BSD Newsletter.com
Front
|
Info
|
Lists
|
Newsfeeds
|
Study Guide
|
What is BSD?
Advertisement:
The OpenBSD PF Packet Filter Book: PF for NetBSD, FreeBSD, DragonFly and OpenBSD
BSD Links
·
New Links
·
Advocacy
·
Drivers
·
Events
·
Flavours
·
FAQs
·
Guides
·
Programming
·
Security
·
Software
·
User Groups
This is the BSDA Study Guide Book written via a
wiki
collaboration.
Chapter Introduction
Chapter Installing and Upgrading the OS and Software
Recognize the installation program used by each operating system
Recognize which commands are available for upgrading the operating system
Understand the difference between a pre-compiled binary and compiling from source
Understand when it is preferable to install a pre-compiled binary and how to do so
Recognize the available methods for compiling a customized binary
Determine what software is installed on a system
Determine which software requires upgrading
Upgrade installed software
Determine which software have outstanding security advisories
Follow the instructions in a security advisory to apply a security patch
Chapter Securing the Operating System
Determine the system's security level
Recognize basic recommended access methods
Configure an SSH server according to a set of requirements
Configure an SSH server to use a key pair for authentication
Preserve existing SSH host keys during a system upgrade
Recognize alternate authentication mechanisms
Recognize alternate authorization schemes
Recognize BSD firewalls and rulesets
Recognize the BSD utilities that shape traffic or control bandwidth
Recognize BSD mechanisms for encrypting devices
Recognize methods for verifying the validity of binaries
Recognize the BSD methods for restraining a service
Modify the system banner
Chapter Files, Filesystems and Disks
Mount or unmount local filesystems
Configure data to be available through NFS
Determine which filesystems are currently mounted and which will be mounted at system boot
Determine disk capacity and which files are consuming the most disk space
Create and view symbolic or hard links
View and modify ACLs
View file permissions and modify them using either symbolic or octal mode
Modify a file's owner or group
Backup and restore a specified set of files and directories to local disk or tape
Backup and restore a file system
Determine the directory structure of a system
Manually run the file system checker and repair tool
View and modify file flags
Monitor the virtual memory system
Chapter Users and Accounts Management
Protect authentication data
Create, modify and remove user accounts
Create a system account
Control which files are copied to a new user's home directory during account creation
Change a password
Change the encryption algorithm used to encrypt the password database
Change a user's default shell
Lock a user account or reset a locked user account
Determine identity and group membership
Determine who is currently on the system or the last time a user was on the system
Enable accounting and view system usage statistics
Chapter Basic System Administration
Determine which process are consuming the most CPU
View and send signals to active processes
Use an rc(8) script to determine if a service is running and start, restart or stop it as required
Configure a service to start at boot time
View and configure system hardware
View, load, or unload a kernel module
Modify a kernel parameter on the fly
View the status of a software RAID mirror or stripe
Configure system logging
Configure log rotations
Review log files to troubleshoot and monitor system behavior
Determine which MTA is being used on the system
Create or modify email aliases for Sendmail or Postfix
View the Sendmail or Postfix mail queue
Read mail on the local system
Understand basic printer troubleshooting
Halt, reboot, or bring the system to single-user mode
Recognize the difference between hard and soft limits and modify existing resource limits
Recognize common, possibly third-party, server configuration files
Configure the scripts that run periodically to perform various system maintenance tasks
Determine the last system boot time and the workload on the system
Monitor disk input--output
Deal with busy devices
Determine information regarding the operating system
Understand the advantages of using a BSD license
Chapter Network Administration
Determine the current TCP--IP settings on a system
Set a system's TCP--IP settings
Determine which TCP or UDP ports are open on a system
Verify the availability of a TCP--IP service
Query a DNS server
Determine who is responsible for a DNS zone
Change the order of name resolution
Convert a subnet mask between dotted decimal, hexadecimal or CIDR notation
Gather information using an IP address and subnet mask
Understand IPv6 address theory
Demonstrate basic tcpdump(1) skills
Manipulate ARP and neighbor discovery caches
Configure a system to use NTP
View and renew a DHCP lease
Recognize when and how to set or remove an interface alias
Chapter Basic Unix Skills
Demonstrate proficiency in using redirection, pipes and tees
Recognize, view and modify environmental variables
Be familiar with the vi(1) editor
Determine if a file is a binary, text, or data file
Locate files and binaries on a system
Overcome command line length limitations
Find a file with a given set of attributes
Create a simple Bourne shell script
Find appropriate documentation
Recognize the different sections of the manual
Verify a file's message digest fingerprint (checksum)
Demonstrate familiarity with the default shell
Use job control
Demonstrate proficiency with regular expressions
Understand various "domain" contexts
Configure an action to be scheduled by cron(8)
Front
|
Information
|
Lists
|
Newsfeeds