and visudo) – Part 1
36 Giving Limited root Privileges (sudoers and visudo) – Part 2
37 Setting Users’ Limits (Running a DoS Attack Without root Access)
38 Intro to Cracking Passwords
39 Cracking Linux Passwords Using John the Ripper
40 Checking Files Integrity with AIDE – Part 1
41 Checking Files Integrity with AIDE – Part 2
42 Scanning for Rootkits (rkhunter and chkrootkit)
43 Scanning for Viruses with ClamAV
44 Full Disk Encryption Using dm-crypt and LUKS
45 Unlocking LUKS Encrypted Drives With A Keyfile
46 Symmetric Encryption Using GnuPG
47 Using an Encrypted Text Editor (EncryptPad)
48 Steganography Explained
49 Steganography In Depth
50 Hide Secret Messages Through Steganography with Steghide
51 Scanning Networks with Nmap
52 Nmap Advanced
53 Introduction to Netfilter and Iptables
54 Chain Traversal in a Nutshell
55 Iptables Basic Usage
56 Iptables Options (Flags) – Part 1
57 Iptables Options (Flags) – Part 2
58 Where Do We Write Iptables Rules
59 Setting the Default Policy
60 Deleting the Firewall
61 Filter by IP Address
62 Filter by Port
63 Intro to Stateful Firewalls (Connection Tracking)
64 Implementing Stateful Firewalls with Iptables
65 Filter by MAC Address
66 Match by Date and Time
67 The ACCEPT and DROP Targets
68 The LOG Target
69 Commands – AIDE
70 Commands – ClamAV
71 Commands – Full Disk Encryption
72 Commands – John the Ripper (JTR)
73 Commands – Locking User Accounts
74 Commands – Nmap
75 Commands – rkhunter & chkrootkit
76 Commands – SSH
77 Commands – Steganography

Challenges – Securing a Linux Server
78 Challenges – Netfilter and Iptables
79 John The Ripper (JTR)
80 Scanning with Nmap
81 Steganography

Project #3 – Setting Up a Web and DNS Server
82 Project Overview The Big Picture
83 Getting a Domain Name
84 Diving into the DNS Protocol and Installing a DNS Server (BIND9)
85 Setting Up the Authoritative BIND9 DNS Server
86 Installing a Web Server (Apache2)
87 Setting Up Virtual Hosting
88 Securing Apache with OpenSSL and Digital Certificates
89 Access Control by Source IP Address
90 The Files Directive
91 The .htaccess File
92 HTTP Digest Authentication
93 The Options Directive and Indexing
94 HTTP Compression
95 SetHandler and Server Status
96 Installing PHP
97 Installing and Securing the MySql Server
98 Installing phpMyAdmin
99 Securing phpMyAdmin
100 Installing a Web Application (WordPress)
101 Securing WordPress
102 Commands – phpMyAdmin

Challenges – DNS and WEB
103 Challenges – Apache2
104 Challenges – DNS and BIND

Project #4 – Running a Virtual Mail Server
105 Overview of a Complete Virtual Mail System
106 Mail and DNS MX Records and Reverse DNS
107 Checking the Prerequisites
108 Installing Software Packages
109 Configuring MySql and Connect it With Postfix
110 Configuring Postfix Using the Postconf Command
111 Configuring SMTP AUTH (SASLAUTHD and MySql)
112 Configuring Dovecot (POP3IMAP)
113 Adding Domains and Virtual Users. Testing the System
114 Enabling SMTPS Port 465 in Postfix For Email Submission
115 Troubleshooting
116 Virus Scanning Using Amavis and ClamAV
117 Testing Amavis and ClamAV
118 Fighting Against Spam Postfix Access Restrictions
119 Fighting Against Spam Postfix HELO Restrictions
120 Fighting Against Spam Postfix Sender Restrictions
121 Fighting Against Spam Postfix Recipient Restrictions
122 Fighting Against Spam Using Public RBLs
123 Intro to Spam Filtering Systems
124 Installing Rspamd and Postfix Integration
125 Configuring and Testing Rspamd
126 Postfix Log Monitoring Using pflogsumm
127 Amavis Installation Guide
128 Config – Postfix Access Restrictions
129 Mail Project Archive (etc.tar.gz)
130 Rspamd Installation Guide

Project #5 – Automating Linux Administrative Tasks
131 Intro to Ansible
132 Prerequisites
133 Ansible Inventory File
134 Ansible Ad-Hoc Commands The Shell Module
135 Ansible Ad-Hoc Commands The Script Module
136 Ansible Ad-Hoc Commands The APT Module
137 Ansible Ad-Hoc Commands The Service Module
138 Ansible Ad-Hoc Commands The User Module
139 Task Automation and Scheduling Using Cron (crontab)
140 Scheduling Tasks Using Anacron
141 Moving to Automation With Bash Shell Scripting
142 Dropping Packets Based on Source IP Address
143 Dropping a List of IP Addresses
144 System Administration Script using Bash Menus
145 Commands – Cron
146 Project Overview

Challenges – Automating Administrative Tasks
147 Ansible

[EXTRA] Bash Shell Scripting
148 Intro to Bash Shell Scripting
149 The Bash Shebang and Comments
150 Running Scripts
151 Variables in Bash
152 Getting User Input
153 Special Variables and Positional Arguments
154 If, Elif and Else Statements
155 Testing Conditions For Numbers
156 Multiple Conditions and Nested If Statements
157 Command Substitution
158 Comparing Strings in If Statements
159 Lab Testing Network Connections
160 For Loops
161 While Loops
162 Case Statement
163 Functions in Bash
164 Variable Scope in Functions
165 Menus in Bash. The Select Statement
166 Coding – If…Elif…Else Statements
167 Coding – Variables in Bash

Challenges – Bash Scripting
168 Bash Scripting Basics
169 Flow Control (if…elif…else) and Command Substitution
170 Functions and Menus
171 Loops in Bash for, while

[EXTRA] The VIM Editor
172 The Basics of VIM Text Editor
173 The VIM Editor In Depth – Part 1
174 The VIM Editor In Depth – Part 2

Where To Go From Here
175 What’s Next

Course Completion
176 BONUS
177 Congratulations

Homepage