DevOps Bootcamp: Learn Linux & Become a Linux Sysadmin
24:11:36 Inglés Premium 22/11/2023 191 videos
Descripción del curso
This DevOps Bootcamp will take you from an absolute beginner in Linux to getting hired as a confident and effective Linux System Administrator.
- Everything you need to become a professional Linux Sysadmin and get hired
- Learn how to set up the Linux environment (installing both Ubuntu and CentOS in a virtual machine)
- For each Linux key concept or command, you'll also get a cheatsheet, quiz and practice exercises
- Understanding of Linux File Permissions, Processes, User Account Management, Linux Networking or Software Management
- Acquire a solid foundation of Netfilter/Iptables Linux Firewall (Chains, Tables, Matches, Targets)
- Master all of the key concepts and commands in Linux starting from scratch. No prior Linux knowledge is required
- Build a complete understanding of Linux OS (Distribution Independent) as a complete beginner
- Network Security & Ethical Hacking Key Concepts (Reconnaissance, Sniffing, Iptables Firewall and more)
- Ability to actually apply a deep understanding of Linux on real-world projects
Curriculum
Section 1: Module 1
- 02 - Course Outline 05:51
- 03 - Linux Distributions 06:57
- 04 - Installing Ubuntu in a VM 13:21
- 05 - Things to Do After Installing Ubuntu 10:17
- 06 - Installing CentOS in a VM 12:21
- 07 - Migrating to Linux 06:57
- 08 - Terminals, Consoles, Shells and Commands 09:34
- 09 - Linux Command Structure 06:56
- 10 - Getting Help, Man Pages (man, type, help, apropos) 11:10
- 11 - Mastering the Terminal: The TAB Key 06:43
- 12 - Mastering the Terminal: Keyboard Shortcuts 04:58
- 13 - Mastering the Terminal: the Bash History 08:41
- 14 - Running Commands Without Leaving a Trace 06:31
- 15 - Recording the Date and Time for Each line in History 02:42
- 16 - root vs. non-Privileged Users. Getting root Access (sudo, su, passwd) 11:25
- 17 - Intro to The Linux Files System 05:29
- 18 - The Filesystem Hierarchy Standard ( FHS) 09:40
- 19 - Absolute vs. Relative Paths. Walking through the File System (pwd, cd, tree) 13:11
- 20 - The LS Command In Depth (ls) 08:22
- 21 - Understanding File Timestamps: atime, mtime, ctime (stat, touch, date) 09:45
- 22 - Sorting Files by Timestamp 01:55
- 23 - File Types in Linux (ls -F, file) 07:33
- 24 - Viewing Files - Part 1 (cat) 04:29
- 25 - Viewing Files - Part 2 (less, more) 03:51
- 26 - Viewing Files - Part 3 (tail, head, watch) 06:18
- 27 - Creating Files and Directories (touch, mkdir) 07:11
- 28 - Copying Files and Directories (cp) 06:20
- 29 - Moving and Renaming Files and Directories (mv) 07:47
- 30 - Removing Files and Directories (rm, shred) 09:28
- 31 - Working With Pipes in Linux (|, wc) 08:08
- 32 - Command Redirection (>, >>, 2> &>, cut, tee) 14:32
- 33 - Finding Files and Directories - Part 1 (locate, which) 10:12
- 34 - Finding Files and Directories - Part 2 (find) 11:44
- 35 - Find and Exec 04:25
- 36 - Searching for String Patterns in Text Files (grep) 12:33
- 37 - Searching for Strings in Binary Files (strings) 03:40
- 38 - Comparing Files (cmp, diff, sha256) 09:55
- 39 - The Basics of VIM Text Editor 08:47
- 40 - The VIM Editor In Depth - Part 1 08:57
- 41 - The VIM Editor In Depth - Part 2 05:50
- 42 - Compressing and Archiving Files and Directories (tar, gzip) 14:16
- 43 - Hard Links and the Inode Structure 09:30
- 44 - Working With Symlinks. Symlinks vs. Hard Links 05:23
- 45 - Understanding /etc/passwd and /etc/shadow files 08:52
- 46 - Understanding Linux Groups (groups, id) 04:57
- 47 - Creating User Accounts (useradd) 08:18
- 48 - Changing and Removing User Accounts (usermod, userdel) 06:13
- 49 - Creating Admin Users 02:49
- 50 - Group Management (groupadd, groupdel, groupmod) 03:37
- 51 - User Account Monitoring (whoami, who am i, who, id, w, uptime, last) 07:22
- 52 - Understanding File Permissions 07:22
- 53 - Octal (Numeric) Notation of File Permissions 05:52
- 54 - Changing File Permissions (chmod) 09:00
- 55 - The Effect of Permissions on Directories 07:25
- 56 - Combining Find and Chmod Commands Together 03:32
- 57 - Changing File Ownership (chown, chgrp) 06:55
- 58 - Understanding SUID (Set User ID) 10:28
- 59 - Understanding SGID (Set Group ID) 05:54
- 60 - Understanding the Sticky Bit 05:41
- 61 - Umask 05:12
- 62 - Understanding Files Attributes (lsattr, chattr) 07:16
- 63 - Processes and The Linux Security Model 08:40
- 64 - Listing Processes (ps, pstree) 12:25
- 65 - Getting a Dynamic Real-Time View of the Running System (top, htop) 13:13
- 66 - Signals and Killing Processes (kill, pkill, killall, pidof) 11:28
- 67 - Foreground and Background Processes 04:39
- 68 - Job Control (jobs, fg, bg 07:28
- 69 - Getting Information about the Network Interfaces (ip, ifconfig 07:29
- 70 - Configuring the Network On The Fly (ifconfig, ip, route) 07:16
- 71 - Setting Up Static IP on Ubuntu (netplan) 07:39
- 72 - Testing and Troubleshooting Network Connectivity 09:50
- 73 - Using SSH 08:05
- 74 - Troubleshooting SSH 08:08
- 75 - Securing the OpenSSH Server (sshd) 11:37
- 76 - Copying Files Over the Network (scp) 12:02
- 77 - Synchronizing Files and Directories using rsync 11:57
- 78 - Using rsync Over the Network 06:52
- 79 - Using wget 09:32
- 80 - Checking for Listening Ports (netstat, ss, lsof, telnet, nmap) 09:38
- 81 - DPKG (Debian and Ubuntu Based Distros) 09:13
- 82 - Intro to APT 01:51
- 83 - Using APT (Advanced Package Tool) 12:00
- 84 - Compiling Programs from Source Code vs. Package Manager 04:59
- 85 - Compiling C Programs 03:29
- 86 - Compiling Software From Source Code: Lab ProFTPD 15:16
- 87 - Task Automation and Scheduling Using Cron (crontab) 14:51
- 88 - Scheduling Tasks Using Anacron (anacron) 06:46
- 89 - Mounting and Unmounting File Systems (df, mount, umount, fdisk, gparted) 11:05
- 90 - Working With Device Files (dd) 10:21
- 91 - Getting System Hardware Information (lwhw, lscpu, lsusb, lspci, dmidecode, hdparm) 13:14
- 92 - Intro to systemd 03:29
- 93 - Service Management (systemd and systemctl) 07:06
- 94 - Bash Aliases 07:10
- 95 - Intro to Bash Shell Scripting 07:34
- 96 - The Bash Shebang and Comments 05:51
- 97 - Running Scripts 03:51
- 98 - Variables in Bash 10:49
- 99 - Environment Variables 07:25
- 100 - Getting User Input 05:13
- 101 - Special Variables and Positional Arguments 08:29
- 102 - If, Elif and Else Statements 09:25
- 103 - Testing Conditions For Numbers 03:13
- 104 - Multiple Conditions and Nested If Statements 06:13
- 105 - Command Substitution 05:59
- 106 - Comparing Strings in If Statements 08:54
- 107 - Lab: Testing Network Connections 04:27
- 108 - For Loops 08:10
- 109 - Lab: Dropping a List of IP addresses Using a For Loop 04:27
- 110 - While Loops 09:43
- 111 - Case Statement 09:19
- 112 - Functions in Bash 07:57
- 113 - Variable Scope in Functions 02:59
- 114 - Menus in Bash. The Select Statement 05:53
- 115 - Lab: System Administration Script using Menus 10:04
- 116 - Running a Linux Server in the Cloud 07:27
- 117 - Securing SSH with Key Authentication 05:09
- 118 - Project Overview 05:32
- 119 - What is Docker? Why use it? 04:59
- 120 - Installing Docker 08:11
- 121 - The Docker Client 03:58
- 122 - Pulling Images and Running Containers 11:14
- 123 - Lab: Running a Web Server in a Docker Container 05:05
- 124 - Listing Images and Containers 04:20
- 125 - Removing Images and Containers 08:12
- 126 - Getting Shell Access to a Container 06:24
- 127 - Executing Commands in a Running Container 03:14
- 128 - Getting Information about the Running Containers 06:32
- 129 - Committing Container Changes into a New Image 06:26
- 130 - Tagging and Pushing Custom Images to Docker Hub 04:48
- 131 - Image Structure and Layers 04:28
- 132 - Creating Custom Images using Dockerfile 10:53
- 133 - Persistent Data: Volumes 05:03
- 134 - Project Overview 02:22
- 135 - Linux Security Checklist 05:49
- 136 - Securing the OpenSSH Server (sshd) 11:37
- 137 - Securing the Boot Loader (Grub) 06:12
- 138 - Enforcing Password Policy 09:12
- 139 - Locking or Disabling User Accounts 06:56
- 140 - Giving Limited root Privileges (sudoers and visudo) - Part 1 06:37
- 141 - Giving Limited root Privileges (sudoers and visudo) - Part 2 09:21
- 142 - Setting Users’ Limits (Running a DoS Attack Without root Access) 05:45
- 143 - Intro to Cracking Passwords 04:15
- 144 - Cracking Linux Passwords Using John the Ripper 07:32
- 145 - Checking Files Integrity with AIDE - Part 1 11:33
- 146 - Checking Files Integrity with AIDE - Part 2 04:37
- 147 - Scanning for Rootkits (rkhunter and chkrootkit) 08:58
- 148 - Scanning for Viruses with ClamAV 10:39
- 149 - Full Disk Encryption Using dm-crypt and LUKS 12:13
- 150 - Unlocking LUKS Encrypted Drives With A Keyfile 04:21
- 151 - Symmetric Encryption Using GnuPG 09:46
- 152 - Steganography Explained 10:03
- 153 - Steganography In Depth 07:19
- 154 - Hide Secret Messages Through Steganography with Steghide 09:08
- 155 - Scanning Networks with Nmap 09:40
- 156 - Nmap Advanced 09:26
- 157 - Project Overview: The Big Picture 02:59
- 158 - Getting a Domain Name 13:24
- 159 - Diving into the DNS Protocol and Installing a DNS Server (BIND9) 10:22
- 160 - Setting Up the Authoritative BIND9 DNS Server 15:01
- 161 - Installing a Web Server (Apache2) 03:31
- 162 - Setting Up Virtual Hosting 11:01
- 163 - Securing Apache with OpenSSL and Digital Certificates 09:22
- 164 - Access Control by Source IP Address 08:09
- 165 - The 'Files' Directive 08:25
- 166 - The .htaccess File 07:53
- 167 - HTTP Digest Authentication 06:26
- 168 - The Options Directive and Indexing 13:41
- 169 - HTTP Compression 05:57
- 170 - SetHandler and Server Status 05:06
- 171 - Installing PHP 03:14
- 172 - Installing and Securing the MySql Server 04:52
- 173 - Installing phpMyAdmin 09:23
- 174 - Securing phpMyAdmin 04:06
- 175 - Installing a Web Application (WordPress) 08:59
- 176 - Securing WordPress 05:15
- 177 - Intro to Ansible 03:25
- 178 - Prerequisites 02:20
- 179 - Ansible Inventory File 10:13
- 180 - Ansible Ad-Hoc Commands: The Shell Module 05:56
- 181 - Ansible Ad-Hoc Commands: The Script Module 04:19
- 182 - Ansible Ad-Hoc Commands: The APT Module 05:29
- 183 - Ansible Ad-Hoc Commands: The Service Module 03:35
- 184 - Ansible Ad-Hoc Commands: The User Module 05:33
- 185 - What is IPFS and How It Works 09:40
- 186 - Installing IPFS on Linux 07:44
- 187 - Running an IPFS Node on Linux 07:00
- 188 - Pinning Objects 04:03
- 189 - SSH Public Key Authentication Overview 04:26
- 190 - Generating SSH Key Pair on Windows 04:59
- 191 - Generating SSH Key Pair on Linux 03:59
- 192 - Configuring SSH Public Key Authentication on Linux 11:30
About the Instructor
zerotomastery.io
$0.00
$8.00 Que esta incluido?
- Streaming Multiplataforma
- Acceso de por vida
- Soporte al cliente
- Actualizaciones gratuitas