Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
Yonge
MANSFIELD
Balfour
Ahcc
Glauben
Shermany
Zimna
EXPANDED
Supersymmetry
Repenser
Kingreen
Fiddler
Forta
Germination
Giorgia
Glover
Grow
Hailey
Homesteading
Java
Kakerlakkene
Geschopfe
Dividends
Hatab
Anchorage
Rhineland
Praxisbeispielen
woodturning
KornShell
HOLM
Fische
Bergens
Florentine
Jewish
Shortening
poem
Shermans
商业企业
Beppes
Spanoudakis
Leachers
Matroid
Sadie
茶花女
Christiane
DVD5
Jagged
compa
Marmaromenos
Dealmaking
Newest
Technical Inside the SQL Server Query Optimizer
"Multiplexed Networks for Embedded Systems: CAN, LIN, Flexray, Safe-by-Wire..." by Dominique Paret (Repost)
Dino Esposito, "Building Web Solutions with ASP.Net and ADO.NET" (Repost)
Learning Core Audio: A Hands-On Guide to Audio Programming for Mac and iOS
Power Performance - Multimedia Storytelling for Journalism and Public Relations
pluralsight-training.net SQL Server: Transact-SQL Basic Data Retrieval [2012, ENG]
pluralsight-training.net SQL Server: Collecting and Analyzing Trace Data [2012, ENG]
Pluralsight.net - Introduction to Nancy-JWARE
Technical Structured Programming with C++
Technical Getting Started with LaTeX by David R. Wilkins
Windows A Third Window - Natural Life beyond Newton and Darwin
PLURALSIGHT.NET WINDOWS 8 METRO CONNECTED APPS-JGTiSO
PLURALSIGHT.NET WINDOWS 8 METRO APPLICATION DATA-JGTiSO
PLURALSIGHT.NET BUILDING WINDOWS 8 METRO APPS WITH C PLUS PLUS AND XAML-JGTiSO
PLURALSIGHT.NET BUILDING WINDOWS 8 METRO APPS WITH C SHARP AND XAML-JGTiSO
PLURALSIGHT.NET INTRODUCTION TO BUILDING WINDOWS 8 METRO APPLICATIONS-JGTiSO
Multimedia over IP and Wireless Networks - Compression, Networking, and Systems
Interactive Distributed Multimedia Systems and Telecommunication Services
The Art of Hardware Architecture - Design Methods and Techniques for Digital Circuits
Pro/ENGINEER WILDFIRE 5.0 Tutorial and MultiMedia CD
"Multiplexed Networks for Embedded Systems: CAN, LIN, Flexray, Safe-by-Wire..." by Dominique Paret (Repost)
Dino Esposito, "Building Web Solutions with ASP.Net and ADO.NET" (Repost)
Learning Core Audio: A Hands-On Guide to Audio Programming for Mac and iOS
Power Performance - Multimedia Storytelling for Journalism and Public Relations
pluralsight-training.net SQL Server: Transact-SQL Basic Data Retrieval [2012, ENG]
pluralsight-training.net SQL Server: Collecting and Analyzing Trace Data [2012, ENG]
Pluralsight.net - Introduction to Nancy-JWARE
Technical Structured Programming with C++
Technical Getting Started with LaTeX by David R. Wilkins
Windows A Third Window - Natural Life beyond Newton and Darwin
PLURALSIGHT.NET WINDOWS 8 METRO CONNECTED APPS-JGTiSO
PLURALSIGHT.NET WINDOWS 8 METRO APPLICATION DATA-JGTiSO
PLURALSIGHT.NET BUILDING WINDOWS 8 METRO APPS WITH C PLUS PLUS AND XAML-JGTiSO
PLURALSIGHT.NET BUILDING WINDOWS 8 METRO APPS WITH C SHARP AND XAML-JGTiSO
PLURALSIGHT.NET INTRODUCTION TO BUILDING WINDOWS 8 METRO APPLICATIONS-JGTiSO
Multimedia over IP and Wireless Networks - Compression, Networking, and Systems
Interactive Distributed Multimedia Systems and Telecommunication Services
The Art of Hardware Architecture - Design Methods and Techniques for Digital Circuits
Pro/ENGINEER WILDFIRE 5.0 Tutorial and MultiMedia CD
Useful Links
Technical LinuxCBT PAM Edition
Posted on 2010-04-11
|
Title: LinuxCBT PAM Edition
Description: LinuxCBT PAM Edition more info @smforum.net/viewtopic.php?f=41&t=6695 LinuxCBT PAM Edition encompasses: 1. Pluggable Authentication Modules (PAM) Security. LinuxCBT PAM Edition entails 6-hours, or ~1-day of classroom training. LinuxCBT PAM Edition prepares you or your organization for successfully securing GNU/Linux & Open Source-based solutions. Let LinuxCBT PAM Edition cost-effectively sharpen your PAM Security skills! Recommended Prerequisites for: * Any LinuxCBT Operating System Course (Classic/EL-4/SUSE/Debian Editions) o Open mind & determination to master Linux and related open-source applications o Basic understanding of networking concepts o Access to a PC to follow the exercises PAM Security - Module 1 * Introduction - Topology - Features o Discuss course outline o Explore system configuration o Explore network topology o Identify primary PAM systems o Enumerate and discuss key PAM features * * PAM Rules Files & Syntax o Identify key PAM configuration files o Explain the purpose of the /etc/pam.d/other PAM rules file o Discuss PAM\\\& 039;s 4 management tasks o Identify the 4 tokens supported within PAM rules files o Explain possible values for the 4 supported rules file tokens o Discuss PAM\\\& 039;s stacking of rules for the 4 management tasks o Examine the /etc/pam.d/sshd PAM rules file for the SSHD service/daemon o Explore the contents of included PAM rules files * * Common PAMs - Identify & Discuss Commonly Implemented PAMs o Explain the purpose and implementation of pam_echo o Test pam_echo using SSH o Explain the purpose and implementation of pam_warn o Explain the purpose and implementation of pam_deny o Identify instances of pam_warn and pam_deny modules o Explain the purpose and implementation of pam_unix2 o Identify instances of pam_unix2 module o Explain the purpose and implementation of pam_env o Explain the purpose and implementation of pam_ftp o Peruse /etc/pam.d/vsftpd and discuss the implemenation of pam_ftp o Explain the purpose and implementation of pam_lastlog o Explain the purpose and implementation of pam_limits o Explain the purpose and implementation of pam_listfile o Explain the purpose and implementation of pam_nologin * * Account Policies with PAM o Explain authentication flow when using PAM o Discuss account policies features o Identify and peruse the default account policies file: /etc/login.defs o Discus PAM\\\& 039;s usage of /etc/login.defs as it pertains to system security o Discuss pam_pwcheck is maintaining system policy o Configure pam_pwcheck to support minimum password length o Correlate pam_pwcheck system policy to user accounts database o Configure pam_pwcheck to support password history o Use chage to enumerate and change user accounts\\\& 039; attributes associated with system policy * * PAM Tally o Explain applications of pam_tally o Identify failed logins log file: /var/log/faillog o Identify PAM authentication messages in /var/log/messages o Compare and contrast pam_tally with faillog o Use pam_tally to display user\\\& 039;s tally o Enable pam_tally system-wide with desired policy o Fail to login multiple times, exceeding the system policy and evaluate results o Reset user\\\& 039;s login count using pam_tally and faillog o Redirect PAM log messages using Syslog-NG * * PAM Password Quality Check (pam_passwdqc) o Identify pam_passwdqc using RPM o Discuss features o Enumerate the supported password character classes - Complex passwords o Replace pam_pwcheck with pam_passwdqc using at least 2 character classes o Test password policy in non-enforcing mode o Evaluate the effects o Enable password policy in enforcing mode and evaluate o Alter character class and length (complexity) requirements and evaluate * * PAM Time - Time-based Access Control o Discuss features o Explain configuration file syntax o Impose restrictions on common services o Evaluate results * * PAM Nologin o Discuss features o Explain configuration file syntax o Implement nologin module via /etc/nologin o Evaluate results * * PAM Limits - System Resource Limits Controlled by PAM o Discuss features o Explain configuration file syntax o Impose restrictions on system resources o Evaluate results * * PAM Authentication with Apache o Discuss features and desired result o Install Apache and development modules providing apxs support o Download PAM Apache module o Compile and install PAM Apache module o Configure Apache web site to support PAM o Evaluate results Links "
Rating:
2.5 out of 5 by Book123 |
Download Links | |
Server | Status |
---|---|
Direct Download Link 1 | Alive |
Direct Download Link 2 | Alive |
Download Link Part 1 | Alive |
Download Link Part 2 | Alive |
Download Link Part 3 | Alive |
Buy This Book at Best Price >> |
Like this article?! Give us +1: