Network administrator must master the knowledge

xiaoxiao2021-03-06  15

Learning Content:

Part 1: Computer structure and working principle, performance parameters of various spare parts and mainstream brands, computer hardware assembly, CMOS settings, hard disk partition, formatting, Windows98 / 2000 / XP installation, hardware drivers and applications Install, Windows Registry, Backup, and Applications, Windows Nuclear: CPU, Memory, Hard Disk, etc. Phenomenon and resolution, correctly resolve market fakes, parallel, hardware and software products sales skills. Part II: Basic composition, development and topological design of the network, the construction and implementation of 10BASE-T LAN, and the structure and characteristics of various servers, the Ethernet is equally connected to the network. TCP / IP's four-layer model and the OSI seven-layer model, TCP / IP protocol profile, how to set IP addresses, subnet masks, default gateways, distinguished subnets and network segments, hubs, switches, and routers, RJ45 network cable production And the assembly and maintenance of Internet cafes, NT, Win2000 Server, Linux server construction, 98 peer networking and debugging and proxy settings Part III: WIN2000 configuration, user, and permissions, file and folder management, new features The management and group strategy of the active directory. The monitoring of network resources, the setting of the system environment, and the management of disk systems. Installation configuration and management of Web, FTP, DNS, DHCP, WINS. Using Exchange Mail Server Software to implement an internal personal mail mailbox server, bulletin server, website send and receive email servers, chat servers, and management. The creation of databases in SQL Server, creation, and release of the table, the database's backup and recovery, the import and export of the table, and the export, etc. Basic principle of proxy servers. Use Microsoft Proxy as an example to implement the setup and management of the proxy server. Part IV: The Basic Principle of Proxy Server. Use Microsoft Proxy as an example to implement the setup and management of the proxy server. The configuration, use, and management skills of the popular network management software Cisco Work2000 are managed on a monitoring computer, and all routers and switches in the network are managed in real time, monitor network traffic in real time, and find network problems in time. Routing and Switching Technology: The routing principle explanation, and through the learning of the router configuration instance to master the common configuration commands and configurations of the Cisco router. Solution to the principle of exchange, by learning the common configuration command and configuration of the switch for the switch configuration instance. Part 5: System for manual customization, system performance detection management, kernel settings and compilation. FTP services and Samba services, other services, such as DHCP, NFS, etc. Web network service. Includes: Apache service configuration and security settings. Introduction of other Web service software. DNS technology and application. Some simple routing technologies are simple to load balancing technology. Mail network service. Includes: Sendmail configuration and use, QMAIL configuration and use. Some MAIL client programs use the sixth part: Basic outlines of network security, introduction of network protocols, basic knowledge of routine encryption, basic knowledge and digital signature of public key key encryption, identity, and PGP and digital certificates Encrypted experiments, comprehensively describe network security countermeasures, various vulnerabilities, attack types, and defense methods and security configuration schemes (system security, IE security, Outlook security). Combined with the hacker attack process fully describes the implementation of network security countermeasures in a WindowsNT environment. Various vulnerabilities, attack types, and defense methods and security configuration solutions under WindowsNT, comprehensively describe the implementation of network security countermeasures in the Windows2000 environment, the log security of the Windows system, the implementation of Web Security, and Software Firewalls.

Various vulnerabilities, attack types, and defense methods and security configuration schemes under Windows 201 00. Part 7: Linux administrator part, basic application 1, GNU / Linux, redhat linux installation. 2, system knowledge (Shell, File System, Pipeline and Redirection, Process Concept), Common System Command Description (LS, CP, MKDIR, RM, VI, MAN, CHMOD, etc.) 3, basic system management (including: system startup process Introduction, disk management, user management, log viewing, TAR / GZ package, RPM package management, etc. Second, basic system services (including: graphics terminal, basic network service) (9 lessons) 1, graphics terminal (ie , X-WINDOW) configuration and use. Around KDE and / or GNOME, display the friendly interface of UNIX systems. 2, simple shell teaching method, environment variable 3, Linux IP network basic configuration (IP address, gateway , Name 4, Linux Configuration and Use (including FTP, DNS, Apache, Sendmail, Samba Basic Configuration). Introduction to Redhat-based setup and LinuxConf. Three, prerequisite (Background Course) 1, preface 2, advanced system management. Includes: system for handmade customization (inetd, service, ntsysv), system performance detection management (PS, TOP, TAIL, DMESG, / PROC). 3, kernel settings and compilation. Four , Advanced Network Applications 1, FTP Services, Samba Services, Other Services, DHCP, NFS, etc. 2, web services. Include: Apache service configuration and security settings. Other Web service software introduction. DNS technology and applications 3, some simple routing technology 4, some simple load balancing technology. 5, Mail network service. Includes: Sendmail configuration and use, QMAIL configuration and use. Some mail clients are used. Five, system network security 1. The theoretical and application of the filter firewall (NAT technology, kernel architecture, IPChains / iptable), other non-core firewall introductions. 2, system security. SSH configuration and use. Intrusion detection system and CheckPoint technology and application 3 The theory and application of VPN (virtual gateway). Includes: IPSec, PPTP, authentication, key exchange protocols, etc. Six, summarize mixing to build a secure network service system.

转载请注明原文地址:https://www.9cbs.com/read-46132.html

New Post(0)