Unix, Windows OS, Networks and Security

Documenting IT Infrastructure commands, concepts and terms that I learned through labs and courses from Google’s IT Professional course.

Unix and Windows

Operating Systems

  • CLI and Unix bash
  • List directories in GUI and CLI (ls, dir)
  • Change directory (cd)
  • Make directory (mkdir)
  • Command history (history)
  • Copying Files in Linux, Windows (cp/copy)
  • Moving files in Linux, Windows (mv)
  • Removing files in Linux, Windws (rm/del)
  • Remove directory in Linux, Windows (rmdir)
  • Display file contents (cat/more type)
  • Modifying permissions of text files (chmod)
  • Searching files (grep)
  • Input, Output, Pipeline
  • Create file

Users and Permissions

  • Users, Administrators and Groups
  • View User and Group Information
  • Windows: VIew User and Group Information using CLI
  • Linux: Users, Superuser
  • Windows: Passwords
  • Linux: Passwords
  • Windows: Adding and Removing Users
  • Linux: Adding and Removing Users
  • Windows: File Permissions
  • Windows ACL
  • Linux: File Permissions
  • Linux: Modifying Permissions
  • Linux: SetUID, SetGID, StickyBit
  • Windows: Create, Modify and Remove File and Folder Permissions
  • Linux: Create, Modify and Remove File and Folder Permissions

Package and Software Management

  • Windows: Software Packages
  • Linux: Software Packages
  • Windows: Archives
  • Linux: Archives
  • Windows: Package Dependencies
  • Linux: Package Dependencies
  • Windows: Package Manager
  • Linux: Package Manager Apt
  • Windows: Devices and Drivers
  • Linux: Devices and Drivers
  • Windows: Operating System Updates
  • Linux: Operating System Updates

File Systems

  • Disk Anatomy
  • Windows: Disk Partitioning and Formatting a File System
  • Windows: Mounting and Unmounting a Filesystem
  • Linux: Disk Partitioning and Formatting a Filesystem
  • Linux: Mounting and Unmounting a Filesystem
  • Windows: Swap
  • Linux: Swap
  • Windows: Files
  • Linux: Files
  • Windows: Disk Usage
  • Linux: Disk Usage
  • Windows: File system repair
  • Linux: File system repair
  • Windows: Partition and Fomatting Disk Drive
  • Linux: Partition and Fomatting Disk Drive

Process Management

  • Programs and Processes
  • Windows: Process Creation and Termination
  • Linux: Process Creation and Termination
  • Windows: Reading Process Information
  • Linux: Reading Process Information
  • Linux: Signals
  • Windows: Managing Processes
  • Linux: Managing Processes
  • Windows: Resource Monitoring
  • Linux: Resource Monitoring

Operating Systems

  • REmote Connection and SSH
  • Remote Connections in Windows
  • Virtual Machines
  • The Windows Even Viewer
  • Linux logs

Software

  • Coding
  • Scripting
  • Languages — High level language — Assembly language — Compiled language — Interpreted language
  • Types of Software — Application Software — System Software — Firmware
  • Software Versioning

System Administration

  • Organizational Policies
  • IT Infrastructure Services
  • User and Hardware Provisioning
  • Routine Maintenance
  • Troubleshooting and Managing Issues

Network and Infrastructure Services

  • Server Operating Systems
  • Virtualization
  • FTP, SFTP, TFTP
  • NTP
  • DNS
  • DNS for Web Servers
  • DNS for Internal Networks
  • DHCP

Software and Platform Services

  • Configuring Communication Services
  • Configuring Email Services
  • Configuring User Productivity Services
  • Configuring Security Services
  • Configuring Print Services
  • Web Servers
  • Database Server

Directory Services

  • Directory Server
  • Directory Services
  • LDAP
  • LDAP Authentication
  • Kerberos
  • Active Directory
  • Managing Active Directory Users and Groups
  • Managing Active Directory User Passwords
  • Group Policy
  • OpenLDAP

Data Recovery & Backups

  • Data Recovery
  • Backup Solutions
  • Testing Backups
  • Disaster Recovery Plan
  • Post Mortem

IT Security

Security Threats

  • The CIA Triad
  • Malicious Software
  • Malware
  • Network Attacks
  • Denial of Service
  • Client Side Attacks
  • Password Attacks
  • Deceptive Attacks

Cyrptology

  • Symmetric Cryptography
  • Symmetric Encryption Algorithms
  • Asymmetric Cryptography
  • Asymetric Encryption Algorithms
  • Public Key or Asymetric Encryption
  • Hashing
  • SHA1 Attacks
  • Public Key Infrastructure
  • PGP
  • Securing Network Traffic
  • Cryptographic Hardware
  • Cryptographic Applications
  • Create/inspect key pair, encrypt/decrypt and sign/verify using openssl

AAA Security

  • Multifactor Authentication
  • Certificates
  • LDAP
  • RADIUS
  • Kerberos
  • Single Sign-On
  • Authorization and Access Control Methods

Secruing Networks

  • Network Hardware Hardening
  • Network Softwrae Hardening
  • WEP Encryption
  • Wireless Hardening
  • Social Engineering
  • Sniffing Network
  • Wireshark and tcpdump
  • Intrustion Detection/Prevention systems

Security Defense

  • Network Monitoring
  • Firewall
  • Logging and Auditing
  • Disk Encryption
  • Antimalware Protection
  • Disk Encryption
  • Software Patch Management

Creating a Company Culture for Security

  • Security Policies
  • Privacy Policies
  • User Habits
  • Third Party Security
  • Security Training
  • Incident Reporting and Analysis
  • Incident Response and Recovery
  • Incident Handling

Computer Networking

Physical layer

  • Network Devices — Cables — Hubs and Switches
  • Line Coding
  • Twisted pair cabling
  • Duplex and Simplex communication
  • Network Ports

Data link layer

  • Ethernet
  • MAC Address
  • Hexadecimal and Octet
  • Unicast, Multicast, Broadcast
  • Ethernet Frame

Network layer

  • IP Addresses
  • IP Datagram and Encapsulation
  • IP Address Classes
  • Address Resolution Protocol
  • Looking up IP Addresses
  • Sergio Path
  • Subnetting
  • Subnet Masks
  • Binary Math
  • Routing Concepts
  • Routing Tables
  • Interior Gateway Protocols
  • Exterior Gateway Protocols
  • Routing Protocols
  • Non Routale Address Space
  • RFCs and Standards

Transport Layer

  • Dissection of a TCP Segment
  • TCP Control Flags and Three way Handshake
  • TCP Socket States
  • Connection oriented and Connectionless Protocols
  • System Ports versus Ephemeral Ports
  • Firewalls

Application Layer

  • The Application Layer and the OSI Model
  • Layers working in Unison

Networking Services

  • Name Resolution
  • DNS and UDP
  • Resource Record Types
  • Anatomy of a Domain Name
  • DNS Zones
  • DHCP
  • Dynamic Host Configuration Protocol
  • Basics of NAT
  • NAT and the Transport Layer
  • NAT, Non-Routable Address Space and the Limits of IPv4
  • IPv4 Address Exhaustion
  • Virtual Private Networks
  • Proxy Services
  • VPNs
  • Proxies

Connecting to the Internet

  • Dialup, Modems and Point to Point Protocols
  • Broadband
  • T-Carrier Technologies
  • Digital Subscriber Lines
  • Cable Broadband
  • Fiber Connections
  • Broadband Protocols
  • Broadband Internet
  • WAN Protocols
  • Point to Point VPNs

Wireless Networking Technologies

  • Wireless Network Configurations
  • Wireless Channels
  • Wireless Security
  • Cellular Networking

Troubleshooting Networks

  • Ping
  • Internet Control Message Protocol (ICMP)
  • Traceroute
  • Testing port connectivity
  • Name resolution
  • Public DNS Servers
  • DNS Registration and Expiration
  • Host file
  • Cloud Computing
  • Everything as a Service
  • Cloud Storage
  • IPv6 Addressing and Subnetting
  • IPv6 Headers
  • IPv4 Harmony