Srs,

Possuo 5 fitas de video lacradas de cursos avançado de Linux da Keystone
Learning Systems de Provo Utah (terra da Novell tb).

Como estou de mudança para Utah em poucos dias quero vende-las. Estou em São
Paulo e vou vender os cursos antes disso. Quem estiver interessado me
contate por e-mail. Fico em Sào Paulo até dia 25/04 e depois podem me
contatar por e-mail. As fitas irão ficar em São Paulo.

Ao invés de gastar fortunas em cursos no Brazil que prometem e não entregam
compre as fitas e apreenda na sua casa com todo o conforto. As fitas são
originais em Inglês (é claro que não tem legenda). Desconheço de videos em
Portugues de qualidade sobre Linux.

O site da Keystone Learning Systems para quem quer ver é : www.klscorp.com É
a melhor empresa de treinamento de informática em video nos EUA com grandes
clientes.

As fitas são da série : Red Hat Linux Networking and Security Level 1,2,3,4
e 5.

As 5 fitas custam nos EUA US$ 469.95 + taxas de envio (R$300 se for Fedex) +
impostos que serão cobrados ao chegar ao Brazil. Note que impostos para
essas fitas quase dobram seu valor.

Como as fitas já estão em Sao Paulo e eu já paguei os impostos e frete posso
faze-las por um preço bom que é bem menos que custaria um curso básico em
São Paulo em lugares como a Impacta e ou Linuxcenter.

As fitas estão em formato VHS e em Pal-m. Funciona em todos os videos
principalmente nos novos compatíveis com Pal-m ou que tem a opção
AUTO/PALM/NTSC. Portanto, certifique-se que seu video roda Palm também.

Para quem entende Ingles e está a fim de aprender Linux essa é a pedida.

Aqui está o que contem em cada fita :

(Course 253) Networking & Security Level 1 (2 hrs 7 mins)
1.0 Networking on Linux (23 Mins)
1.1 Underst&ing Linux Networking
1.2 A Few Key Protocols
1.3 Using Comm& Line Tools to Configure Networking
1.4 Using LinuxConf to configure Networking
1.5 Ethernet & Dial Up Networking
1.6 The Network Card, the interface, & the route
2.0 Troubleshooting Networking (9 Mins)
2.1 Using the Ping Comm& (Problems with this)
2.2 Checking Ifconfig & route
3.0 Dial-up Networking (12 Mins)
3.1 Protocols
3.2 Working with an ISP
4.0 DHCP (14 Mins)
4.1 Configuring the DHCP Server
4.2 The DHCP Client
 5.0 Introducing Domain Name Service-DNS (15 Mins)
5.1 Subdomains & Zones
5.2 Configuring the Client Side of DNS
6.0 Server-side DNS (33 Mins)
6.1 Configuring DNS Server
6.2 PTR Record
6.3 Utilities
7.0 Network Information Service (15 Mins)
7.1 Underst&ing the Purpose of NIS/NFS
7.2 The YP Comm&
7.3 The R Comm&s

(Course 253) Networking & Security Level 2 (1 Hr 49 Mins)
1.0 Introducing Samba (53 Mins)
1.1 Purpose & Background of Samba
1.2 Installing the Packages
1.3 Setting up Core Configuration Options
1.4 Setting up Shares
1.5 Security & Password Issues
1.6 Client Testing
1.7 Setting up the smb.conf Configuration File
1.8 The Print Tool
2.0 The LDAP Directory Protocol (6 Mins)
2.1 Underst&ing LDAP
2.2 Setting up an LDAP Server
 3.0 Underst&ing E-mail on Linux (10 Mins)
3.1 Security Considerations & Transfer Agents
4.0 Basic Sendmail Configuration (19 Mins)
4.1 Overview of Configuration Files
4.2 Using e-mail Aliases
4.3 Linux Conf
5.0 Using the Procmail Delivery Agent (6 Mins)
5.1 Underst&ing the Purpose of Procmail
5.2 Setting up Procmail recipes
6.0 Mail Relay Agents: POP & IMAP (14 Mins)
6.1 Using POP & IMAP


(Course 253) Networking & Security Level 3 (2 Hrs 2 Mins)
1.0 Basic Apache Web Server Configuration (16 Mins)
1.1 Features of Apache
1.2 Packages
2.0 Httpd.conf (37 Mins)
2.1 Httpd.conf
3.0 Server Resource Management (17 Mins)
3.1 Srm.conf
4.0 Access.conf (18 Mins)
 4.1 Access.conf
5.0 Advanced Features of Apache (24 Mins)
5.1 Virtual Hosting, Server-side Includes, & CGI
6.0 Apache Modules (10 Mins)
6.1 Locating Modules (Free & Commercial)


(Course 253) Networking & Security Level 4 (1 Hr 56 Mins)
1.0 Security Basics (10 Mins)
1.1 Reasons for Security-Protection from Disaster, Malice & Accident
1.2 Physical, User, & Network Security
1.3 Defining some Security-related Terms
1.4 Cryptography-algorithms/symmetric & Asymmetric
2.0 Physical Security (11 Mins)
2.1 Hard Drive Removal, Booting form Floppy & BIOS Passwords
2.2 LILO Prompt run Levels & Passwords
2.3 Using the Sticky Bit
2.4 Session Security
3.0 User Security (29 Mins)
3.1 Reviewing File System Permissions
3.2 Monitoring Login Attempts
3.3 Dangling Files from Deleted Users
3.4 Securetty & Nologin Files
3.5 Using File Attributes
3.6 Using Su & Sudo
 4.0 Passwords (8 Mins)
4.1 The Passwd & Shadow Files
4.2 MD5 & authconfig
4.3 Pwconv & related Utilities
4.4 Cracklib & the Linux.words Library
5.0 Pluggable Authentication Modules (18 Mins)
5.1 Defining PAM & PAM Clients
5.2 Reviewing the Directories /lib/security & /etc/pam.d & /etc/security
5.3 The access.conf & time.conf files
6.0 Public Private Key Systems (11 Mins)
6.1 Underst&ing the Key Exchange
7.0 Controlling User Access to Resources (16 Mins)
7.1 Clobberd & Clobberedit
7.2 Limits
7.3 Process Accounting
8.0 Network Security (13 Mins)
8.1 Inetd


(Course 253) Networking & Security Level 5 (1 Hr 54 Mins)
1.0 TCP Wrappers (26 Mins)
1.1 Host Allow & Host Deny
1.2 Host Options
1.3 tcpdchk & tcpdmatch
1.4 identd
1.5 Plaintext Network Services
1.6 SAINT & Nessus
2.0 Network Routing (16 Mins)
2.1 Understaing Network Traffic (drop v forward)
2.3 Underst&ing Dynamic Routing
2.4 The Traceroute Comm&
2.5 Optimizing the Kernel for Routing
3.0 Advanced Routing Techniques (28 Mins)
3.1 Three Advanced Routing Techniques
3.2 Using a Traditional Proxy Server with Client Configuation
3.3 Using a Transparent Proxy with Port Forwarding
3.4 Using network Address Translation/IP Masquerading
 3.5 Red Hat's Piranah Virtual Server
3.6 Portscanners, Sniffers, TCPdump & Ethereal
3.7 IPTraf Interface
4.0 Display Security (8 Mins)
4.1 Xhost for Host-based Security
4.2 Xauth for more Precise Security
5.0 The Secure Shell (SSH) (10 Mins)
5.1 Defining the Importance of SSH
5.2 Generating Keys
5.3 Authentication Layers
5.4 Using SSH & SCP
5.5 Tunneling Other Protocols Over SSH
6.0 Firewalls & IP Chains (11 Mins)
6.1 Underst&ing Firewalls & IP Chains
6.2 Setting default Policies
6.3 Setting Up IP Masquerading
6.4 Adding Rules
6.5 Additional Resources

Os interessados contatar Carlos Fernando Scheidecker Antunes nesse e-mail.

Grato.



Assinantes em 17/04/2001: 2224
Mensagens recebidas desde 07/01/1999: 109555
Historico e [des]cadastramento: http://linux-br.conectiva.com.br
Assuntos administrativos e problemas com a lista: 
            mailto:[EMAIL PROTECTED]

Responder a