This course explores the various tools and techniques commonly used by Linux system administrators and end-users to achieve their day-to-day work in a Linux environment using automation techniques. Linux Operations course is designed for experienced computer users who have limited or no previous exposure to Linux, whether they are working in an individual or Enterprise environment.
A Utah-based wind and solar energy company have suffered from a Denial-of-service attack that caused a shut off to a part of the company computing assets. You need to analyze the captured traffic to learn about the attack and the attacker.
A recent update by Oracle appeared to be bugged; hackers can exploit this vulnerability. Your mission is to scan the company’s assets and discover service versions to protect them from the recent bug.
An attempt was made to intrude on a US utility’s Firewall. The incident caused a brief communication disruption between remote sites. You have been hired to study the Firewall strength and weaknesses to block the next attempt.