Learning Path: Linux: A to Z Linux Networking Concepts
3.3 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
42 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Learning Path: Linux: A to Z Linux Networking Concepts to your Wishlist.

Add to Wishlist

Learning Path: Linux: A to Z Linux Networking Concepts

Level up your Linux network administration skills by implementing a secure computer network
3.3 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
42 students enrolled
Created by Packt Publishing
Last updated 5/2017
Curiosity Sale
Current price: $10 Original price: $200 Discount: 95% off
30-Day Money-Back Guarantee
  • 4 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Setting up a physical network
  • Setting up an IPv6 tunnel via Hurricane Electric
  • Configure Samba as an Active Directory compatible directory service
  • Configuring WebDAV through Apache
  • Filter spam with SpamAssassin
  • Install ejabberd
  • Configure the Pidgin client
  • Detect systems on your network with NMAP
View Curriculum
  • You need to have prior experience of how a Linux machine operates.
  • You should be familiar with setting up a Linux server and how to install additional software.

Linux can be configured as a network workstation, a DNS server, a mail server, a firewall, a gateway router, and many other things. Network administration is one of the main tasks of a Linux administrator.

In this Video Learning Path, you will begin with configuring and deploying several network services including file, web, mail, and servers. You will then learn how to enable NAT on the router in order to allow Internet access from the network.

Going ahead, you will learn to configure Samba to centralize authentication for your network service and Linux client to leverage it for authentication.

You’ll also set up SMTP and IMAP mail services, and enable spam filtering. Then we’ll configure our own XMPP-based IM service, configure it to communicate with other XMPP services, and configure Pidgin as a client to utilize the service.

Finally, you will have a network with a number of services running on it, and will implement monitoring in order to detect problems as they occur.

By the end of this Video Learning Path, you will learn to build, maintain, and secure a computer network using Linux.

For this course, we have combined the best works of this esteemed author:

Gregory Boyce is a technologist with nearly 20 years' experience using and managing Linux systems. He has spent the last 15 years working at Akamai Technologies, where he has worked in roles ranging from network operations, internal IT, information security, software testing, and professional services. Currently, he heads up the Linux OS team that manages Akamai's custom Linux operating system, which runs on their massively distributed customer-facing network.

Who is the target audience?
  • This Video Learning Path is targeted at Linux system administrators who want to better understand various functions of a network service, how to set them up, and how to secure them.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
63 Lectures
Linux Networking Solutions - Part 1
29 Lectures 01:58:05
This video provides an overview of the entire course.
Preview 04:40

In this video, we will configure the network within Linux.
Setting Up the Physical Network

In this video, we will configure IPV4 in both the servers.

Configuring IPv4

In this video, we will configure IPv4 permanently in Ubuntu as well as in centOS.
Configuring IPv4 Permanently

We will see how to connect two networks, here we will configure 3 servers and interchange the data.

Connecting Two Networks

Connecting two local networks is useful, but these days it's more common to want to connect a local network to the Internet.
Enabling NAT to the Outside

You now have a router that provides Internet access to all systems behind it, but the systems behind it need to be manually configured with IP addresses while avoiding conflicts.
Setting Up DHCP

In this section, we're going to go a bit deeper into configuring a secure firewall for your network.
Setting Up a Firewall with iptables

Sometimes, you want to forward a port to a system behind the firewall instead of having the service run on the firewall itself.
Setting Up Port Forwarding

What if we want to have multiple private networks behind the route?
Adding VLAN Tagging

We cannot visit web pages by requesting them by IP address; rather we will ping them by their domain name. This problem is solved using a recursive DNS server to resolve the hostnames into IP addresses.
Preview 04:23

Set up your own recursive nameserver, which will help cut down on the round trips between you and your resolver.
Setting Up a Local Recursive Resolver

With the use of Dynamic DNS, you can leverage your DNS server to address your local systems by name.
Configuring Dynamic DNS on Your Local Network

It works the same way as setting up a DNS server for an internal hostname, just with a few additional parts that we'll want to make sure are in a good state.

Setting Up a nameserver for Your Public Domain

Bind/named can handle the synchronization internally, through the use of zone transfer AXFR requests or incremental zone transfer IXFR requests secured with the same type of HMAC keys utilized by the DHCP server to send updates to the DNS server.
>Setting Up a Slave nameserver

In addition to their hosting/transit services, they also host http://tunnelbroker.net, another free IPv6 tunnel provider, and http://ipv6.he.net/certification, a training and certificate site for learning about IPv6 networking.
Preview 04:58

This tool is the IPv6 version of the iptables command we've already used, and it operates in almost the same manner.
Using ip6tables to Firewall Your IPv6 Traffic

IPv6 has ability to obtain a large number of public IP addresses for your local networks rather than using NAT
Route an IPv6 netblock to Your Local Network

All Linux distributions offer the ability to install a Secure Shell SSH server.
Preview 06:54

If you are connecting from another Unix system, such as Linux or Mac OS X, you can launch a terminal and use the SSH command-line tool from OpenSSH.
Using OpenSSH as a Basic Shell Client

In this section we will see ability of Openssh to forward ports from the remote system to your local system or vice versa
Using OpenSSH to Forward Defined Ports

If you're looking to access webpages through an SSH proxy, you may find that the —L option is a bit too limiting, since you need to specify each individual web server that you're forwarding and give each one its own local port.
Using OpenSSH as a SOCKS Proxy

OpenVPN is a full SSL VPN solution that allows you to connect two networks at layer 2 or 3 via a TCP or UDP tunnel.
Using OpenVPN

Installing Apache with TLS is easier than ever, although the specific process can vary from distribution to distribution due to differences in configuration layout.
Preview 05:10

Apache2 offers a variety of Multi-Processing Modules (MPM) for defining how the daemon will handle scaling.
Improving Scaling with the Worker MPM

PHP is a very common programming language to use on Apache webserver, largely due to its ease of use.
Setting Up PHP Using an Apache Module

PHP code can certainly be secure, it often appeals to new developers who have not yet learned secure coding practices.
Securing Your Web Applications Using mod_security

NGINX works well as a lightweight, fast, multithreaded offering.
Configuring NGINX with TLS

Using this approach can limit what content runs through the processor.
Setting Up PHP in NGINX with FastCGI
Linux Networking Solutions – Part 2
34 Lectures 02:03:43
This video gives an overview of the entire course.
Preview 03:32

In this video, we will look at how the synchronization of settings works, and what it will coordinate on your behalf.

Configuring Samba as an Active Directory Compatible Directory Service

In this video, we will join machine to the domain using Administrator credentials to participate in an AD-style domain.

Joining a Linux Box to the Domain

In this video, we will be setting up a simple read-only file server using Samba, and then we will expand on it from there.
Preview 02:28

Samba supports granting authenticated access to shares in addition to making them available as public shares.
Granting Authenticated Access

NFS is trivial to set up and is typically rather fast, but it can introduce some interesting security issues if it is not done correctly.
Setting Up an NFS Server

WebDAV clients are built into macOS and Windows as well as the file managers for Gnome, KDE and many other Linux desktop environments.
Configuring WebDAV through Apache

Postfix comes with a set of sane, safe defaults. Additionally, any setting, which is not defined within your configuration file uses that default. This allows for very stripped down configuration files, although you are certainly free to define all the defaults within your configuration file if you want.
Preview 04:38

Rather than depending on the A record, you can use one or more MX records with defined priorities that point to A records which may be in or out of the domain you're configuring.
Setting Up DNS Records for E-mail Delivery

We're going to look at setting up a Dovecot e-mail server.
Configuring IMAP

We cannot send mail from remote systems. In order to enable this functionality, we need to configure Postfix to require auth for sending outbound mail from remote users.
Configuring Authentication for Outbound E-mail

Postfix can utilize TLS for securing communication in a few ways.
Configuring Postfix to Support TLS

There are steps that can be taken in order to detect or limit the spam directed to your system.
Blocking Spam with Greylisting

SpamAssassin uses a number of methodologies to identify spam messages and then either filter, tag or drop them.
Filtering Spam with SpamAssassin

In this video we're going to look at ejabberd, which is an extremely powerful and flexible option that has great online documentation.

Preview 09:48

There are special DNS records which you can optionally add to your zone file in order to change how the XMPP service operates.
Configuring DNS for XMPP

Here we will look at how to use Pidgin to connect to our XMPP server.
Configuring the Pidgin Client

Nagios is an industry standard for open source monitoring and reporting. It is incredibly flexible and extendable, for better or worse.

Preview 01:50

This will allow you to use a finer grained access control as well as making your life easier, as employees come and go in the company.
Adding Nagios Users

Monitoring your local system, you have full access to information regarding number of processes, amount of memory, CPU usage, and so on. When you're looking at remote systems, you're limited to accessing remotely accessible information like if a remote port is listening, ping ability, and so on.

Adding Nagios Hosts

You need to define a name for the service and the command to run in order to monitor it.

Monitoring Services

This video helps us to see how an existing command is defined, or if you want to define your own custom command.
Defining Commands

NRPE runs on the machine that you'd like to monitor and executes the same commands/ plugins which Nagios itself would have.
Monitoring Via NRPE

SNMP is useful for monitoring network equipment like routers and switches, which often have SNMP agents built into them.

Monitoring Via SNMP

Most commonly used as a port scanner, but it actually started its life as a network-mapping tool for discovering hosts. It can utilize ICMP, UDP, and TCP.
Preview 03:19

Some systems choose to block the ICMP traffic, which can result in them not appearing in a ping scan. Any system on your local network, however, must respond to ARP requests if they are going to communicate with additional machines on the network.
Detecting Systems Using Arp-Scan

There are a number of different types of TCP scans, we are going to look at the two most common ones, the Connect scan and the SYN scan.
Scanning TCP Ports

UDP is not so easy, being stateless. A UDP packet to a closed port will result in an ICMP Destination Port Unreachable message. A filtered UDP packet will result in no response.
Scanning UDP Ports

Explore a library or code fragment without having to first set up a new solution and even experiment with different possible approaches when problem solving
Identifying Services

nmap can attempt to identify the Operating System running on a particular system.
Identifying Operating Systems

Linux servers are typically configured to use a syslog based logging system for handling events.

Preview 05:06

To start monitoring our network for irregular traffic, we are going to start by installing a Snort IDS.
Installing a Snort IDS

Having a place to download rules from is great, but having a way to keep them up to date in an automated manner is even better. With Snort, this can be done by the PulledPork tool, which automates the downloads, installation, and management of the rule sets.
Managing Your Snort Rules

The default Snort configuration causes it to log any triggered alerts in unified2 format.
Managing Snort Logging
About the Instructor
Packt Publishing
3.9 Average rating
7,282 Reviews
51,940 Students
616 Courses
Tech Knowledge in Motion

Packt has been committed to developer learning since 2004. A lot has changed in software since then - but Packt has remained responsive to these changes, continuing to look forward at the trends and tools defining the way we work and live. And how to put them to work.

With an extensive library of content - more than 4000 books and video courses -Packt's mission is to help developers stay relevant in a rapidly changing world. From new web frameworks and programming languages, to cutting edge data analytics, and DevOps, Packt takes software professionals in every field to what's important to them now.

From skills that will help you to develop and future proof your career to immediate solutions to every day tech challenges, Packt is a go-to resource to make you a better, smarter developer.

Packt Udemy courses continue this tradition, bringing you comprehensive yet concise video courses straight from the experts.