Linux LPI LPIC-2: Exam 202
English | 2017 | flv | H264 1280x720 | AAC 2 ch | 8 hrs 6 min | 1.93 GB
This LPIC-2 course by Shawn Powers covers the requisite skills for passing the LPI 202 exam. It includes an explanation of terms and processes, along with practical applications and hands-on configuration of actual Linux machines.
- Linux command line
- General understanding of networking
- Virtualization system capable of hosting multiple virtual machines
- CompTIA Linux+
Related Job Functions
- System administration
Shawn Powers' areas of expertise include Linux and Chef technologies. He's earned LPIC-1 and CompTIA Linux+ certifications, and is an associate editor for Linux Journal.
1. Introduction (1 min)
LPIC-2 is a certification from the Linux Professional Institute (LPI) that requires individuals to pass two exams. This course prepares learners for the second exam, Exam 202.
2. DNS Server Options (14 min)
Linux supports various systems for service DNS to a local network and the Internet. In this Nugget, we learn about a few common alternatives that are mentioned in the LPIC-2 objectives.
3. Caching Nameserver with BIND (14 min)
The most commonly used DNS server is BIND. In this Nugget, we learn to configure BIND in order to provide DNS caching for a local network.
4. Creating and Maintaining DNS Zones with BIND (15 min)
The BIND server can also be used for hosting the actual name resolution on a network. In this Nugget, we learn how to configure a BIND server daemon to host name resolution on a network.
5. DNS Master and Slave with BIND (10 min)
DNS servers are designed for redundancy. In this Nugget, we learn to configure a master and slave DNS server on two separate computers.
6. Securing BIND Server (11 min)
The BIND daemon can be configured to only transfer domain information to slave servers with a shared TSIG key. In this Nugget, we learn how to configure it.
7. Split DNS with BIND (8 min)
With on premises servers, it's often desirable to host a split DNS setup that will resolve names differently inside the private network. In this Nugget we learn to create a split DNS setup with BIND.
8. Running BIND in a Chroot Jail (7 min)
Running a daemon with root privileges is a security concern, because a compromised service can mean a compromised server. In this Nugget, we learn to run BIND as an unprivileged user in a chroot jail.
9. Apache Web Server Installation and Setup (17 min)
Apache is the most commonly installed web server, and in this Nugget, we learn to install and configure it for basic web services.
10. Apache Modules & Languages (7 min)
Apache supports many languages and modules. In this Nugget, we learn to install them, along with tweaking the Apache configuration for performance.
11. Apache MPM Module (11 min)
Apache modularizes every aspect of their program, including the ability to process multiple threads at once. In this Nugget, we learn how to tweak the MPM module.
12. Apache Authentication and Redirection (11 min)
Apache supports authentication for certain folders in the web hierarchy. It also supports redirecting the server to other locations in the filesystem based on client requests.
13. Apache Virtual Host Configuration (14 min)
Apache can support multiple websites using different IP addresses, or by sharing an IP address and using DNS names to form virtual hosts. In this Nugget, we learn to configure both.
14. Apache SSL Setup (15 min)
Apache can use self-signed SSL certificates in order to provide encrypted web traffic. In order to provide trusted encryption, however, a certificate signed by an SSL provider is required. In this Nugget, we learn to do both.
15. Squid Installation (14 min)
Squid is a web caching service that allows html and graphics to be cached on the local network, so subsequent requests for those objects are served from the local system instead of redownloading from the Internet. It allows for more efficient usage of bandwidth.
16. Squid ACLs (17 min)
Limiting access to the Squid service is a way to protect the server from being used without permission. These rules can be based on many criteria, such as IP address, destination domain, etc.
17. Squid Authentication (9 min)
Authentication is a special type of ACL that requires a user to log in to access the proxy. In this Nugget, we learn to configure Squid for authenticated access.
18. Nginx Installation and Configuration (8 min)
Nginx is a lightweight, extremely efficient web server. In this Nugget, we learn to install it, and learn about its configuration options.
19. Nginx Reverse Proxy (10 min)
Along with serving web pages, Nginx can also act as a reverse proxy, which allows multiple machines to be accessible from a single web address, even if those services are running on ports other than port 80.
20. Samba Daemons (9 min)
The Samba suite uses multiple daemons to handle communication with Microsoft Windows networks. In this Nugget, we learn about the different daemons and their roles.
21. Samba Installation (14 min)
In this Nugget, we learn to install and configure the Samba daemons for file sharing.
22. Samba Password Management (10 min)
The Samba (Windows) passwords are stored in a different format than the Linux passwords on the server, so must be maintained separately. In this Nugget, we learn to initialize users and keep their passwords in sync.
23. NFS (16 min)
The NFS (Network File System) server offers a simplistic, yet very efficient remote filesystem. Since it doesn't support user-based authentication, its security is often insufficient, but where appropriate, it offers the ability to mount filesystems from remote servers.
24. DHCP (15 min)
DHCP can be used to provide clients IP address information from a pool of available IP addresses, eliminating the need for manually configuring systems on your network.
25. DHCP Static Entries & Relay Hosts (16 min)
While it's useful to have a dynamic pool of IP addresses, some systems (like servers) need to keep the same IP address all the time. DHCP allows static entries for particular machines so manual configuration isn't required, but servers get the same IP every time they start. The DHCP protocol also allows for a single machine to manage leases on multiple networks using a relay server that forwards requests. In this Nugget, we learn to do both.
26. PAM Configuration (15 min)
The Pluggable Authentication Modules (PAM) system controls how various programs on the Linux system authenticate. In this Nugget, we learn how the system works and how to modify the defaults.
27. PAM Modules (7 min)
Individual PAM modules can be configured in order to tweak your system. In this Nugget, we learn how to configure them and see how we can enforce extra security on existing applications.
28. LDAP Server Installation (18 min)
The OpenLDAP server is an LDAP implementation used commonly on Linux. In this Nugget, we learn to install and configure a basic LDAP server.
29. LDAP Client Tools (11 min)
Manipulating an LDAP server is simple using command line tools on Linux. In this Nugget, we learn to add, delete, and modify entries in an existing LDAP database.
30. Postfix (Email) Server Config (16 min)
The Postfix daemon is the most popular SMTP server for Linux, and in this Nugget, we learn to configure it for local email handling.
31. Procmail for Local Email (13 min)
The Postfix daemon puts all incoming email into the /var/spool/mail folder. Using Procmail for local email handling allows users to sort incoming mail based on any criteria they desire.
32. Remote Email Delivery (16 min)
Accessing email from a remote server is done using IMAP and POP3 protocols. In this Nugget, we learn to configure the Courier and Dovecot daemons for providing remote email access.
33. NAT Routing (17 min)
Linux can act as a router, even one designed to protect an internal LAN by using network address translation and private IP addresses. In this Nugget, we learn what NAT is and how to configure the Linux kernel to provide the service.
34. Packet Filtering with iptables (13 min)
Along with routing packets, Linux can filter and block traffic based on several criteria. In this Nugget, we learn to use iptables in order to filter incoming and forwarded traffic.
35. FTP Server Setup (12 min)
FTP Servers are useful for hosting downloadable files or for user interaction with their home directory. In this Nugget, we learn to configure several FTP servers.
36. SSH Server Setup (7 min)
The secure shell daemon allows for encrypted commandline interaction with the server. In this Nugget, we learn to configure various options on the SSH server.
37. SSH Keys (9 min)
SSH Keys add a layer of security to the secure shell system by ensuring the users connecting and the servers they are connecting to are who they claim to be (SSH aims to prevent man-in-the-middle attacks). In this Nugget, we learn to use SSH keys.
38. Security Tools (10 min)
Linux includes tools for detecting and preventing security issues on your server. In this Nugget, we learn how to test our security and help prevent unwanted attacks.
39. OpenVPN (8 min)
OpenVPN provides point-to-point or site-to-site encrypted connections. In this Nugget, we learn to configure OpenVPN.
"Premium links are not allowed on the forum."file/9e033051/csot1.LLPILPIC2Exam202.tut2u.part1.rar
"Premium links are not allowed on the forum."file/0ofxjpzb/csot1.LLPILPIC2Exam202.tut2u.part2.rar
"Premium links are not allowed on the forum."file/2rn7owyc/csot1.LLPILPIC2Exam202by1file.tut2u.part1.rar
"Premium links are not allowed on the forum."file/49dsqkmn/csot1.LLPILPIC2Exam202by1file.tut2u.part2.rar