Unix, Windows OS, Networks and Security
Documenting IT Infrastructure commands, concepts and terms that I learned through labs and courses from Google’s IT Professional course.
Unix and Windows
Operating Systems
- CLI and Unix bash
- List directories in GUI and CLI (ls, dir)
- Change directory (cd)
- Make directory (mkdir)
- Command history (history)
- Copying Files in Linux, Windows (cp/copy)
- Moving files in Linux, Windows (mv)
- Removing files in Linux, Windws (rm/del)
- Remove directory in Linux, Windows (rmdir)
- Display file contents (cat/more type)
- Modifying permissions of text files (chmod)
- Searching files (grep)
- Input, Output, Pipeline
- Create file
Users and Permissions
- Users, Administrators and Groups
- View User and Group Information
- Windows: VIew User and Group Information using CLI
- Linux: Users, Superuser
- Windows: Passwords
- Linux: Passwords
- Windows: Adding and Removing Users
- Linux: Adding and Removing Users
- Windows: File Permissions
- Windows ACL
- Linux: File Permissions
- Linux: Modifying Permissions
- Linux: SetUID, SetGID, StickyBit
- Windows: Create, Modify and Remove File and Folder Permissions
- Linux: Create, Modify and Remove File and Folder Permissions
Package and Software Management
- Windows: Software Packages
- Linux: Software Packages
- Windows: Archives
- Linux: Archives
- Windows: Package Dependencies
- Linux: Package Dependencies
- Windows: Package Manager
- Linux: Package Manager Apt
- Windows: Devices and Drivers
- Linux: Devices and Drivers
- Windows: Operating System Updates
- Linux: Operating System Updates
File Systems
- Disk Anatomy
- Windows: Disk Partitioning and Formatting a File System
- Windows: Mounting and Unmounting a Filesystem
- Linux: Disk Partitioning and Formatting a Filesystem
- Linux: Mounting and Unmounting a Filesystem
- Windows: Swap
- Linux: Swap
- Windows: Files
- Linux: Files
- Windows: Disk Usage
- Linux: Disk Usage
- Windows: File system repair
- Linux: File system repair
- Windows: Partition and Fomatting Disk Drive
- Linux: Partition and Fomatting Disk Drive
Process Management
- Programs and Processes
- Windows: Process Creation and Termination
- Linux: Process Creation and Termination
- Windows: Reading Process Information
- Linux: Reading Process Information
- Linux: Signals
- Windows: Managing Processes
- Linux: Managing Processes
- Windows: Resource Monitoring
- Linux: Resource Monitoring
Operating Systems
- REmote Connection and SSH
- Remote Connections in Windows
- Virtual Machines
- The Windows Even Viewer
- Linux logs
Software
- Coding
- Scripting
- Languages — High level language — Assembly language — Compiled language — Interpreted language
- Types of Software — Application Software — System Software — Firmware
- Software Versioning
System Administration
- Organizational Policies
- IT Infrastructure Services
- User and Hardware Provisioning
- Routine Maintenance
- Troubleshooting and Managing Issues
Network and Infrastructure Services
- Server Operating Systems
- Virtualization
- FTP, SFTP, TFTP
- NTP
- DNS
- DNS for Web Servers
- DNS for Internal Networks
- DHCP
Software and Platform Services
- Configuring Communication Services
- Configuring Email Services
- Configuring User Productivity Services
- Configuring Security Services
- Configuring Print Services
- Web Servers
- Database Server
Directory Services
- Directory Server
- Directory Services
- LDAP
- LDAP Authentication
- Kerberos
- Active Directory
- Managing Active Directory Users and Groups
- Managing Active Directory User Passwords
- Group Policy
- OpenLDAP
Data Recovery & Backups
- Data Recovery
- Backup Solutions
- Testing Backups
- Disaster Recovery Plan
- Post Mortem
IT Security
Security Threats
- The CIA Triad
- Malicious Software
- Malware
- Network Attacks
- Denial of Service
- Client Side Attacks
- Password Attacks
- Deceptive Attacks
Cyrptology
- Symmetric Cryptography
- Symmetric Encryption Algorithms
- Asymmetric Cryptography
- Asymetric Encryption Algorithms
- Public Key or Asymetric Encryption
- Hashing
- SHA1 Attacks
- Public Key Infrastructure
- PGP
- Securing Network Traffic
- Cryptographic Hardware
- Cryptographic Applications
- Create/inspect key pair, encrypt/decrypt and sign/verify using openssl
AAA Security
- Multifactor Authentication
- Certificates
- LDAP
- RADIUS
- Kerberos
- Single Sign-On
- Authorization and Access Control Methods
Secruing Networks
- Network Hardware Hardening
- Network Softwrae Hardening
- WEP Encryption
- Wireless Hardening
- Social Engineering
- Sniffing Network
- Wireshark and tcpdump
- Intrustion Detection/Prevention systems
Security Defense
- Network Monitoring
- Firewall
- Logging and Auditing
- Disk Encryption
- Antimalware Protection
- Disk Encryption
- Software Patch Management
Creating a Company Culture for Security
- Security Policies
- Privacy Policies
- User Habits
- Third Party Security
- Security Training
- Incident Reporting and Analysis
- Incident Response and Recovery
- Incident Handling
Computer Networking
Physical layer
- Network Devices — Cables — Hubs and Switches
- Line Coding
- Twisted pair cabling
- Duplex and Simplex communication
- Network Ports
Data link layer
- Ethernet
- MAC Address
- Hexadecimal and Octet
- Unicast, Multicast, Broadcast
- Ethernet Frame
Network layer
- IP Addresses
- IP Datagram and Encapsulation
- IP Address Classes
- Address Resolution Protocol
- Looking up IP Addresses
- Sergio Path
- Subnetting
- Subnet Masks
- Binary Math
- Routing Concepts
- Routing Tables
- Interior Gateway Protocols
- Exterior Gateway Protocols
- Routing Protocols
- Non Routale Address Space
- RFCs and Standards
Transport Layer
- Dissection of a TCP Segment
- TCP Control Flags and Three way Handshake
- TCP Socket States
- Connection oriented and Connectionless Protocols
- System Ports versus Ephemeral Ports
- Firewalls
Application Layer
- The Application Layer and the OSI Model
- Layers working in Unison
Networking Services
- Name Resolution
- DNS and UDP
- Resource Record Types
- Anatomy of a Domain Name
- DNS Zones
- DHCP
- Dynamic Host Configuration Protocol
- Basics of NAT
- NAT and the Transport Layer
- NAT, Non-Routable Address Space and the Limits of IPv4
- IPv4 Address Exhaustion
- Virtual Private Networks
- Proxy Services
- VPNs
- Proxies
Connecting to the Internet
- Dialup, Modems and Point to Point Protocols
- Broadband
- T-Carrier Technologies
- Digital Subscriber Lines
- Cable Broadband
- Fiber Connections
- Broadband Protocols
- Broadband Internet
- WAN Protocols
- Point to Point VPNs
Wireless Networking Technologies
- Wireless Network Configurations
- Wireless Channels
- Wireless Security
- Cellular Networking
Troubleshooting Networks
- Ping
- Internet Control Message Protocol (ICMP)
- Traceroute
- Testing port connectivity
- Name resolution
- Public DNS Servers
- DNS Registration and Expiration
- Host file
- Cloud Computing
- Everything as a Service
- Cloud Storage
- IPv6 Addressing and Subnetting
- IPv6 Headers
- IPv4 Harmony