Catégorie : Ligne de commande

1 juin 2015 /

Objectifs de l’examen LPI 304 v.2

Topic 330: Virtualization

330.1 Virtualization Concepts and Theory (weight: 8)

Weight 8
Description Candidates should know and understand the general concepts, theory and terminology of Virtualization. This includes Xen, KVM and libvirt terminology.

Key Knowledge Areas:

  • Terminology
  • Pros and Cons of Virtualization
  • Variations of Virtual Machine Monitors
  • Migration of Physical to Virtual Machines
  • Migration of Virtual Machines between Host systems
  • Cloud Computing

The following is a partial list of the used files, terms and utilities:

  • Hypervisor
  • Hardware Virtual Machine (HVM)
  • Paravirtualization (PV)
  • Container Virtualization
  • Emulation and Simulation
  • CPU flags
  • /proc/cpuinfo
  • Migration (P2V, V2V)
  • IaaS, PaaS, SaaS

330.2 Xen (weight: 9)

Weight 9
Description Candidates should be able to install, configure, maintain, migrate and troubleshoot Xen installations. The focus is on Xen version 4.x.

Key Knowledge Areas:

  • Xen architecture, networking and storage
  • Xen configuration
  • Xen utilities
  • Troubleshooting Xen installations
  • Basic knowledge of XAPI
  • Awareness of XenStore
  • Awareness of Xen Boot Parameters
  • Awareness of the xm utility

The following is a partial list of the used files, terms and utilities:

  • Domain0 (Dom0), DomainU (DomU)
  • PV-DomU, HVM-DomU
  • /etc/xen/
  • xl
  • xl.cfg
  • xl.conf
  • xe
  • xentop

330.3 KVM (weight: 9)

Weight 9
Description Candidates should be able to install, configure, maintain, migrate and troubleshoot KVM installations.

Key Knowledge Areas:

  • KVM architecture, networking and storage
  • KVM configuration
  • KVM utilities
  • Troubleshooting KVM installations

The following is a partial list of the used files, terms and utilities:

  • Kernel modules: kvm, kvm-intel and kvm-amd
  • /etc/kvm/
  • /dev/kvm
  • kvm
  • KVM monitor
  • qemu
  • qemu-img

330.4 Other Virtualization Solutions (weight: 3)

Weight 3
Description Candidates should have some basic knowledge and experience with alternatives to Xen and KVM.

Key Knowledge Areas:

  • Basic knowledge of OpenVZ and LXC
  • Awareness of other virtualization technologies
  • Basic knowledge of virtualization provisioning tools

The following is a partial list of the used files, terms and utilities:

  • OpenVZ
  • VirtualBox
  • LXC
  • docker
  • packer
  • vagrant

330.5 Libvirt and Related Tools (weight: 5)

Weight 5
Description Candidates should have basic knowledge and experience with the libvirt library and commonly available tools.

Key Knowledge Areas:

  • libvirt architecture, networking and storage
  • Basic technical knowledge of libvirt and virsh
  • Awareness of oVirt

The following is a partial list of the used files, terms and utilities:

  • libvirtd
  • /etc/libvirt/
  • virsh
  • oVirt

330.6 Cloud Management Tools (weight: 2)

Weight 2
Description Candidates should have basic feature knowledge of commonly available cloud management tools.

Key Knowledge Areas:

  • Basic feature knowledge of OpenStack and CloudStack
  • Awareness of Eucalyptus and OpenNebula

The following is a partial list of the used files, terms and utilities:

  • OpenStack
  • CloudStack
  • Eucalyptus
  • OpenNebula

 

Topic 334: High Availability Cluster Management

334.1 High Availability Concepts and Theory (weight: 5)

Weight 5
Description Candidates should understand the properties and design approaches of high availability clusters.

Key Knowledge Areas:

  • Understand the most important cluster architectures.
  • Understand recovery and cluster reorganization mechanisms.
  • Design an appropriate cluster architecture for a given purpose.
  • Application aspects of high availability.
  • Operational considerations of high availability.

The following is a partial list of the used files, terms and utilities:

  • Active/Passive Cluster, Active/Active Cluster
  • Failover Cluster, Load Balanced Cluster
  • Shared-Nothing Cluster, Shared-Disk Cluster
  • Cluster resources
  • Cluster services
  • Quorum
  • Fencing
  • Split brain
  • Redundancy
  • Mean Time Before Failure (MTBF)
  • Mean Time To Repair (MTTR)
  • Service Level Agreement (SLA)
  • Desaster Recovery
  • Replication
  • Session handling

334.2 Load Balanced Clusters (weight: 6)

Weight 6
Description Candidates should know how to install, configure, maintain and troubleshoot LVS. This includes the configuration and use of keepalived and ldirectord. Candidates should further be able to install, configure, maintain and troubleshoot HAProxy.

Key Knowledge Areas:

  • Understanding of LVS / IPVS.
  • Basic knowledge of VRRP.
  • Configuration of keepalived.
  • Configuration of ldirectord.
  • Backend server network configuration.
  • Understanding of HAProxy.
  • Configuration of HAProxy.

The following is a partial list of the used files, terms and utilities:

  • ipvsadm
  • syncd
  • LVS Forwarding (NAT, Direct Routing, Tunneling, Local Node)
  • connection scheduling algorithms
  • keepalived configuration file
  • ldirectord configuration file
  • genhash
  • HAProxy configuration file
  • load balancing algorithms
  • ACLs

334.3 Failover Clusters (weight: 6)

Weight 6
Description Candidates should have experience in the installation, configuration, maintenance and troubleshooting of a Pacemaker cluster. This includes the use of Corosync. The focus is on Pacemaker 1.1 for Corosync 2.x.

Key Knowledge Areas:

  • Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd).
  • Pacemaker cluster configuration.
  • Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios).
  • Resource rules and constraints (location, order, colocation).
  • Advanced resource features (templates, groups, clone resources, multi-state resources).
  • Pacemaker management using pcs.
  • Pacemaker management using crmsh.
  • Configuration and Management of corosync in conjunction with Pacemaker.
  • Awareness of other cluster engines (OpenAIS, Heartbeat, CMAN).

The following is a partial list of the used files, terms and utilities:

  • pcs
  • crm
  • crm_mon
  • crm_verify
  • crm_simulate
  • crm_shadow
  • crm_resource
  • crm_attribute
  • crm_node
  • crm_standby
  • cibadmin
  • corosync.conf
  • authkey
  • corosync-cfgtool
  • corosync-cmapctl
  • corosync-quorumtool
  • stonith_admin

334.4 High Availability in Enterprise Linux Distributions (weight: 1)

Weight 1
Description Candidates should be aware of how enterprise Linux distributions integrate High Availability technologies.

Key Knowledge Areas:

  • Basic knowledge of Red Hat Enterprise Linux High Availability Add-On.
  • Basic knowledge of SUSE Linux Enterprise High Availability Extension.

The following is a partial list of the used files, terms and utilities:

  • Distribution specific configuration tools
  • Integration of cluster engines, load balancers, storage technology, cluster filesystems, etc.

Topic 335: High Availability Cluster Storage

335.1 DRBD / cLVM (weight: 3)

Weight 3
Description Candidates are expected to have the experience and knowledge to install, configure, maintain and troubleshoot DRBD devices. This includes integration with Pacemaker. DRBD configuration of version 8.4.x is covered. Candidates are further expected to be able to manage LVM configuration within a shared storage cluster.

Key Knowledge Areas:

  • Understanding of DRBD resources, states and replication modes.
  • Configuration of DRBD resources, networking, disks and devices.
  • Configuration of DRBD automatic recovery and error handling.
  • Management of DRBD using drbdadm.
  • Basic knowledge of drbdsetup and drbdmeta.
  • Integration of DRBD with Pacemaker.
  • cLVM
  • Integration of cLVM with Pacemaker.

The following is a partial list of the used files, terms and utilities:

  • Protocol A, B and C
  • Primary, Secondary
  • Three-way replication
  • drbd kernel module
  • drbdadm
  • drbdsetup
  • drbdmeta
  • /etc/drbd.conf
  • /proc/drbd
  • LVM2
  • clvmd
  • vgchange, vgs

335.2 Clustered File Systems (weight: 3)

Weight 3
Description Candidates should know how to install, maintain and troubleshoot installations using GFS2 and OCFS2. This includes integration with Pacemaker as well as awareness of other clustered filesystems available in a Linux environment.

Key Knowledge Areas:

  • Understand the principles of cluster file systems.
  • Create, maintain and troubleshoot GFS2 file systems in a cluster.
  • Create, maintain and troubleshoot OCFS2 file systems in a cluster.
  • Integration of GFS2 and OCFS2 with Pacemaker.
  • Awareness of the O2CB cluster stack.
  • Awareness of other commonly used clustered file systems.

The following is a partial list of the used files, terms and utilities:

  • Distributed Lock Manager (DLM)
  • mkfs.gfs2
  • mount.gfs2
  • fsck.gfs2
  • gfs2_grow
  • gfs2_edit
  • gfs2_jadd
  • mkfs.ocfs2
  • mount.ocfs2
  • fsck.ocfs2
  • tunefs.ocfs2
  • mounted.ocfs2
  • o2info
  • o2image
  • CephFS
  • GlusterFS
  • AFS
1 juin 2015 /

Objectifs de l’examen LPI 303 v.2

Topic 320: Cryptography

320.1 X.509 Certificates and Public Key Infrastructures

Weight To be determined
Description Candidates should understand X.509 certificates and public key infrastructures. They should know how to configure and use OpenSSL to implement certification authorities and issue SSL certificates for various purposes.

Key Knowledge Areas:

  • Understand X.509 certificates, X.509 certificate lifecycle, X.509 certificate fields and X.509v3 certificate extensions.
  • Understand trust chains and public key infrastructures.
  • Generate and manage public and private keys.
  • Create, operate and secure a certification authority.
  • Request, sign and manage server and client certificates.
  • Revoce certificates and certification authorities.

The following is a partial list of the used files, terms and utilities:

  • openssl, including relevant subcommands
  • OpenSSL configuration
  • PEM, DER, PKCS
  • CSR
  • CRL
  • OCSP

320.2 X.509 Certificates for Encryption, Signing and Authentication

Weight To be determined
Description Candidates should know how to use X.509 certificates for both server and client authentication. Candidates should be able to implement user and server authentication for Apache HTTPD.

Key Knowledge Areas:

  • Understand of SSL, TLS and protocol versions.
  • Understand common transport layer security threats (i.e. Man-in-the-Middle).
  • Configure Apache HTTPD with mod_ssl to provide HTTPS service.
  • Configure Apache HTTPD with mod_ssl to authenticate users using certificates.
  • Configure Apache HTTPD with mod_ssl to provide OSCP stapling.
  • Use OpenSSL for SSL/TLS client and server tests.

The following is a partial list of the used files, terms and utilities:

  • Intermediate certification authorities
  • Cipher configuration (no cipher-specific knowledge)
  • httpd.conf
  • mod_ssl
  • openssl

320.3 Advanced GPG

Weight To be determined
Description Candidates should know how to use GPG. This includes key generation, signing and publishing to key servers. Managing multiple private keys and IDs is also included.

Key Knowledge Areas:

  • Use GPG for encryption and signing.
  • Configure GPG.
  • Manage private and public keys.
  • Interact with GPG key servers to publish and retrieve public keys.

The following is a partial list of the used files, terms and utilities:

  • gpg
  • gpgv
  • gpg-agent
  • ~/.gnupg/*

320.4 Encrypted Filesystems

Weight To be determined
Description Candidates should be able to setup and configure encrypted filesystems.

Key Knowledge Areas:

  • Understand block device and filesystem encryption.
  • Use dm-crypt with LUKS to encrypt block devices.
  • Use eCryptfs to encrypt file systems, including home directories and PAM integration.
  • Be aware of plain dm-crypt and EncFS.

The following is a partial list of the used files, terms and utilities:

  • cryptsetup
  • cryptmount
  • /etc/crypttab
  • ecryptfsd
  • ecryptfs-* commands
  • mount.ecryptfs, umount.ecryptfs
  • pam_ecryptfs

320.5 DNS and cryptography

Weight To be determined
Description Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND.

Key Knowledge Areas:

  • Understand of DNSSEC and DANE.
  • Configure and troubleshoot BIND as an authoriative nameserver serving DNSSEC secured zones.
  • Configure BIND as an recursive nameserver that performs DNSSEC validation on behalf of its clients.
  • Use DANE to publish X.509 certificate information in DNS.

The following is a partial list of the used files, terms and utilities:

  • DNS, EDNS, Zones, Resource Records
  • DNS resource records: DS, DNSKEY, RRSIG, NSEC, NSEC3, NSEC3PARAM, TLSA
  • DO-Bit, AD-Bit
  • Key Signing Key, Zone Signing Key, Key Tag
  • Key generation, key storage, key management and key rollover
  • Maintenance and re-signing of zones
  • named.conf
  • dnssec-keygen
  • dnssec-signzone
  • dnssec-settime
  • dnssec-dsfromkey
  • rndc
  • dig
  • delv
  • openssl

320.6 OpenSSH

Weight To be determined
Description Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services.

Key Knowledge Areas:

  • Configure and use OpenSSH.
  • Manage OpenSSH keys and access control.
  • Be aware of SSH protocol v1 and v2 security issues.

The following is a partial list of the used files, terms and utilities:

  • /etc/ssh/*
  • ~/.ssh/*
  • ssh-keygen
  • ssh-agent
  • ssh-vulnkey

 

Topic 321: Host security

321.1 Host Hardening

Weight To be determined
Description Candidates should be able to secure computers running Linux against common threats. This includes kernel and software configuration.

Key Knowledge Areas:

  • Configure BIOS and bootloader security.
  • Disable useless software and services.
  • Use sysctl for security related kernel configuration (i.e. ASLR, Exec-Shield and IP / ICMP configuration).
  • Limit resource usage.
  • Work with chroot environments.
  • Be aware of the security advantages of Virtualization.

The following is a partial list of the used files, terms and utilities:

  • grub.cfg
  • chkconfig, systemctl
  • ulimit
  • /etc/security/limits.conf
  • chroot
  • sysctl
  • /etc/sysctl.conf

321.2 Host Intrusion Detection

Weight To be determined
Description Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes updates and maintenance as well as automated host scans.

Key Knowledge Areas:

  • Use and configure the Linux Auditing System.
  • Use chkrootkit.
  • Use and configure rkhunter, including updates.
  • Use Linux Malware Detect.
  • Automate host scans using cron.
  • Configure and use AIDE, including rule management.
  • Be aware of OpenSCAP.

The following is a partial list of the used files, terms and utilities:

  • auditd
  • auditctl
  • ausearch, aureport
  • /etc/auditd/auditd.conf
  • /etc/auditd/auditd.rules
  • pam_tty_audit
  • chkrootkit
  • rkhunter
  • /etc/rkhunter.conf
  • maldet
  • conf.maldet
  • aide
  • /etc/aide/aide.conf

321.3 User Management and Authentication

Weight To be determined
Description Candidates should be familiar with management and authentication of user accounts. This includes configuration and use of NSS, PAM, SSSD and kerberos for both local and remote directories and authentication mechanisms as well as enforcing a password policy.

Key Knowledge Areas:

  • Understand and configure NSS.
  • Understand and configure PAM.
  • Enforce password complexity policies and periodic password changes.
  • Lock accounts automatically after failed login attempts.
  • Configure and use SSSD.
  • Configure NSS and PAM for use with SSSD.
  • Configure SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains.
  • Obtain and manage kerberos tickets.

The following is a partial list of the used files, terms and utilities:

  • nsswitch.conf
  • /etc/login.defs
  • pam_cracklib
  • chage
  • pam_tally
  • faillog
  • pam_sss
  • sssd
  • sssd.conf
  • sss_* commands
  • krb5.conf
  • kinit, klist, kdestroy

321.4 FreeIPA Installation and Samba Integration

Weight To be considered
Description Candidates should be familiar with FreeIPA v4.x. This includes installation and maintenance of a server instance with a FreeIPA domain as well as integration of FreeIPA with Active Directory.

Key Knowledge Areas:

  • Understand FreeIPA, including its architecture and components.
  • Understand system and configuration prerequisites for installing FreeIPA.
  • Install and manage a FreeIPA server and domain.
  • Understand and configure Active Directory replication and kerberos cross-realm trusts.
  • Be aware of sudo, autofs, SSH and SELinux integration in FreeIPA.

The following is a partial list of the used files, terms and utilities:

  • 389 Directory Server, MIT Kerberos, Dogtag Certificate System, NTP, DNS, SSSD, Certmonger
  • ipa, including relevant subcommands
  • ipa-server-install, ipa-client-install, ipa-adtrust-install, ipa-replica-install
  • ipa-replica-prepare, ipa-replica-manage

 

Topic 322: Access Control

322.1 Discretionary Access Control

Weight To be determined
Description Candidates are required to understand Discretionary Access Control and know how to implement it using Access Control Lists. Furthermore, Candidates are required to understand and know how to use Extended Attributes.

Key Knowledge Areas:

  • Understand and manage file ownership and permissions, including SUID.
  • Understand and manage access control lists.
  • Understand and manage extended attributes and attribute classes.

The following is a partial list of the used files, terms and utilities:

  • getfacl
  • setfacl
  • getfattr
  • setfattr

322.2 Mandatory Access Control

Weight To be determined
Description Candidates should be familiar with Mandatory Access Control systems for Linux. In especially, Candidates should have a thorough knowledge of SELinux. Furthermore, Candidates should be aware of other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.

Key Knowledge Areas:

  • Understand the concepts of TE, RBAC, MAC and DAC.
  • Configure, manage and use SELinux.
  • Be aware of AppArmor.

The following is a partial list of the used files, terms and utilities:

  • getenforce, setenforce, selinuxenabled
  • getsebool, setsebol, togglesebool
  • fixfiles, restorecon, setfiles
  • newrole, runcon
  • semanage
  • sestatus, seinfo
  • apol
  • seaudit, seaudit-report, audit2why, audit2allow
  • /etc/selinux/*

322.3 Network file systems

Weight To be determined
Description Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 clients and servers as well as CIFS client services. Earlier versions of NFS are not required knowledge.

Key Knowledge Areas:

  • Understand NFSv4 security issues and improvements.
  • Configure NFSv4 server and clients.
  • Understand and configure NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos).
  • Understand and use NFSv4 pseudo filesystem.
  • Understand and use NFSv4 ACLs.
  • Configure CIFS clients.
  • Understand and use CIFS Unix Extensions.
  • Understand and configure CIFS security modes (NTLM, Kerberos).
  • Understand and manage mapping and handling of CIFS ACLs and SIDs in a Linux system.

The following is a partial list of the used files, terms and utilities:

  • /etc/exports
  • /etc/idmap.conf
  • nfs4acl
  • mount.cifs parameters related to ownership, permissions and security modes
  • winbind
  • getcifsacl, setcifsacl

 

Topic 324: Network Security

324.1 Network Hardening

Weight To be determined
Description Candidates should be able to secure networks against common threats. This includes verification of the effectiveness of security measures.

Key Knowledge Areas:

  • Configure FreeRADIUS to authenticate network nodes.
  • Use nmap to scan networks and hosts, including different scan methods.
  • Use Wireshark to analyze network traffic, including filters and statistics.
  • Understand and combat rogue router advertisements and DHCP servers.

The following is a partial list of the used files, terms and utilities:

  • radiusd
  • radmin
  • radtest, radclient
  • radlast, radwho
  • radiusd.conf
  • /etc/raddb/*
  • nmap
  • wireshark
  • tshark
  • tcpdump
  • ndpmon

324.2 Network Intrusion Detection

Weight To be determined
Description Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updates and maintenance of security scanners.

Key Knowledge Areas:

  • Implement bandwith usage monitoring.
  • Configure and use Snort, including rule management.
  • Configure and use OpenVAS, including NASL.

The following is a partial list of the used files, terms and utilities:

  • ntop
  • Cacti
  • snort
  • snort-stat
  • /etc/snort/*
  • openvas-adduser, openvas-rmuser
  • openvas-nvt-sync
  • openvassd
  • openvas-mkcert
  • /etc/openvas/*

324.3 Packet Filtering

Weight To be determined
Description Candidates should be familiar with the use and configuration of packet filters. This includes netfilter, iptables and ip6tables as well as awareness of nftables, nft and ebtables.

Key Knowledge Areas:

  • Understand common firewall architectures, including DMZ.
  • Understand and use netfilter, iptables and ip6tables, including standard modules, tests and targets.
  • Implement packet filtering for both IPv4 and IPv6.
  • Implement connection tracking and network address translation.
  • Define ipsets and use them in netfilter rules.
  • Have basic knowledge of nftables and nft.
  • Have basic knowledge of ebtables.
  • Be aware of conntrackd.

The following is a partial list of the used files, terms and utilities:

  • iptables
  • ip6tables
  • iptables-save, iptables-restore
  • ip6tables-save, ip6tables-restore
  • ipset
  • nft
  • ebtables

324.4 OpenVPN

Weight To be determined
Description Candidates should be familiar with the use of OpenVPN.

Key Knowledge Areas:

  • Configure and operate OpenVPN server and clients for both bridged and routed VPN networks.

The following is a partial list of the used files, terms and utilities:

  • /etc/openvpn/*
  • openvpn server and client

Other Comments for consideration

As examples, following items are not in the current objectives:

1) Related to Wireless LAN: (Note: It’s not only for Linux though, it is necessary to consider because there are many points to be taken care for configuration in terms of security measure.)

Some aspects (i.e. Radius) are implemented in V2 (fth)

2) Related to IPv6: Not only IPv4, but also IPv6 should be considered.

Implemented in V2 wherever applicable (fth)

3) Security features in Linux: For example, ASLR and Exec-Shield (ASCII Armor) should be considered, because it causes security level lower if those are disabled.

Implemented in host hardening in V2 (fth)

4) Related to Forensics: In the survey of malware’s behavior, Sleuth Kit would be used to analyze the hard disk on Linux machine. Also in some cases, LVM commands would be used to restore the disk which became un-mountable. So that this area should be learned.

This is an interesting topic, but it goes beyond basic security in the sense it « prevention and defending ». This is postmortal analysis. As the exam already contains a lot of topic this is postponed but up to discussion (fth)

5) Database (RDB, NoSQL) security: Because Application Security (bind, apache, etc.) is covered now, this item would be nice to cover. And this item is listed in the CIF, security contest almost every time. Also the counter-measure in server side is necessary.

As the other software / service aspects beyond Linux system security have been dropped this is considered out of scope for now too (fth)

6) Related to OpenFlow: There are several points to be considered in terms of security measure about the configuration of OpenFlow.

This is considered as an application aspect which seems to be beyond the scope for not (fth).

7) RADIUS: This was covered in 301 though, this is not covered now. This should be covered.

Implemented in V2 (fth)

8) DNS: More DNSSEC and DANE.

Implemented in V2 (fth)

9) Secure development, hardening

Hardening has been implemented for both hosts and networks in V2 (fth), Secure development is considered out of scope for now (fth)

1 juin 2015 /

Objectifs

Objectif 1 : Communauté Linux et carrière dans le logiciel libre (valeur : 7)

1.1 Évolution de Linux et systèmes d’exploitation populaires

Valeur 2
Description Connaissance du développement de Linux et des distributions majeures.

Domaines de connaissance les plus importants :

  • Philosophie des Logiciels libres.
  • Distributions.
  • Systèmes embarqués.

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • Android.
  • Debian.
  • CentOS.

Autres notions intéressantes à connaître :

1.2 Applications libres majeures

Valeur 2
Description Connaissance des applications majeures et de leur utilisation.

Domaines de connaissance les plus importants :

  • Applications pour les postes de travail.
  • Applications pour les serveurs.
  • Applications mobiles.
  • Langages de programmation.
  • Outils de gestion des paquets et dépôts de logiciels.

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • OpenOffice.org, LibreOffice, Thunderbird, Firefox.
  • Blender, Gimp, Audacity, ImageMagick.
  • Apache, MySQL, PostgreSQL.
  • NFS, Samba, OpenLDAP, Postfix, DNS, DHCP.
  • C, Java, Perl, shell, Python, PHP.

Autres notions intéressantes à connaître :

1.3 Compréhension des principes des logiciels libres et de la gestion des licences

Valeur 1
Description Communautés autour des logiciels libres et utilisation des licences libres dans le cadre professionnel.

Domaines de connaissance les plus importants :

  • Octroi de licence.
  • Free Software Foundation (FSF), Open Source Initiative (OSI).

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • GPL, BSD, Creative Commons.
  • Logiciel libre, logiciel Open Source, FOSS, FLOSS.
  • Modèles économiques autour des logiciels libres

Autres notions intéressantes à connaître :

  • Propriété intellectuelle : copyright, marques de commercialisation, brevets.
  • License Apache, Licence Mozilla.

1.4 Compétences informatiques et travail sous Linux

Valeur 2
Description Compétences informatiques élémentaires et travail sous Linux.

Domaines de connaissance les plus importants :

  • Utilisation de l’environnement graphique.
  • Accès à la ligne de commande.
  • Utilisation industrielle de Linux, informatique dans les nuages (Cloud Computing) et virtualisation.

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • Utilisation d’un navigateur, questions de vie privée, options de configuration, recherche sur le web et enrégistrement de contenu.
  • Console et terminal.
  • Questions de mots de passe.
  • Outils et questions de la vie privée.
  • Utilisation de logiciels libres courants pour les présentations et la gestion de projets.

Autres notions intéressantes à connaître :

Objectif 2 : Bases sur le système Linux (valeur : 8)

2.1 Bases sur la ligne de commande

Valeur 2
Description Utilisation élémentaire de la ligne de commande Linux.

Domaines de connaissance les plus importants :

  • Utilisation élémentaire du shell.
  • Syntaxe des commandes.
  • Options de la ligne de commande.
  • Variables.
  • Caractères de substitution.
  • Utilisation des guillemets.

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • echo.
  • history.
  • Variable d’environnement PATH.
  • export.
  • which.

Autres notions intéressantes à connaître :

  • Substitutions.
  • Opérateurs ||, && et ;.

2.2 Utilisation de la ligne de commande pour obtenir de l’aide

Valeur 2
Description Commandes d’aide et navigation dans les différents systèmes d’aide.

Domaines de connaissance les plus importants :

  • Man.
  • Info.

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • man.
  • info.
  • Pages de manuel.
  • /usr/share/doc.
  • locate.

Autres notions intéressantes à connaître :

  • apropos, whatis, whereis.

2.3 Utilisation des répertoires et liste des fichiers

Valeur 2
Description Parcours des répertoires personnels et systèmes et affichage de la liste des fichiers à différents endroits.

Domaines de connaissance les plus importants :

  • Fichiers, répertoires.
  • Fichiers et répertoires cachés.
  • Répertoire personnel.
  • Chemins absolus et relatifs.

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • Options courantes pour ls.
  • Liste récursive.
  • cd .
  • . et ...
  • répertoire personnel et ~.

Autres notions intéressantes à connaître :

2.4 Création, déplacement et suppression de fichiers

Valeur 2
Description Création, déplacement et suppression des fichiers et répertoires dans le répertoire personnel.

Domaines de connaissance les plus importants :

  • Fichiers et répertoires.
  • Sensibilité à la casse.
  • Utilisation simple des jockers et des guillemets.

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • mv, cp, rm, touch.
  • mkdir, rmdir.

Autres notions intéressantes à connaître :

Objectif 3 : Le pouvoir de la ligne de commande (valeur : 10)

3.1 Archivage de fichiers en ligne de commande

Valeur 2
Description Archivage de fichiers dans le répertoire personnel.

Domaines de connaissance les plus importants :

  • Fichiers, répertoires.
  • Archives, compression.

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • tar.
  • Options courantes de tar.
  • gzip, bzip2.
  • zip, unzip.

Autres notions intéressantes à connaître :

  • Extraction de fichiers individuels à partir d’archives.

3.2 Recherche et extraction de données à partir de fichiers

Valeur 4
Description Recherche et extraction de données à partir de fichiers dans le répertoire personnel.

Domaines de connaissance les plus importants :

  • Utilisation des tubes (pipe).
  • Redirections d’entrées / sorties.
  • Expressions rationnelles POSIX partielles (., [ ], *, ?).

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • find.
  • grep.
  • less.
  • cat, head, tail.
  • sort.
  • cut.
  • wc.

Autres notions intéressantes à connaître :

  • Expressions rationnelles POSIX élémentaires partielles ([^ ], ^, $).
  • Expressions rationnelles POSIX étendues partielles (+, (), |).
  • xargs.

3.3 Conversion de commandes en script

Valeur 4
Description Conversion de commandes répétitives en scripts simples.

Domaines de connaissance les plus importants :

  • Édition de texte élémentaire.
  • Écriture de scripts shell simples.

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • /bin/sh.
  • Variables.
  • Arguments.
  • Boucles for.
  • echo.
  • État de sortie.
  • Nom des éditeurs de texte courants.

Autres notions intéressantes à connaître :

  • Utilisation de pico, nano, vi (uniquement les bases pour écrire des scripts).
  • Bash.
  • instructions if, while, case.
  • Commandes read, test, et [.

Objectif 4 : Le Système d’exploitation Linux (valeur : 8)

4.1 Choix d’un système d’exploitation

Valeur 1
Description Connaissance des systèmes d’exploitations les plus réputés et des distributions Linux.

Domaines de connaissance les plus importants :

  • Différences entre Windows, Mac et Linux .
  • Cycle de développement des distributions.

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • Interface graphique versus ligne de commande, configuration du bureau.
  • Cycles de maintenance, beta et stable.

Autres notions intéressantes à connaître :

4.2 Compréhension du matériel informatique

Valeur 2
Description Familiarité avec les composants matériels des serveurs et des postes de travail.

Domaines de connaissance les plus importants :

  • Matériel.

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • Disques durs et partitions, cartes mères, processeurs, alimentations, disques optiques, périphériques.
  • Types d’écrans.
  • Pilotes.

Autres notions intéressantes à connaître :

4.3 Localisation des données

Valeur 3
Description Localisation des différents types d’informations sur un système Linux.

Domaines de connaissance les plus importants :

  • Noyau.
  • Processus.
  • syslog, klog, dmesg.
  • /lib, /usr/lib, /etc, /var/log.

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • Programmes, bibliothèques, paquets et bases des paquets, configuration système.
  • Processus et tables de processus, adresses mémoire, journaux et informations système.
  • ps, top, free.

Autres notions intéressantes à connaître :

4.4 Intégration au réseau

Valeur 2
Description Informations de configuration réseau vitales et détermination des besoins minimaux pour intégrer un ordinateur sur un réseau local (LAN).

Domaines de connaissance les plus importants :

  • Internet, réseau, routeurs.
  • Service de noms de domaine (DNS).
  • Configuration réseau.

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • route.
  • resolv.conf.
  • IPv4, IPv6.
  • ifconfig.
  • netstat.
  • ping.

Autres notions intéressantes à connaître :

  • ssh.
  • dig.

Objectif 5 : Securité et droits d’accès aux fichiers (valeur : 7)

5.1 Sécurité élémentaire et identification des types d’utilisateurs

Valeur 2
Description Différents types d’utilisaturs sur un système Linux.

Domaines de connaissance les plus importants :

  • Root et utiisateurs standards.
  • Comptes utilisateurs système.

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • /etc/passwd, /etc/group.
  • id, who, w.
  • sudo.

Autres notions intéressantes à connaître :

  • su.

5.2 Création des utilisateurs et des groupes

Valeur 2
Description Création des utilisateurs et des groupes sur un système Linux.

Domaines de connaissance les plus importants :

  • COmmandes d’administration des utilisateurs et des groupes.
  • Identifiants utilisateurs (ID).

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • /etc/passwd, /etc/shadow, /etc/group.
  • id, last.
  • useradd, groupadd.
  • passwd.

Autres notions intéressantes à connaître :

  • usermod, userdel.
  • groupmod, groupdel.

5.3 Gestion des propriétés et des droits d’accès aux fichiers

Valeur 2
Description Compréhension et modification des propriétés et des droits d’accès aux fichiers.

Domaines de connaissance les plus importants :

  • Droits d’accès et propriétaires des fichiers et répertoires.

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • ls -l.
  • chmod, chown.

Autres notions intéressantes à connaître :

  • chgrp.

5.4 Répertoires et fichiers spéciaux

Valeur 1
Description Répertoires, fichiers et droits spéciaux sur un système Linux.

Domaines de connaissance les plus importants :

  • FIchiers systèmes, bibliothèques.
  • Liens symboliques.

Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :

  • /etc, /var.
  • /tmp, /var/tmp et sticky bit.
  • ls -d.
  • ln -s.

Autres notions intéressantes à connaître :

  • Liens physiques.
  • Setuid/Setgid.