domingo, 20 de fevereiro de 2011

linux vtc red hat video training rhct rhce rhcsa

Introduction

Welcome

(05:28)

T

System Requirements

(02:54)

T

Additional Information for the RHCE Exam

What Else to prepare for the RHCE Exam

(02:09)

T

Logical Volume Management

(04:07)

T

Logical Volumes During Installation

(06:00)

T

Logical Volumes After Installation Pt.1

(02:20)

T

Logical Volumes After Installation Pt.2

(06:09)

T

Setting up a Kickstart File

(04:49)

T

An Automated Kickstart Installation

(03:48)

T

Reviewing Rescue Mode

(06:23)

T

Problems during the boot process

(04:35)

T

What can go wrong with GRUB

(07:36)

T

Create a network installation server

(05:01)

T

System Monitoring and Fault Analysis

System Performance and Security Concepts

(04:46)

T

System Faults and Breaches

(05:00)

T

Method of Fault Analysis

(03:03)

T

Benefits of System Monitoring

(03:20)

T

Managing Process by Account

(02:24)

T

System Service Analysis

System Service Access Controls

(06:48)

T

Service and Network Access Controls

(04:30)

T

Service and Application Access Controls

(03:06)

T

tcp_wrappers Configuration

(04:11)

T

Security Enhanced Linux (SELinux)

(05:09)

T

Network Configuration and Security

Network Resource Access Controls

(03:20)

T

Dynamic Interface Configuration

(03:48)

T

Static Interface Configuration

(03:10)

T

Routing Configuration Pt.1

(02:28)

T

Routing Configuration Pt.2

(05:52)

T

Netfilter Overview

(06:11)

T

iptables Firewall Rules

(06:09)

T

Firewall Rules by IP address

(06:21)

T

Network Access Translation (NAT)

(03:17)

T

Network Support Services

Organizing Networked Systems

(02:08)

T

Host Name Resolution

(03:07)

T

Trace a DNS Query with the dig command

(02:47)

T

Exploring DNS with the host command

(02:49)

T

An Overview of Domain Name Services

(03:15)

T

DNS Packages

(05:14)

T

Configuring a BIND Caching Nameserver

(06:40)

T

Setting up a Slave Nameserver

(05:17)

T

BIND in sysconfig and command support

(04:04)

T

The DHCP Service

(05:57)

T

Configuring an NTP Server

(05:37)

T

Sharing on a Network

Network File Sharing Services

(02:26)

T

FTP – Basic Server Configuration

(05:05)

T

FTP – Security Options

(06:09)

T

NFS – Basic Server Configuration

(03:47)

T

NFS – Security Options

(04:49)

T

Samba – Basic Server Configuration

(06:10)

T

More on Samba

(06:25)

T

Samba Security Options

(03:59)

T

File Server Security

(03:28)

T

Apache Web Services and More

Apache Web Services

(03:02)

T

Critical Apache Configuration Directives

(06:28)

T

Creating a Virtual Host

(06:55)

T

Limiting Access to an Apache Website

(05:33)

T

Apache and SELinux

(03:39)

T

Creating a Secure Apache Host

(07:24)

T

Configuring the Squid Web Proxy

(05:27)

T

Configuring Email Services

Email Protocols and Agents

(04:02)

T

Basic sendmail Configuration Pt.1

(04:33)

T

Basic sendmail Configuration Pt.2

(03:38)

T

Basic Postfix Configuration

(04:33)

T

Switching Between SMTP Services

(02:47)

T

Mail Retrieval Protocols

(03:39)

T

Creating Secure Remote Access

A Secure Shell Server

(06:17)

T

Configuring Secure Certificates

(05:24)

T

Secure Shell Keys

(07:10)

T

Account Security

Basic Account Management

(03:02)

T

Name Service Switching

(04:19)

T

Pluggable Authentication Modules (PAM)

(04:19)

T

Utilities and Authentication

(04:52)

T

Making PAM Work For You

(05:57)

T

Troubleshooting and System Maintenance

Use the Rescue Environment

(06:38)

T

Diagnose and Correct Boot Failures

(06:04)

T

Address Problems with Network Services

(06:04)

T

Add, Remove, and Resize Logical Volumes

(03:22)

T

Diagnose SELinux Network Problems

(02:32)

T

Installation and Configuration

Install Packages for Network Services

(04:08)

T

Configure SELinux for Network Services

(02:49)

T

Configure Services to Start on Boot

(03:43)

T

Configure Basic Service Operation

(03:29)

T

Configure User/Host-based Security

(03:52)

T

Configure Kickstart Installations

(02:45)

T

Add Logical Volumes during Installation

(03:47)

T

Use iptables to for Firewalls and NAT

(04:33)

T

Use PAM for User-Level Restrictions

(03:35)

T

Wrap-up

Wrap-up Pt.1

(03:33)

T

Wrap-up Pt.2

(05:36)

T

Credits

About the Author

(01:23)

T



http://hotfile.com/dl/27224572/1531b63/2162VRHC.part1.rar.html
http://hotfile.com/dl/27224541/06b1e38/2162VRHC.part2.rar.html
http://hotfile.com/dl/27224516/c3a67e0/2162VRHC.part3.rar.html

Password - www.dl4all.com

Nenhum comentário:

Postar um comentário