Duration 5 Days 30 CPD hours This course is intended for network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio This training combines the following classes into one five day workshop, preparing you for the ACCP certification: ACF-Aruba ClearPass Fundamentals IAC-Implementing Aruba ClearPass Overview Ability to setup ClearPass as a AAA server Demostrate Configuration Guest, Ongurad, Onboard and Profiling features Integrate with External AD Server Understand Monitoring and Reporting Demostrate Scaling and deployment of best practices It prepares participants with foundational skills in Network Access Control using the ClearPass product portfolio. This 5-day classroom session includes both modules and labs to teach participants about the major features of the ClearPass portfolio Intro to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard ClearPass for AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles Authentication and Security Concepts Authentication Types Servers Radius COA Active Directory Certificates Intro to NAD NAD Devices Adding NAD to ClearPass Network Device Groups Network Device Attributes Aruba Controller as NAD Aruba Switch Aruba Instant Monitoring and Troubleshooting Monitoring Troubleshooting Logging Policy Simulation ClearPass Insight Insight Dashboard Insight Reports Insight Alerts Insight Search Insight Administration Insight Replication Active Directory Adding AD as Auth Source Joining AD domain Using AD services External Authentication Multiple AD domains LDAP Static Host Lists SQL Database External Radius Server Guest Guest Account creation Web Login pages Guest Service configuration Self-registration pages Configuring NADS for Guest Guest Manager Deep Dive Web Login Deep Dive Sponsor Approval MAC Caching Onboard Intro to Onboard Basic Onboard Setup Onboard Deepdive Single SSID Onboarding Dual SSID Onboarding Profiling Intro to Profiling Endpoint Analysis Deep Dive Posture Intro to Posture Posture Deployment Options OnGuard Agent Health Collection OnGuard workflow 802.1x with Posture using Persistent/dissolvable agent OnGuard web LoginMonitoring and Updates Operation and Admin Users Operations Admin Users Clustering and Redundancy Clustering Redundancy LAB Licensing ClearPass Licensing Base License Applications Single Sign-On Deployment Options ClearPass Admin Login SSO Access Network SSO ASO-Auto-Sign On Configuration and Demo ClearPass Exchange Intro Examples General HTTP Palo Alto Firewall Configuration Case Study Objectives Discussion Advanced Labs Overview
If you are struggling with your computer and don't know how to maintain its usability, then your business will inevitably be affected. The reason could simply be a virus. A virus will work as a component that will constitute harm to your hard disk or will meddle with the normal operational executions of the computer. Thus, it will make the computer be not able capacity appropriately until the virus is deleted and your computer is upgraded and rebooted. Having a virus on a computer is a nuisance since it will meddle with your files, programs and everything they can in the computer. Viruses are regularly checked, and computers are updated to avoid these to happen and lessen its hindering impacts to your business. There is no sound approach to distinguish how a virus truly attacks and spreads or how it is distributed without you knowing but a considerable counter preventive measure is needed to put into how to guarantee the harm done is not as big as it is expected it is. Who is the course for? Employees of the business industry and other businessmen who want to learn how to solve the virus issues of their computers. People who have an interest in Computers and how to save themselves from viruses and how to effectively communicate with their potential clients through the web. Entry Requirement: This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of technology, numeracy and ICT are required to attend this course. Assessment: At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After you have successfully passed the test, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. PDF certificate's turnaround time is 24 hours and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path: Understanding Computer Virus course will be very beneficial and helpful, especially to the following careers: Businessman Computer Technician Computer Engineers Marketing Managers Product Creators Programmers Sales Managers Sales and Promotions Specialists Top Executives Website Developer. Understanding Computer Virus What Is A Computer Virus? 01:00:00 How Are Viruses Spread? 01:00:00 How Bad Can A Virus Attack Be? 01:00:00 What Is A Malware? 01:00:00 Getting The Right Anti-Virus For Pc 01:00:00 Removing The Computer Virus Automatically 01:00:00 Deleting The Computer Virus Manually 01:00:00 Enhance Security With A firewall 01:00:00 Tips For Protecting Your Computer From Viruses 01:00:00 How To Identify A Dangerous Website 01:00:00 Wrapping Up 00:15:00 Mock Exam Mock Exam- Understanding Computer Virus 00:20:00 Final Exam Final Exam- Understanding Computer Virus 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, Monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MR/MS/MV devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MR Access Points Monitor Meraki Network Health Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MR Access Points. Students will also learn how to configure the Meraki Dashboard, troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki MX Security Appliances Overview Meraki SD-WAN Overview Meraki MR Wireless Access Points Overview Cisco Meraki Systems Manager Overview Cisco Meraki MV Vision Security Cameras Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki MR Wireless Meraki MR Wireless Overview Meraki 2.5G Multigigabit (MGig) Wireless Meraki Mesh Routing Meraki?s solution for RF Environments Securing Guest Wireless Bluetooth Integrated Analytics Meraki Location Heatmap High Density Wireless Zero-Touch Provisioning for Wireless Dedicated Scanning Radio for Rouges and Interference Mounting indoor and Outdoor Antennas Meraki MR Licensing IEEE 802.11 Wireless LAN Standards Site Survey & Design for ensuring connectivity and user experience Meraki AP Models Overview Configuring Meraki APs Configuring SSIDs Firewall & Traffic Shaping Configuration for Wireless Monitoring Meraki APs Trouble Shooting
How many times you had to take your computer to a local repair shop only to be stuck without it for months, and then get socked with a very high bill for the services? Stop with this craziness and learn to clean up and remove viruses, malware, spyware and a multitude of other harmful variants that slow and limit your productivity as well as your computer. As its title seems to suggest, a virus is indeed a very damaging element which is certainly capable of causing enough damage to a system to render it helpless, at least for a time. This course will acquaint you with a basic understanding of infections and the vocabulary related to viruses that are found on your personal computer. It will also walk you through the complete removal process with all advantages covered in this course. Course Highlights PC Security: Perfectly Know the Computer Virus is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed PC Security: Perfectly Know the Computer Virus into 11 modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 10 hours, 15 minutes and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose PC Security: Perfectly Know the Computer Virus Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? PC Security: Perfectly Know the Computer Virus is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our PC Security: Perfectly Know the Computer Virus is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. What Is A Computer Virus? 01:00:00 How Are Viruses Spread? 01:00:00 How Bad Can A Virus Attack Be? 01:00:00 What Is A Malware? 01:00:00 Getting The Right Anti-Virus For Pc 01:00:00 Removing The Computer Virus Automatically 01:00:00 Deleting The Computer Virus Manually 01:00:00 Enhance Security With A firewall 01:00:00 Tips For Protecting Your Computer From Viruses 01:00:00 How To Identify A Dangerous Website 01:00:00 Wrapping Up 00:15:00 Mock Exam Final Exam
Description: The 70-410 - Installing and Configuring Windows Server 2012 R2 (MCSA/MCSE) course teaches you how to install and configure Windows Server 2012 R2. You will learn the basics of the server, server 2012 management, working with server core, and PowerShell examples for user management. Throughout the course, you will learn the system of configuring local storage. The method of file shares and permissions and configure print and document services will also be taught in the course. Apart from these, you will able to know about remote management and virtualization. The course also includes discussion on the components of network infrastructure, TCP/IP diagnostics and IPv6 over IPv4 tunneling. Finally, you will learn about the DHCP, DNS, Active Directory domain services and Windows security. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? 70-410 - Installing and Configuring Windows Server 2012 R2 (MCSA/MCSE) training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our 70-410 - Installing and Configuring Windows Server 2012 R2 (MCSA/MCSE) training course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Server 2012 Overview On Premise vs Cloud FREE 00:30:00 Windows Server Installation 00:09:00 Windows Activation 00:15:00 Windows Server 2012 Management Server Manager 00:22:00 Working with Server Core Introduction to PowerShell 00:33:00 PowerShell Examples for User Management 00:12:00 Configuring Local Storage Key Features of Storage 00:45:00 Configure Basic Disks 00:19:00 Configure File and Print Access File Shares and Permissions 00:25:00 Configure Print and Document Services 00:10:00 Remote Management and Virtualization Remote Management 00:22:00 Virtualization 00:26:00 Differencing Disks 00:18:00 TCP/IP Protocol Suite Components of Network Infrastructure 00:52:00 TCP_IP Diagnostics 00:51:00 IPv6 Over IPv4 Tunneling 00:08:00 DHCP and DNS DNS 00:41:00 DHCP 00:22:00 Overview of Active Directory Domain Services Physical Components of Active Directory 00:59:00 Operations Master Roles 00:29:00 The AD DS Logon Process 00:13:00 User Accounts 00:50:00 Computer Accounts 00:22:00 Windows Security Windows Security 00:18:00 Group Policy 00:21:00 Software Restriction Policies 00:04:00 Windows Firewall 00:09:00 Mock Exam Mock Exam- 70-410 - Installing and Configuring Windows Server 2012 R2 (MCSA/MCSE) 00:20:00 Final Exam Final Exam- 70-410 - Installing and Configuring Windows Server 2012 R2 (MCSA/MCSE) 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: IT Staff and Managers Network and systems personnel and engineers Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment. This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics. Overview Following completion of this course, students will understand, Install, Configure, monitor, and Troubleshoot the following: Navigate and Configure the dashboard Add MX/MR/MS/MV devices to the Dashboard Understand and Configure Configuration Templates Understand and Configure Group Policies Manage/Configure/Integrate Users and Radius Policies Configure, Monitor, and Troubleshoot MX Firewalls Troubleshoot devices and Connectivity This 3-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MX Firewalls. Students will also learn how to configure the Meraki Dashboard Students will troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise. Introduction to Meraki The Meraki Mission Cisco Meraki: Bringing the Cloud to Enterprise Networks Cloud-Managed Networking Architecture Benefits of a Cloud-Based Solution The Meraki Full Stack: New and Unique Value Proposition Meraki Deployment ? How it works Why Customers Choose Meraki Meraki MS Switches Overview Meraki MX Security Appliances Overview Meraki SD-WAN Overview Meraki MR Wireless Access Points Overview Cisco Meraki Systems Manager Overview Cisco Meraki MV Vision Security Cameras Overview Meraki API Overview Meraki Licensing Enterprise Support Cisco Meraki Documentation Cloud Management with the Meraki Dashboard The Meraki Dashboard Dashboard: Organizational Structure Out-of-band Cloud Management Loss of Connectivity to the Cisco Meraki Cloud Meraki Dashboard Logins Create Dashboard Accounts and Organization MSP Logins - Manage Multiple Organizations Modify an Organization View Organizations Health Meraki Dashboard Best Practices Dashboard Search Meraki Help Organizational Wide Settings Configure Monitor Create and Manage Configuration Templates Network-Wide Settings Configure Meraki MX Security Benefits of a Cloud Managed Security Solution Threat Management Solution Advanced Security Licenses Reliable, Cost Effective Connectivity with Meraki SD-WAN Site-to-Site VPN (Auto VPN) High Availability and Path Redundancy Application-Aware Intelligent Path Control Traffic Monitoring and Analytics Integrating Active Directory Cisco Meraki MX Models and Features Configuring the Local Status Page Adding Appliance to Network Device Configuration Configuring the Warm Spare Feature Device Tags & Notes Configuring Addressing & VLANs DHCP Server Configuration and Options Meraki Firewall Configuration Meraki Site-to-Site VPN One Arm VPN Concentrator Configuration Meraki Client VPN Meraki Active Directory Integration Meraki Access Control Meraki Splash Page Configuration Configuring Access Policies Teleworker VPN/L3 Roaming
Duration 5 Days 30 CPD hours This course is intended for Practiced Linux system administrators who currently manage Linux servers at the enterprise level - Skilled Linux system administrators who who want or are required to demonstrate competencies by earning the RHCSA This course is designed for experienced Linux System Administrators who want to harden their technical skill sets and become accredited with the RHCSA certification. Accessing the command line Log in to a Linux system and run simple commands using the shell. Managing Files from the command line Work with files from the bash shell prompt. Managing local Linux users and groups Manage Linux users and groups and administer local password policies. Controlling access to files with Linux file system permissions Set access permissions on files and interpret the security effects of different permission settings. Managing SELinux security Use SELinux to manage access to files and interpret and troubleshoot SELinux security effects. Monitoring and managing Linux processes Monitor and control processes running on the system. Installing and updating software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. Controlling services and daemons Control and monitor network services and system daemons using systemd. Managing Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. Analyzing and storing logs Locate and interpret relevant system log files for troubleshooting purposes. Managing storage and file systems Create and use disk partitions, logical volumes, file systems, and swap spaces. Scheduling system tasks Schedule recurring system tasks using cron and systemd timer units. Mounting network file systems Mount network file system (NFS) exports and server message block (SMB) shares from network file servers. Limiting network communication with firewalld Configure a basic local firewall. Additional course details: Nexus Humans Enterprise Linux System Admin Fast Track with Exam Prep training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Enterprise Linux System Admin Fast Track with Exam Prep course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
ð Unlock the Power of Network Security on an Ubuntu Linux Server! ð Are you ready to safeguard your digital fortress? Dive into the world of Network Security with our comprehensive online course tailored specifically for Ubuntu Linux Server users! ð¡ï¸ What You'll Learn: Master the fundamentals of network security protocols and practices. Implement robust firewall configurations on your Ubuntu Linux Server. Discover advanced encryption techniques to secure your data transmission. Harden your server against cyber threats and unauthorized access. Learn best practices for intrusion detection and prevention. Explore real-world scenarios and case studies for hands-on learning. ð¨âð» Who Is This Course For? IT professionals seeking to enhance their network security skills. System administrators responsible for securing Ubuntu Linux Servers. Beginners eager to delve into the world of cybersecurity on Linux systems. ð Why Choose Our Course? Expert-led tutorials designed for all skill levels. Practical demonstrations and step-by-step guidance. Access to a supportive online community and forums. Updated content reflecting the latest industry standards. Lifetime access to course materials for continuous learning. ð Take control of your server's security and fortify your knowledge in Ubuntu Linux network security! Enroll now and fortify your digital defenses today! Course Curriculum Module 1- Secure an Ubuntu Linux Server from Hackers Today! Secure an Ubuntu Linux Server from Hackers Today! 00:00 Module 2- Choosing a server host and setup Choosing a server host and setup 00:00 Module 3- Accessing the Ubuntu Linux server with putty Accessing the Ubuntu Linux server with putty 00:00 Module 4- How to download Putty for Windows How to download Putty for Windows 00:00 Module 5- Using a password manager like LastPass Using a password manager like LastPass 00:00 Module 6- Changing the password with passwd Changing the password with passwd 00:00 Module 7- Adding a new user with adduser Adding a new user with adduser 00:00 Module 8- Signing in with the added user Signing in with the added user 00:00 Module 9- Usermod to give the user sudo or root privileges Usermod to give the user sudo or root privileges 00:00 Module 10- Verify sudo access on user Verify sudo access on user 00:00 Module 11- Key basic Linux commands cd pwd and ls Key basic Linux commands cd pwd and ls 00:00 Module 12- Updating with apt-get update Draft Lesson 00:00 Module 13- Installing nano text editor Installing nano text editor 00:00 Module 14- Updating sshd_config with nano to PermitRootLogin no Updating sshd_config with nano to PermitRootLogin no 00:00 Module 15- Changing the SSH port from 22 to another number Changing the SSH port from 22 to another number 00:00 Module 16- Setting up RSA login by generating keys with puttygen Setting up RSA login by generating keys with puttygen 00:00 Module 17- Disabling password logins and ipv6 listening Disabling password logins and ipv6 listening 00:00 Module 18- Locked out of server and have to start over! Locked out of server and have to start over! 00:00 Module 19- Back in with a fresh install! Back in with a fresh install! 00:00 Module 20- Installing fail2ban to block IPs from repeated failed logins Installing fail2ban to block IPs from repeated failed logins 00:00 Module 21- Install UFW or Uniform Fire Wall to block some DDOS attacks and hacking attempts Install UFW or Uniform Fire Wall to block some DDOS attacks and hacking attempts 00:00 Module 22- Install and configure ntp to sync time Install and configure ntp to sync time 00:00 Module 23- Thank you very much for watching this complete Ubuntu Linux server security setup tutorial Thank you very much for watching this complete Ubuntu Linux server security setup tutorial 00:00
Duration 4 Days 24 CPD hours This course is intended for #NAME? Overview At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. If you are an experienced Linux© system administrator and hold a Red Hat Certified System Administrator (RHCSA©) credential or possess equivalent skills and want to broaden your ability to administer Linux systems at an enterprise level, this is the perfect course.The course will empower you to deploy and manage network servers running caching domain name service (DNS), MariaDB, Apache HTTPD, Postfix SMTP null clients, network file sharing with network file system (NFS) and server message block (SMB), iSCSI initiators and targets, advanced networking and firewall configurations, and to use bash shell scripting to help automate, configure, and troubleshoot your system. Through lectures and hands-on labs, you will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE) exam (EX300), supplementing what you have already learned in earning your RHCSA credential.This course is based on Red Hat© Enterprise Linux 7. Getting Started with the Classroom Environment Given a virtualized environment, begin to administrate multiple systems using prerequisite skills Enhance User Security Configure system to use Kerberos to verify credentials and grant privileges via sudo Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based tools File Security with GnuPG Secure files with GnuPG. Software Management Use yum plugins to manage packages and understand the design of packages to build a simple package Network Monitoring Profile running services then capture and analyze network traffic Route Network Traffic Configure system to route traffic and customize network parameters with sysctl Secure Network Traffic Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) NTP Server Configuration Configure an NTP server Filesystems and Logs Manage local file system integrity, monitor system over time, and system logging Centralized and Secure Storage Access centralized storage (iSCSI) and encrypt filesystems SSL-encapsulated Web Services Understand SSL certificates and deploy an SSL encapsulated web service Web Server Additional Configuration Configure web server with virtual hosts, dynamic content, and authenticated directories Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail, smarthost relay) Caching-Only DNS Server Understand DNS resource records and configure a caching-only name server File Sharing with NFS Configure file sharing between hosts with NFS File Sharing with CIFS Configure file and print sharing between hosts with CIFS File Sharing with FTP Configure file sharing with anonymous FTP Troubleshooting Boot Process Understand the boot process and recover unbootable systems with rescue mode