Course Content:
Course Duration: 75 hours.
LESSON – 01 Fundamental of Network Concepts Introducing network hardware (NIC, Hub, Switch, Connector) Network Architecture and Topology Network Cable, Network Design Different types of cabling Installation and configuration NIC |
LESSON – 02 Details about IP address TCP/IP protocol Details about class A, B & class C IP Details about private and real IP addresses Concept about loop back, network and broadcast addresses |
LESSON – 03 IP Subnetting Details Concepts of subnetting Assigning IP address to the NIC (windows environment) Testing ping with different parameters |
LESSON – 04 IP subnetting FLSM, VSLM/etc/group files Details about lock, unlock & status of passwd command Use of ls, cat, less, clear, man, uname & mkbootdisk commands |
LESSON – 05 UNIX History Linux Origins, Why Linux? Recommended hardware Specifications Details about installation Linux boot file and boot loaders Details about Consoles Details about logout, reboot and shutdown |
LESSON – 06 Installation Adding user Removing user Setting password to the user Handling root password Removing password Setting comments to the user Details about /etc/passwd, /etc/shadow Replacing string Cursor movement |
LESSON – 07 : Managing user account File & directory creation Deleting file and directories File and directory copy/move Linux File Hierarchy Concepts Current directory (=) & Parent directory (= =) Changing directories Listing directory contents The home directory Absolute pathnames & Relative pathnames |
LESSON – 8 : Details about files and directories Details about user and group Categories of groups User and group ID numbers System Users and Groups Problems on removing groups |
LESSON – 9 : File and directory permission Categories of permission Changing Permissions – Symbolic Method Changing Permissions – Numeric Method Controlling default permission using “umask Linux boot file and boot loaders Linux Run Levels Linux Run Levels Management |
LESSON – 10 : Mounting and RPM installation Details about /etc/fstab file Mounting with /etc/fstab file Use of dmesg command Moun & unmount cdrom, floppy drive, pen drive, windows partition Use of softlink RPM installation and uninstallation Use of nodeps/force |
LESSON – 11: Visual editor (vi) Introduction to vi cut, copy, paste, delete, undelete, redo, undo Searching string, line numberingUse of pine and mail command Sending mail from Windows/Linux Retrieving mail from Windows/Linux Checking mail from the server Mail aliasing Mail forwarding |
LESSON – 12 IP Configuration Assigning IP address to the NIC (temporary/permanent) Network interface up and down Test ping with different parameters Importance of hostname Importance of ntsysv command |
LESSON – 13: SSH & FTP Concept about SSH? SSH server configuration Concept about ftp Ftp server configuration for file transfer |
LESSON – 14 : NFS Concept about NFS NFS server configuration for data sharing within the network |
LESSON – 15 : DHCP & SAMBA Server Concept about SAMBA Samba server configuration for Linux and Windows connectivity |
LESSON – 16 : Primary DNS Server Details about DNS. Primary DNS server configuration Details about DNS client configuration Use of nslookup as DNS testing utility |
LESSON -17 : Secondary DNS Server Details about DNS. Primary and secondary DNS server configuration Details about DNS client configuration Use of nslookup as DNS testing utility |
LESSON – 18 : Sub and Virtual Domain Details about DNS. Primary and secondary DNS server configuration Details about DNS client configuration Use of nslookup as DNS testing utility Allowing some clients for specific time Denying some clients for specific web sites Denying specific IPs |
LESSON – 19,20 : Mail Server & Web Mail Details about Mail Server – sendmail Concept about smtp, pop & imap |
LESSON – 21 : Web Server Details about Web Server Name based web server & IP based web server |
LESSON 22, 23 : Proxy Server Details about proxy server – squid. Details about acl (access control list) Monitoring clients from the proxy server |
LESSON 24,25 : Security/IP Tables Use of tcp wrapper Use of PAM Creating sudo user Details about different types of ports Use of ipchains & iptables Use of Linux PC as router IP masquerading |