The following is a list of topics, PowerPoint and reading references.
| Module | Topic | PowerPoint | |
|---|---|---|---|
| Module 1 | Shells | Shell basics | |
| Module 2 | Scripts | Scripts | |
| Module 3 | Utilities and Filters | Utilities and Filters | |
| Module 4 | NTP | NTP | |
| Module 5 | Syslog | Syslog | |
| Module 6 | SSH | SSH | |
| Module 7 | DNS | DNS | |
| Module 8 | File Systems | File Systems | |
| Module 9 | System Auditing | System Auditing | |
| Module 10 |
System Hardening | System Hardening | |
| Module 11 | Network Auditing | Network Auditing | |
| Module 12 | Wireless Part I | Wireless I Notes | |
| Module 13 | Wireless Part II | Wireless II Notes | |
| Module 14 |
Network Hardening | Network Hardening | |
| Module 16 | LDAP | LDAP | |
| Module 17 | TLS and Email | TLS, E-Mail and SPF | |
| Module 18 |
SPF | SPF | |
| Module19 | User Management including Kerberos | User Management/Kerberos | |
| Module 20 | System Administration Ia | SystemAdminIa | |
| Module 21 |
System Administration Ib | SystemAdminIb | |
| Module 22 | System Administration II) | SystemAdminII | |
| Module 23 | Replication/Load Balancing | Replication & Load Balancing | |
| Module 24 | AWK | AWK | |
| Module 26 | Configuration Management | Configuration Management | |
| Module 27 | Security Policies | Security Policies | |
| Module 28 | SNMP |
SNMP |