Master Windows & Linux: Ultimate Admin Bootcamp (2024) - Druckversion +- Forum Rockoldies (https://rockoldies.net/forum) +-- Forum: Fotobearbeitung - Photoshop (https://rockoldies.net/forum/forumdisplay.php?fid=16) +--- Forum: E-Learning, Tutorials (https://rockoldies.net/forum/forumdisplay.php?fid=18) +--- Thema: Master Windows & Linux: Ultimate Admin Bootcamp (2024) (/showthread.php?tid=87239) |
Master Windows & Linux: Ultimate Admin Bootcamp (2024) - Panter - 29.08.2024 Master Windows & Linux: Ultimate Admin Bootcamp (2024) Published 8/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 27.07 GB | Duration: 91h 40m IT Career Booster: Master AD, Linux, automation & security in Windows & Linux environments What you'll learn Master Windows Server administration, including Active Directory, Group Policy, and security best practices for enterprise environments. Gain proficiency in Linux system administration, covering command-line operations, user management, and network configuration. Develop advanced scripting skills in both PowerShell and Bash to automate tasks and enhance productivity across both platforms. Implement and manage high availability solutions, including clustering and load balancing, for Windows and Linux servers. Master essential security practices for both Windows and Linux, including hardening techniques, access control, and threat mitigation. And much more... Requirements Basic IT knowledge and familiarity with computer concepts. No prior experience with Windows Server or Linux is required, but basic computer skills and understanding of networking fundamentals will be helpful. A computer with internet access and the ability to set up virtual machines (8GB RAM recommended) is needed for hands-on practice. We'll guide you through all necessary software installations. This course is designed to take you from beginner to advanced, so come with an eagerness to learn and you'll be well-prepared for the course! Description Master Windows Server and Linux Administration: The Ultimate Hands-On GuideElevate your IT career with our comprehensive 90+ hour course covering essential skills for managing Windows Server and Linux environments. Perfect for aspiring system administrators and IT professionals looking to expand their expertise and unlock new career opportunities.Key highlights: Dive deep into Windows Server administration, from installation to advanced features Explore Active Directory, Group Policy, and security best practices Learn Linux fundamentals and advanced concepts across popular distributions Master PowerShell and Bash scripting for efficient system management Hands-on labs and real-world scenarios to reinforce your learningLinux in the Modern World:Linux powers much of the world's technology infrastructure, from web servers and cloud platforms to mobile devices and embedded systems. Its open-source nature, stability, and flexibility make it a top choice for enterprises, startups, and governments alike. By mastering Linux, you'll position yourself at the forefront of technological innovation and open doors to exciting career opportunities in cloud computing, DevOps, IoT, and more.Windows Server in Enterprise Environments:Windows Server remains a cornerstone of enterprise IT infrastructure, providing essential services for businesses of all sizes. From managing user identities and access to hosting critical business applications, Windows Server skills are in high demand. Proficiency in Windows Server administration will make you an invaluable asset to organizations relying on Microsoft technologies.The Power of Mastering Both:By acquiring skills in both Windows Server and Linux administration, you'll become a versatile and highly sought-after IT professional. This unique combination allows you to: Seamlessly navigate and integrate diverse IT environments Implement robust, cross-platform solutions for complex business needs Adapt quickly to evolving technology landscapes and job requirements Stand out in the job market with a broader skill set than most candidates Contribute effectively to hybrid cloud and multi-cloud strategies Solve a wider range of IT challenges, making you indispensable to employersCareer Advancement and Opportunities:Completing this course will significantly enhance your career prospects in the IT industry: Qualify for in-demand roles such as Systems Administrator, Network Administrator, or IT Infrastructure Specialist Boost your earning potential - skilled Windows/Linux admins command competitive salaries Prepare for sought-after certifications in both Microsoft and Linux domains Position yourself for career growth into roles like IT Manager or Cloud Architect Gain the versatility to work across diverse IT environments and industries Develop a strong foundation for specializing in cloud technologies, DevOps, or cybersecurityBy the end of this course, you'll have the confidence and skills to: Deploy and manage Windows Server and Linux systems in enterprise environments Implement robust security measures and troubleshoot common issues Automate tasks with PowerShell and Bash scripting Tackle certification exams with ease Impress employers with your broad skill set and hands-on experienceWhether you're new to system administration or looking to level up your skills, this course provides the perfect blend of theory and practical knowledge to succeed in today's IT landscape. Start your journey to becoming a versatile and in-demand IT professional today!Invest in your future - gain the skills that will set you apart in the competitive IT job market and open doors to exciting career opportunities.Brief Course Outline:1. Windows Server Administration - Installation and configuration - Active Directory and Group Policy - Networking and storage management - High availability and disaster recovery - Security and performance optimization2. Linux Administration - Linux fundamentals and command line mastery - User and group management - File system administration - Network configuration and security - Package management and software installation3. PowerShell Scripting - PowerShell basics and syntax - Writing and executing scripts - Automating Windows Server tasks - Managing Active Directory with PowerShell4. Bash Scripting - Bash scripting fundamentals - Creating and debugging scripts - Automating Linux system administration tasks - Text processing and data manipulation5. Advanced Topics - Virtualization and containerization - Cloud integration - Configuration management tools (Ansible) - Monitoring and loggingWhat You'll Learn:- Install, configure, and manage Windows Server and Linux systems- Implement and administer Active Directory services- Configure and maintain network services on both platforms- Manage storage solutions, including RAID and LVM- Implement security best practices and hardening techniques- Write powerful scripts in PowerShell and Bash for task automation- Deploy and manage virtual machines and containers- Implement high availability and disaster recovery solutions- Monitor system performance and troubleshoot common issues- Integrate on-premises systems with cloud services- Use configuration management tools for efficient system administrationBy the end of this course, you'll have a comprehensive skill set covering both Windows and Linux environments, positioning you as a versatile and valuable IT professional ready to take on the challenges of modern infrastructure management. Overview Section 1: Introduction Lecture 1 Instructor's Intro Lecture 2 Introduction and Installing Windows Server 2022 Lecture 3 Activating Windows Server 2022 Lecture 4 Post-Install Tasks. Part 1 Lecture 5 Post-Install Tasks. Part 2 Lecture 6 Setting a Base Image with SYSPREP Lecture 7 Recap Lecture 8 Setting up your first DC Lecture 9 Installing WAC and Joing a workstation to the domain Lecture 10 Server Core Lecture 11 Adding a Child Domain to the Lab Lecture 12 Recap: Base Lab SOP Lecture 13 AD DS Admin Tools Lecture 14 Creating Users in our Lab Lecture 15 Creating OU, Group, and User Template Lecture 16 Manging AD DS Objects with Powershell Lecture 17 Building Trusts between Forests Lecture 18 Server Manager Lecture 19 Getting started with Powershell Lecture 20 Installing Hyper-V in Windows Server Lab Lecture 21 Installing Hyper-V in Windows Server Lab. Part 2 Lecture 22 Networking basics Lecture 23 Configuring Network Settings Lecture 24 Installing updates and upgrading Windows Server 2019 to 2022 Lecture 25 Creating an automated answer file to automate the installation Lecture 26 Module 1: Installing and configuring domain controllers. Overview Lecture 27 AD DS components Lecture 28 What is the AD DS schema? Lecture 29 What is an AD DS forest? Lecture 30 What is an AD DS domain? Lecture 31 What are OUs? Lecture 32 What is Azure AD? Lecture 33 Overview of AD DS administration tools Lecture 34 Demo 1: Overview of AD DS administration tools and components Lecture 35 Demo 2: Overview of AD DS administration tools and components Lecture 36 Demo 3: Active Directory Administrative Center to administer and manage AD DS Lecture 37 Overview of AD DS domain controllers Lecture 38 What is a domain controller? Lecture 39 What is a global catalog? Lecture 40 Demo: What is a global catalog? Lecture 41 Overview of domain controller SRV records Lecture 42 Demo: Overview of domain controller SRV records Lecture 43 AD DS sign-in process Lecture 44 Demo: AD DS sign-in process Lecture 45 Demo: AD DS sign-in process Lecture 46 What are operations masters? Lecture 47 Transferring and seizing roles Lecture 48 Deploying a domain controller: Overview Lecture 49 Installing a domain controller from Server Manager Lecture 50 Demo: Part 1. Installing a domain controller from Server Manager Lecture 51 Demo: Part 2. Installing a domain controller from Server Manager Lecture 52 Installing a domain controller on a Server Core installation of Windows Server Lecture 53 Demo: Installing a domain controller on a Server Core Lecture 54 Installing a domain controller by installing from media Lecture 55 Cloning domain controllers Lecture 56 Demonstration: Cloning domain controllers Lecture 57 Demonstration: Adding Another domain controllers Lecture 58 Demonstration: Installing a domain controller with Powershell Lecture 59 Demonstration: FSMO Roles Section 2: Managing user accounts Lecture 60 Managing User Accounts Overview Lecture 61 Creating user accounts Lecture 62 Demo: Configuring user account attributes Lecture 63 Demo: Managing user accounts Lecture 64 Creating user profiles Lecture 65 Demo: Creating user profiles Lecture 66 Demo: User account templates Lecture 67 Using Windows PowerShell cmdlets to manage user accounts Lecture 68 Using Windows PowerShell to create users Lecture 69 Using Windows PowerShell for bulk users operations Lecture 70 Using Windows PowerShell to modify users' properties Lecture 71 Using Windows PowerShell to add users to groups Lecture 72 Using Windows PowerShell to modify users' properties. Part2 Lecture 73 Using Windows PowerShell to enable/move users Lecture 74 Using Windows PowerShell to delete users Section 3: Managing groups, computers, OU in AD DS Lecture 75 Managing groups in AD DS Section Overview Lecture 76 Group types Lecture 77 Group types Lecture 78 Group scopes Lecture 79 Demo: Group scopes Lecture 80 Implementing group management Lecture 81 Demo: Implementing group management (IGDLA) Lecture 82 Managing members with GPO Lecture 83 Demo: Using Restricted Groups Setting Lecture 84 Default groups Lecture 85 Demo: Using Account Operators Groups and Delegate Control Lecture 86 Special identities Lecture 87 Demonstration: Managing groups in Windows Server Lecture 88 Demo: Checking Groups Membership Lecture 89 Managing computer objects in AD DS Section Overview Lecture 90 Specifying the location of computer accounts Lecture 91 Controlling permissions to create computer accounts Lecture 92 Joining a computer to a domain Lecture 93 Demo: Managing Computer Obejects Lecture 94 Resetting the computer account (secure channel) Lecture 95 Demo: Resetting the computer account (secure channel) Lecture 96 Performing an offline domain join Lecture 97 Lab Tasks: Managing objects in AD DS Lecture 98 Lab Solution: Managing objects in AD DS Lecture 99 Implementing and managing OUs Section Overview Lecture 100 Planning OUs Lecture 101 OU hierarchy considerations Lecture 102 Considerations for using OUs Lecture 103 AD DS permissions Lecture 104 Delegating AD DS permissions Lecture 105 Using Windows PowerShell for AD DS administration Section Overview Lecture 106 Using Windows PowerShell cmdlets to manage groups Lecture 107 PowerShell: Managing, configuring and modifying Group objects. Part 1 Lecture 108 PowerShell: Managing, configuring and modifying Group objects. Part 2 Lecture 109 PowerShell: Managing, configuring and modifying Group objects. Part 3 Lecture 110 PowerShell: Managing, configuring and modifying Group objects. Part 4 Lecture 111 PowerShell: Managing, configuring and modifying Group objects. Part 5 Lecture 112 Windows PowerShell cmdlets to manage computers and OUs Lecture 113 PowerShell: Managing, configuring and modifying Computer objects. Part 1 Lecture 114 PowerShell: Managing, configuring and modifying Computer objects. Part 2 Section 4: Part 2 Lecture 115 Course Overview Lecture 116 Section Overview Lecture 117 Overview of domain and forest boundaries in an AD DS structure Lecture 118 Why implement multiple domains? Lecture 119 Why implement multiple forests? Lecture 120 Deploying a domain controller in Azure IaaS Lecture 121 Managing objects in complex AD DS deployments Lecture 122 Deploying a distributed AD DS environment. Section Overview Lecture 123 AD DS domain functional levels Lecture 124 AD DS forest functional levels Lecture 125 Demo: New domain and functional levels in Windows Server 2025 Lecture 126 Deploying new AD DS domains Lecture 127 Considerations for implementing complex AD DS environments Lecture 128 Demo: Installing a domain controller in a new domain in an existing forest Lecture 129 Upgrading a previous version of AD DS to Windows Server 2016 Lecture 130 Migrating to Windows Server 2016 AD DS from a previous version Lecture 131 Configuring AD DS trusts. Section Overview Lecture 132 Overview of different AD DS trust types Lecture 133 How trusts work in a forest Lecture 134 How trusts work between forests Lecture 135 Configuring advanced AD DS trust settings Lecture 136 Course Overview Lecture 137 Section Overview Lecture 138 What are AD DS partitions? Lecture 139 Characteristics of AD DS replication Lecture 140 How AD DS replication works within a site Lecture 141 Resolving replication conflicts Lecture 142 How replication topology is generated Lecture 143 How SYSVOL replication works Lecture 144 Configuring AD DS sites Section Overview Lecture 145 What are AD DS sites? Lecture 146 Why implement additional sites? Lecture 147 How replication works between sites Lecture 148 What is the ISTG? Lecture 149 Overview of SRV records Lecture 150 How client computers locate domain controllers within sites Lecture 151 Moving domain controllers between sites Lecture 152 Configuring and monitoring AD DS replication Section Overview Lecture 153 What are AD DS site links? Lecture 154 What is site link bridging? Lecture 155 What is universal group membership caching? Lecture 156 Lab: Sites and Replication. Exercies and Tasks Lecture 157 Lab: Sites and Replication. Solution Section 5: Group Policy Lecture 158 Course Overview Lecture 159 What is Configuration Management Lecture 160 Overview of Group Policy tools and consoles Lecture 161 Computer Configuration and User Configuration Lecture 162 Demonstration: Exploring Group Policy tools and consoles Lecture 163 Benefits of using Group Policy Lecture 164 Group Policy Objects Lecture 165 Overview of GPO scope Lecture 166 Overview of GPO inheritance Lecture 167 The Group Policy Client service and client-side extensions Lecture 168 What are domain-based GPOs? Lecture 169 GPO storage Lecture 170 What are starter GPOs? Lecture 171 Common GPO management tasks Lecture 172 Delegating administration of Group Policy Lecture 173 Demo: Delegating administration of Group Policy Lecture 174 Lesson 3: Group Policy scope and Group Policy processing Lecture 175 What are GPO links? Lecture 176 Group Policy processing order Lecture 177 Configuring GPO inheritance and precedence Lecture 178 Using security filtering to modify Group Policy scope Lecture 179 What are WMI filters? Lecture 180 How to enable or disable GPOs and GPO nodes Lecture 181 Loopback policy processing Lecture 182 Considerations for slow links and disconnected systems Lecture 183 Identifying when settings become effective Lecture 184 Lab A Tasks: Implementing a Group Policy infrastructure Lecture 185 Lab A Solution: Implementing a Group Policy infrastructure Lecture 186 Troubleshooting the application of GPOs Lesson Overview Lecture 187 Refreshing GPOs Lecture 188 What is RSoP and Generating RSoP Report Lecture 189 Course Overview Lecture 190 Section Overview Lecture 191 What are administrative templates? Lecture 192 What are .adm and .admx files? Lecture 193 Overview of the central store Lecture 194 Demonstration: Configuring settings with administrative templates Lecture 195 Importing security templates Lecture 196 Managing administrative templates Lecture 197 Section Overview Lecture 198 What is Folder Redirection? Lecture 199 Settings for configuring Folder Redirection Lecture 200 Security settings for redirected folders Lecture 201 Demonstration: Configuring Folder Redirection Lecture 202 Managing software with Group Policy Lecture 203 Group Policy settings for applying scripts Lecture 204 Demonstration: Configuring scripts with GPOs Lecture 205 Section Overview Lecture 206 What are Group Policy preferences? Comparing with Policy settings Lecture 207 Features of Group Policy preferences Lecture 208 Item-level targeting options Lecture 209 Demonstration: Configuring Group Policy preferences Lecture 210 Lab Tasks: Managing user settings with Group Policy Lecture 211 Lab Solution: Managing user settings with Group Policy Lecture 212 Lab Review: Managing user settings with Group Policy Section 6: Securing domain controllers Lecture 213 Section Overview Lecture 214 Security risks that can affect domain controllers Lecture 215 Demo: Installing and Using Nmap for Network Scanning and Vulnerability Assess Lecture 216 Modifying the security settings of domain controllers Lecture 217 Demo Example 1: Configuring and Verifying Domain Controller Security Policies Lecture 218 Demo Example 2: Configuring Custom Security Policies for Domain Controllers Lecture 219 Benefits of Custom GPOs for Domain Controllers: Best Practices and Consideration Lecture 220 Implementing secure authentication Lecture 221 Securing physical access to domain controllers Lecture 222 What are RODCs? Lecture 223 Deploying an RODC Lecture 224 Planning and configuring an RODC password replication policy Lecture 225 Demonstration: Configuring a password replication policy Lecture 226 Separating RODC local administration Lecture 227 Best Practices for Securing Active Directory Lecture 228 Section Overview Lecture 229 Password policies Lecture 230 Account lockout policies Lecture 231 Kerberos policies Lecture 232 Demonstration: Configuring a fine-grained password policy Lecture 233 Protecting groups in AD DS Lecture 234 Fine-grained password and lockout policies Lecture 235 Tools for creating PSOs Lecture 236 Demonstration: Configuring authentication-related audit policies and viewing log Lecture 237 PSO precedence and resultant PSO Lecture 238 Account-security options Lecture 239 Configuring user account policies Lecture 240 Account logon and logon events skdlfdklsj lksdjflkdsjflkj lksdjfldsakjflkj dslkj Lecture 241 Demonstration: Configuring authentication-related audit policies and viewing log Lecture 242 Scoping audit policies Lecture 243 Section Overview Lecture 244 Overview of service accounts Lecture 245 Challenges of using service accounts Lecture 246 Overview of managed service accounts Lecture 247 What are group MSAs? Lecture 248 Demonstration: Configuring group MSAs Lecture 249 Lab: Securing AD DS Exercises and Tasks Lecture 250 Lab: Securing AD DS. Solution. Part 1 Lecture 251 Lab: Securing AD DS. Solution. Part 2 Lecture 252 Lab Review Lecture 253 Module Review and Takeaways Lecture 254 Plan Your Progress Lecture 255 Course Overview Lecture 256 Section Overview: Deploying CAs Lecture 257 What is AD CS? Lecture 258 Options for implementing CA hierarchies Lecture 259 Standalone vs. enterprise CAs Lecture 260 Considerations for deploying a root CA Lecture 261 Demonstration: Deploying an enterprise root CA Lecture 262 Considerations for deploying a subordinate CA Lecture 263 How to use the CAPolicy.inf file for installing a CA Lecture 264 Section Overview: Administering CAs Lecture 265 Managing CAs Lecture 266 Configuring CA security Lecture 267 Security roles for CA administration Lecture 268 Configuring CA policy and exit modules Lecture 269 Configuring CDPs and AIA locations Lecture 270 Demonstration: Configuring CA properties Lecture 271 Section Overview: Troubleshooting CAs Lecture 272 Renewing a CA certificate Lecture 273 Moving a root CA to another computer Lecture 274 Monitoring CA operations Lecture 275 Lab Task: Deploying and managing AD CS Lecture 276 Lab Demonstration Steps: Deploying and managing AD CS Lecture 277 Course Overview Lecture 278 Course Overview Lecture 279 Section Overview Lecture 280 What are certificates and certificate templates Lecture 281 Certificate template versions in Windows Server Lecture 282 Configuring certificate template permissions Lecture 283 Configuring certificate template settings Lecture 284 Options for updating a certificate template Lecture 285 Demonstration: Modifying and enabling a certificate template Lecture 286 Assess Your Knowledge. Section Overview: Managing certificate Lecture 287 Certificate enrollment methods Lecture 288 Overview of certificate autoenrollment Lecture 289 What is an enrollment agent? Lecture 290 How does certificate revocation work? Lecture 291 Overview of key archival and recovery Lecture 292 Demonstration: Configuring a CA for key archival Lecture 293 Using certificates for SSL Lecture 294 Using certificates for digital signatures Lecture 295 Using certificates for content encryption Lecture 296 Demonstration: Signing a document digitally. Encrypting a file Lecture 297 Lab: Deploying and using certificates Lecture 298 Lab Demonstration Steps: Deploying and using certificates Lecture 299 Module Review and Takeaways Lecture 300 Building a PKI Lab Environment with Hyper-V and Base Image Lecture 301 Configuring Offline Root Certification Authority Lecture 302 Configuring Root CA Settings Lecture 303 Installing IIS Web Server and Importing Root CA Certificate Lecture 304 Configuring IIS Virtual Directory and Settings for PKI Lecture 305 Setting Up an Enterprise Subordinate Certification Authority Lecture 306 Configuring CRL and AIA Distribution Points on Subordinate CA Lecture 307 Building a PKI infrastructure lab on Windows Server Core VMs Lecture 308 Building a PKI infrastructure lab on Windows Server Core VMs. Lecture 309 Building a PKI infrastructure lab on Windows Server Core VMs. Lecture 310 Managing disks in Windows Server Lecture 311 Selecting a disk type Lecture 312 Selecting a file system Lecture 313 Implementing ReFS Lecture 314 Implementing ReFS with Powershell Lecture 315 Using .vhd and .vhdx file types Lecture 316 Using .vhd and .vhdx file types Lecture 317 Working with Dynamic Volumes Lecture 318 Working with Diskpart Lecture 319 Lab Assignment: Configuring Local Storage Lecture 320 Lab Solution: Configuring Local Storage Lecture 321 Selecting a disk type Lecture 322 What is RAID? Lecture 323 RAID levels Lecture 324 What is DAS? Lecture 325 What is NAS? Lecture 326 What is a SAN? Lecture 327 Comparison and scenarios for usage Lecture 328 Block-level storage vs. file-level storage Lecture 329 What is Fibre Channel? Lecture 330 Considerations for implementing Fibre Channel Lecture 331 What is iSCSI? Lecture 332 iSCSI components Lecture 333 Core storage components Lecture 334 Demo: Configuring an iSCSI target Lecture 335 What is iSNS? Lecture 336 What is DCB? Lecture 337 What is MPIO? Lecture 338 Demo: Configuring MPIO Lecture 339 What is SMB? Lecture 340 Configuring SMB shares Lecture 341 Demo: Configuring SMB shares by using Server Manager and Lecture 342 What is NFS? Lecture 343 Configuring NFS shares Lecture 344 Demo: Configuring an NFS share by using Server Manager Lecture 345 Lab Assignment: Implementing enterprise storage solutions Lecture 346 Lab Solution: Implementing enterprise storage solutions Lecture 347 Enterprise storage needs Lecture 348 What are Storage Spaces? Lecture 349 Components and features of Storage Spaces Lecture 350 Demonstration: Configuring Storage Spaces Lecture 351 Changes to file and storage services in Windows Server Lecture 352 Storage Spaces usage scenarios Lecture 353 Discussion: Comparing Storage Spaces to other storage sol Lecture 354 Managing Storage Spaces Lecture 355 Managing disk failure with Storage Spaces Lecture 356 Storage pool expansion Lecture 357 Demonstration: Managing Storage Spaces by using Windows P Lecture 358 Event logs and performance counters Lecture 359 Event logs and performance counters. Part 2 Lecture 360 Performance counters Lecture 361 Lab A Tasks: Implementing Storage Spaces. Execrcise 1 Lecture 362 Lab A Tasks: Implementing Storage Spaces. Execrcise 2 Lecture 363 Lab A Solution: Implementing Storage Spaces. Execrcise 1 Lecture 364 Lab A Solution: Implementing Storage Spaces. Execrcise 2 Lecture 365 What is Data Deduplication? Lecture 366 Data Deduplication components Lecture 367 Deploying Data Deduplication Lecture 368 Usage scenarios for Data Deduplication Lecture 369 Monitoring and maintaining Data Deduplication Lecture 370 Backup and restore considerations with Data Deduplication Lecture 371 Lab B Tasks: Implementing Data Deduplication Lecture 372 Lab B Tasks: Implementing Data Deduplication Lecture 373 Lab B Solution: Implementing Data Deduplication Lecture 374 Module Introduction Lecture 375 New Hyper-V host features in Windows Server Lecture 376 New Hyper-V virtual machine features Lecture 377 Lesson 3: Configuring storage on Hyper-V host servers Lecture 378 Considerations for virtual hard disk formats and types Lecture 379 Demo: Managing storage in Hyper-V Lecture 380 Lesson 4: Types of Hyper-V networks Lecture 381 Best Practices for configuring Hyper-V virtual networks Lecture 382 New Hyper-V networking features in Windows Server Lecture 383 Demo: Configuring Hyper-V networks Lecture 384 Lesson 5: Configuring Hyper-V virtual machines Lecture 385 Virtual machine generation versions Lecture 386 Virtual machine settings Lecture 387 VMs features and best practice Lecture 388 Demo: Virtual machine configuration versions Lecture 389 Demo: Creating a virtual machine Lecture 390 Demo: Creating a virtual machine with Powershell Lecture 391 Lesson 6: Managing virtual machines Lecture 392 Managing checkpoints Lecture 393 Demo: Creating checkpoints Lecture 394 Importing and exporting virtual machines Lecture 395 Demo: Live migration of a virtual machine Lecture 396 What is Docker? Lecture 397 Demo: Installing Docker Lecture 398 Module Overview Lecture 399 What is high availability? Lecture 400 What is continuous and availability? Lecture 401 Creating a disaster recovery plan Lecture 402 Highly available networking and storage Lecture 403 Lesson 2: Planning high availability and disaster recover Lecture 404 High availability considerations with Hyper-V virtual mac Lecture 405 Overview of Live Migration Lecture 406 Providing high availability with storage migration Lecture 407 Demo: Configuring live migration Lecture 408 Overview of Hyper-V Replica Lecture 409 Demo: Configuring storage migration. Implementing Hyper-V Lecture 410 Lesson 3: Backing up and restoring by using Windows Serve Lecture 411 Lesson 4: High Availability with failover clustering in W Lecture 412 What is failover clustering? Lecture 413 Course Introduction Lecture 414 Key Considerations for Designing a Highly Available Failo Lecture 415 Identifying and Preparing Applications for Failover Clust Lecture 416 Storage Options and Requirements for Failover Clusters Lecture 417 Hardware and Network Requirements for Failover Clustering Lecture 418 Configuring Software, Security, and Migration for Failove Lecture 419 Cluster Configuration: Properties, Nodes, and Failover/Fa Lecture 420 Quorum Modes and Configuration in Failover Clustering Lecture 421 Deploying and Configuring Failover Clusters Lecture 422 Demo: Creating a failover cluster Lecture 423 Configuring Storage and Networking for Failover Clusters Lecture 424 Setting Up and Administering Failover Clustering Roles Lecture 425 Demo: Creating a general file-server failover cluster Lecture 426 Configuring Cluster Quorum Settings Lecture 427 Demo: Configuring the quorum Lecture 428 Monitoring, Backing Up, and Maintaining Failover Clusters Lecture 429 Demo: Configure failover and failback settings Lecture 430 Failover Cluster Maintenance - Backup, Recovery, and Trou Lecture 431 Optimizing Network Thresholds and Monitoring for Cluster Lecture 432 Zero Downtime OS Updates Using Cluster-Aware Updating Lecture 433 Demo: Configuring CAU Lecture 434 Identifying and Resolving Failover Cluster Communication Lecture 435 Troubleshooting Cluster Availability Issues Related to CN Lecture 436 Monitoring and Diagnostic Tools for Failover Cluster Mana Lecture 437 Deploying Stretch Clusters for Site Resiliency Lecture 438 Deploying Highly Available Stretched Clusters Across Loca Lecture 439 Understanding Synchronous vs Asynchronous Replication for Lecture 440 Using Storage Replica for Stretched Clusters and Replicat Lecture 441 Witness Selection for Site-Aware Stretched Failover Clust Lecture 442 Implementing Site-Aware Failover Clustering Lecture 443 Failover and Failback Procedures for Stretched Clusters Lecture 444 Course intro Lecture 445 What is NLB? Lecture 446 Deployment requirements for NLB Lecture 447 Network considerations for NLB Lecture 448 Configuration options for NLB Lecture 449 Designing applications and storage support for NLB Lecture 450 Considerations for deploying an NLB cluster on virtual ma Lecture 451 Considerations for securing NLB Lecture 452 Considerations for scaling and upgrading NLB Lecture 453 Demo: Implementing NLB Lecture 454 Introduction Lecture 455 Hands-On Lab Overview Lecture 456 Hands-On Lab Part 1 Lecture 457 Hands-On Lab Part 2 Lecture 458 Hands-On Lab Part 3 Lecture 459 Hands-On Lab Part 4 Section 7: Linux Lecture 460 Changing the directories, inspecting the system, examinin Lecture 461 Displaying and setting time and date. Part 1 Lecture 462 Displaying and setting time and date. Part 2 Lecture 463 Getting device information and using compression/archivin Lecture 464 Getting help (continued) Lecture 465 Path and file types Lecture 466 Creating files or directories and listing files or direct Lecture 467 Copying, moving, renaming, removing files and directories Lecture 468 File and directory control attributes Lecture 469 Finding files. Part 1 Lecture 470 Finding files. Part 2 Lecture 471 Finding files. Part 3 Lecture 472 Finding files. Part 4 Lecture 473 Hands-On Task Demo: Finding Large Files and Creating a Lo Lecture 474 File permissions. Part 1 Lecture 475 File permissions. Part 2 Lecture 476 Permissions for group collaboration Lecture 477 Hands-On Task Demo: Configuring Linux Permissions for a D Lecture 478 Getting Started with Vim Basics Lecture 479 Creating, opening and saving a file. Moving around VIM ed Lecture 480 Getting help in VIM Lecture 481 Creating the first file in vim Lecture 482 Basic vim commands Lecture 483 VIM motion commands and search Lecture 484 Opening and saving files in VIM Lecture 485 Opening multiple files and splitting windows Lecture 486 Switching between windows Lecture 487 Introduction to Basic Navigation in Vim Lecture 488 Hands-on Practice: Vim Installation and Basic Navigation Lecture 489 Fundamentals of Editing in Vim Lecture 490 Basic Vim Navigation Lecture 491 Advanced Vim Navigation Lecture 492 Vim Search and Replace Lecture 493 Vim Copy and Insert Lecture 494 Vim Fundamentals: A Comprehensive Review of Core Concepts Lecture 495 Overview of Exercise Lessons. What will we learn? Lecture 496 Exercise 1: Editing in Vim Lecture 497 Exercise 2: Editing in Vim Lecture 498 Exercise 3: Editing in Vim Lecture 499 Navigating and Editing Multiple Files in Vim Lecture 500 Advanced Vim Techniques for Managing Multiple Files Lecture 501 Searching the needed info with grep&wc Lecture 502 Cat and output redirection Lecture 503 Using pipes Lecture 504 Processes revealed Lecture 505 Processes and jobs Lecture 506 Exploring all running processes with top command Lecture 507 Understanding process states Lecture 508 Changing process priority with nice Lecture 509 Controlling processes with signals Lecture 510 Changing password with passwd and working withPATH Lecture 511 Special characters and command-line keystrokes Lecture 512 Chaining operators Lecture 513 Sed and awk Lecture 514 Sed and awk. Part 2 Lecture 515 Performing exit, reboot or shutdown on the system Lecture 516 Using BASH history Lecture 517 Using aliases to create your own commands Lecture 518 Watching files and how they're changing live with watch c Lecture 519 Gaining administrative privileges with sudo command Lecture 520 Understanding Job Scheduling with cron and at commnds Lecture 521 Packages overview Lecture 522 Managing packages with rpm command Lecture 523 Installing and modifying packages with rpm command Lecture 524 Viewing pgp keys and verifying package attributes Lecture 525 YUM package manager. Part 1 Lecture 526 YUM package manager. Part 2 Lecture 527 YUM package manager. Part 3 Lecture 528 Configuring hostname Lecture 529 IPv4 concepts and traceroute command usage Lecture 530 Using 'ip' command Lecture 531 Validating and Troubleshooting Network Configuration Lecture 532 Practice Lab: Examining Network Configuration Lecture 533 Configuring Networking with nmcli Lecture 534 Validating Network Configuration (with Guided Exercise)( Lecture 535 Editing Network Configuration Files (with Guided Exercise Lecture 536 Lab: Managing Networking Lecture 537 Installing RHEL9 Lecture 538 Registering RHEL9 Lecture 539 Users: Intro, id command, passwd file Lecture 540 Users: Gaining Superuser Access. su and sudo commands Lecture 541 Users: Configuring sudo Lecture 542 Users: Guided Exercise Using sudo Lecture 543 Users: Using useradd, userdel and usermod Lecture 544 Users: Practice excersise with useradd, userdel and userm Lecture 545 Groups: groupadd, groupdel and groupmod Lecture 546 Groups: adding users to groups Lecture 547 Users: working with passwords Lecture 548 Users: Practice. Working with passwords Lecture 549 Lab: Managing Users and Groups Lecture 550 File permissions Lecture 551 Changing Permissions for Files and Directories Lecture 552 Changing Ownership for Files and Directories Lecture 553 Guided Exercise: Managing File System Permissions from th Lecture 554 Umask and Managing Default Permissions and File Access Lecture 555 Guided Exercise: Umask and Managing Default Permissions Lecture 556 Lab: Controlling Access to Files Lecture 557 Listing Processes and Process States. PS command options Lecture 558 Controlling Jobs Lecture 559 Guided Exercise: Controlling Jobs Lecture 560 Killing Processes Lecture 561 Monitoring process activity Lecture 562 Lab: Monitoring and Managing Processes Lecture 563 Controlling Services and Daemons Lecture 564 Controlling Services and Daemons: Guided Exercises Lecture 565 Accessing Comand Line with SSH Lecture 566 Configuring SSH key-based authentication Lecture 567 Configuring and securing SSH Lecture 568 Describing System Log Architechture Lecture 569 Reviewing Syslog Files Lecture 570 Reviewing System Journal Entries Lecture 571 Preserving the System Journal Lecture 572 Maintaining Accurate Time Lecture 573 Lab: Analyzing and Storing Logs Lecture 574 Archiving and Compressing Files Lecture 575 Transferring Files Between Systems Securely Lecture 576 Using 'at' Package Lecture 577 Scheduling Recurring Tasks with 'crontab' Lecture 578 Scheduling Recurring System Jobs Lecture 579 Guided Exercise: Scheduling Recurring System Jobs Lecture 580 Managing Temporary Files Lecture 581 Guided Exercise: Managing Temporary Files Lecture 582 Adjusting Tuning Profiles Lecture 583 Adjusting Process Scheduling Lecture 584 Guided Exercise: Changing Process Scheduling Lecture 585 Interpreting File ACLs Lecture 586 Securing Files with ACLs Lecture 587 Guided Exercise: Securing Files with ACLs Lecture 588 Adding Partitions, File Systems, and Persistent Mounts Lecture 589 Guided Exercise: Adding Partitions, File Systems, and Per Lecture 590 Managing Swap Space Lecture 591 Lab: Managing Basic Storage Lecture 592 Managing Logical Volumes Lecture 593 Extending Logical Volumes Lecture 594 Guided Exercise: Extending Logical Volumes Lecture 595 Lab: Managing Logical Volumes Lecture 596 Managing Layered Storage with Stratis Lecture 597 Guided Exercise: Managing Layered Storage with Stratis Lecture 598 Compresson and Deduplicating Storage with VDO Lecture 599 Lab: Implementing Advanced Stirage Features Lecture 600 Accessing Network-Attached Storage Lecture 601 Guided Exercise: Accessing Network-Attached Storage Lecture 602 Describing the Boot Process Lecture 603 Guided Exercise: Selecting the Boot Target Lecture 604 Guided Exercise:Resetting the Root Password. Using Debug Lecture 605 Lab: Controlling the Boot Process Lecture 606 Describing Networking Concepts Lecture 607 IPv4 settings. Defining subnets Lecture 608 IPv4 Guided Exercises. Public and Private Adresses Lecture 609 Lab: Planning an IPv4 network Lecture 610 Using OpenSSL on Red Hat Linux to Create, Operate, and Se Lecture 611 Creating Certificate Authority (Self-Signed) Lecture 612 Hands-On Lab on OpenSSL Lecture 613 Administration and Monitoring with udevadm Lecture 614 UDEV Configuration and Device Management Lecture 615 Kernel Module Management: Using modprobe and rmmod Lecture 616 Installation and Package Management Troubleshooting Lecture 617 USB Device Detection and Management in Linux: Using lsusb Lecture 618 Using dmesg for System Monitoring and Troubleshooting in Lecture 619 Understanding Linux Run Levels: System Maintenance and Tr Lecture 620 Questions 1 -2: Using 'udevadm' and '/proc' Lecture 621 Questions 3 -4: udev Configuration Location. Loading kern Lecture 622 Questions 5- 6. Querying udev database. Listing USB devic Lecture 623 Question 7: Using dmesg to view kernel ring buffer Lecture 624 Writing Simple Bash Scripts Lecture 625 Guided Exercise: Writing Your First Script Lecture 626 Using Loops Lecture 627 Guided Exercise: Using Loops Lecture 628 Describing a Simple Regular Expression Lecture 629 Guided Exercise: Using grep with RegEx Lecture 630 Using grep with RegEx Lecture 631 Lab: Your First Script Lecture 632 Building Scripts: Using Variables and Redirecting Input/O Lecture 633 Building Scripts: the if-then statements Lecture 634 Building Scripts: Trying the Test command. Using Comparis Lecture 635 Building Scripts: Using File Comparison Lecture 636 Compound Testing. Working wit Advanced If-Then Statements Lecture 637 A Practical Example Lecture 638 Looping with the 'for' statement Lecture 639 Looping with the 'for' statement. Part 2 Lecture 640 Using 'while' and 'until' commands. Using Loops Lecture 641 Using Loops. Part 2 Lecture 642 Practical Examples Using Loops Lecture 643 Passing Parameters Lecture 644 Using Special Parameter Variables Lecture 645 Working with Options Lecture 646 Using Read Command Lecture 647 A Practical Example Lecture 648 Understanding Input and Output Lecture 649 Redirecting Output in Scripts Lecture 650 Read/Write file descriptors Lecture 651 Supressing Command Output. Using temp files. Logging Mess Lecture 652 A practical example: using input and output Lecture 653 Signaling the Bash shell Lecture 654 Using traps Lecture 655 Running scripts in background Lecture 656 Running Scripts without a Hang-up Lecture 657 Controlling the Job. Viewing Jobs Lecture 658 Your First Bash Script. Part 1 Lecture 659 Your First Bash Script. Part 2 Lecture 660 Bash Syntax Fundamentals. Part 1 Lecture 661 Bash Syntax Fundamentals. Part 2 Lecture 662 Bash Syntax Fundamentals. Part 3 Lecture 663 Working with Files and Permissions. Part 1 Lecture 664 Working with Files and Permissions. Part 2 Lecture 665 Working with Files and Permissions. Part 3 Lecture 666 Script Example: File Operations and Bash Concepts Lecture 667 'if' Statement. Part 1 Lecture 668 'if' Statement. Part 2 Lecture 669 Loops in Bash. Part 1 Lecture 670 Loops in Bash. Part 2 Lecture 671 Hands-on Lab: Interactive Menu Script. Part 1 Lecture 672 Hands-on Lab: Interactive Menu Script. Part 2 Lecture 673 Hands-on Lab: Linux Administration Interactive Menu Scrip Lecture 674 Hands-on Lab: Linux Administration Interactive Menu Scrip Lecture 675 Functions in Bash. Part 1 Lecture 676 Functions in Bash. Part 2 Lecture 677 Error Handling and Debugging in Bash. Part 1 Lecture 678 Error Handling and Debugging in Bash. Part 2 Lecture 679 Error Handling and Debugging in Bash. Part 3 Lecture 680 Advanced Bash Scripting Techniques - Examples Explained. Lecture 681 Advanced Bash Scripting Techniques - Examples Explained. Lecture 682 Advanced Bash Scripting Techniques - Examples Explained. Lecture 683 Advanced Bash Scripting Techniques - Practical Example Wa Lecture 684 Bash Script Optimization and Performance. Part 1 Lecture 685 Bash Script Optimization and Performance. Part 2 Lecture 686 Bash Script Optimization and Performance. Part 3 Lecture 687 Bash Script Optimization and Performance. Part 4 Lecture 688 Bash Script Optimization and Performance. Practical Examp Lecture 689 Intro to Vagrant Lecture 690 Getting Installed Lecture 691 Using Vagrant Lecture 692 Using Vagrant. Part 2 Lecture 693 Using Vagrant. Part 3 Lecture 694 Using Vagrant. Part 4 Lecture 695 Using Vagrant. Part 5 Lecture 696 Using Vagrant. Part 6 Lecture 697 Using Vagrant. Part 7 Lecture 698 Using Vagrant. Part 8 Lecture 699 Creating VM in RHEL cockpit Lecture 700 Configuring VMs Lecture 701 Configuring the prerequisites on managed hosts Lecture 702 Setting up SSH Key-based Authentication Lecture 703 What is an Ansible Inventory? Lecture 704 Building an Ansible Inventory Lecture 705 Using Ansible Ad-Hoc Commands Lecture 706 Ansible Ad-Hoc Commands: A Practical Demonstration Lecture 707 Guided Exercise: Ansible Ad-Hoc Commands in Practice Lecture 708 Intro to Ansible Lecture 709 Getting Installed Lecture 710 Configuring SSH Lecture 711 Getting inventory Lecture 712 Using modules Lecture 713 Starting with Playbooks Lecture 714 Starting with Playbooks. Part 2 Lecture 715 Starting with Playbooks. Part 3 Lecture 716 Starting with Playbooks. Part 4 Lecture 717 Building Ansible Lab Environment Lecture 718 Describing Ansible Inventory Files Lecture 719 Guided Exercise: Ansible Inventory Files Lecture 720 Managing Ansible Configuaration Files Lecture 721 Managing Connectivity and Configuaration Files Lecture 722 Guided Exercise: Managing Ansible Configuaration Files Lecture 723 Running Ad Hoc Commands Lecture 724 Guided Exercise: Running Ad Hoc Commands Lecture 725 Lab: Deploying Ansible Lecture 726 Implementing Playbooks Lecture 727 Guided Exercise: Implementing Playbooks Lecture 728 Multiple Plays Lecture 729 Guided Exercise: Multiple Plays Lecture 730 Lab: Implementing Playbooks Lecture 731 Managing Variables Lecture 732 Guided Exercise: Managing Variables Lecture 733 Managing Secrets Lecture 734 Guided Exercise: Managing Secrets Lecture 735 Managing Facts Lecture 736 Guided Exercise: Managing Facts Lecture 737 Lab: Managing Variables and Facts Lecture 738 Writing Loops and Conditional Tasks Lecture 739 Guided Exercise: Writing Loops and Conditional Tasks Lecture 740 Implementing Handlers Lecture 741 Handling Task Failure Lecture 742 Guided Exercise: Handling Task Failure Lecture 743 Guided Lab:Implementing Task Control Lecture 744 Intro Lecture 745 Getting Installed Lecture 746 Configuring Git Lecture 747 Your First Commit Lecture 748 Using Push Lecture 749 Clone and Pull Lecture 750 Use Ignore Lecture 751 History Lecture 752 Use Branches Section 8: Powershell Lecture 753 Course overview Lecture 754 Overview of Part 1 Lecture 755 Powershell Overview Lecture 756 Powershell Versions Lecture 757 Get to know Two Host Applications Lecture 758 What Version are You Using Lecture 759 Always Run the Shell as Administrator Lecture 760 Tips and Tricks Lecture 761 Configuring the Console Lecture 762 Configuring the Console (demo) Lecture 763 Configuring the ISE Lecture 764 Configuring the ISE (demo) Lecture 765 LAB 1 Exercise 1 Lecture 766 LAB 1 Exercise 1 Answer Video Lecture 767 LAB 1 Exercise 2 Lecture 768 LAB 1 Exercise 2 Answer Video Lecture 769 LAB Review Lecture 770 Part 2 Overview Lecture 771 Commands that Seem Familiar Lecture 772 Learning Commands Syntax Lecture 773 Viewing Help (demo) Lecture 774 Finding Commands Lecture 775 Finding Commands (demo) Lecture 776 Interpreting Help Lecture 777 Updating Help Lecture 778 Updating and saving help files Lecture 779 Demo: Updating and saving help files Lecture 780 About Files Lecture 781 About Files (demo) Lecture 782 Part 3 Overview Lecture 783 Full Command Syntax Lecture 784 Specifying Multiple Parameter Value Lecture 785 Shortened Command Syntax Lecture 786 Show-Command Command Lecture 787 Commands that Modify the System Lecture 788 Show-Command (demo) Lecture 789 Commands that Modify the System (demo) Lecture 790 Lab B: Finding and Running Basic Commands Tasks Lecture 791 Lab B Solution: Finding and Running Basic Commands Lecture 792 Module Review and Takeaways Lecture 793 Course overview Lecture 794 Part 1 Overview Lecture 795 Understanding the Pipeline. Part 1. Lesson 1 Lecture 796 Understanding the Pipeline. Part 1. Lesson 2 Lecture 797 Understanding the Pipeline. Part 1. Lesson 3 Lecture 798 Understanding the Pipeline. Part 1. Lesson 4 Lecture 799 Understanding the Pipeline. Part 1. Lesson 5 Lecture 800 Understanding the Pipeline. Part 1. Lesson 6 T professionals and aspiring system administrators looking to advance their careers by mastering both Windows Server and Linux administration skills.,Recent IT graduates or career changers aiming to build a strong foundation in enterprise-level server administration across multiple operating systems.,Experienced Windows administrators looking to add Linux skills to their repertoire, or Linux admins wanting to become proficient in Windows Server environments.,Network administrators seeking to expand their expertise to include cross-platform server management and automation techniques. Download from RapidGator Premium Links Download from Keep2Share Download from UploadGig |