<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.lpi.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Babafou</id>
	<title>LPI Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.lpi.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Babafou"/>
	<link rel="alternate" type="text/html" href="https://wiki.lpi.org/wiki/Special:Contributions/Babafou"/>
	<updated>2026-04-28T11:34:40Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.3</generator>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Linux_Essentials_Summary_Version_1.6_To_2.0&amp;diff=5912</id>
		<title>Linux Essentials Summary Version 1.6 To 2.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Linux_Essentials_Summary_Version_1.6_To_2.0&amp;diff=5912"/>
		<updated>2026-03-05T10:08:19Z</updated>

		<summary type="html">&lt;p&gt;Babafou: s/ascpects/aspects/, added a comma&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
=Purpose=&lt;br /&gt;
&lt;br /&gt;
This document is meant to provide a detailed overview into what has changed with the objectives update for the Linux Essentials exam (010). A detailed diff is available in the [https://wiki.lpi.org/w/index.php?title=Linux_Essentials_Objectives_V2.0&amp;amp;diff=&amp;amp;oldid=5877 document history of the objectives page].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Changes in Exam 010=&lt;br /&gt;
&lt;br /&gt;
The following changes constitute the update of exam 010 from version 1.6 to version 2.0:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Topic 1: The Linux Operating System and Open Source Software&#039;&#039;&#039; (renamed from &#039;&#039;The Linux Community and a Career in Open Source&#039;&#039;)&lt;br /&gt;
** &#039;&#039;&#039;1.1 Linux Distributions&#039;&#039;&#039; (renamed from &#039;&#039;Linux Evolution and Popular Operating Systems&#039;&#039;)&lt;br /&gt;
*** Changed to better reflect Linux distribution families, include support schemas and Linux components (kernelspace and userspace)&lt;br /&gt;
*** Updated description&lt;br /&gt;
*** Added &#039;Kernel and userspace&#039;&lt;br /&gt;
*** Added &#039;Distribution life cycle management&#039; (moved from 4.1)&lt;br /&gt;
*** Added &#039;Awareness of Android and its relation to Linux&#039;&lt;br /&gt;
*** Replaced individual distribution names with distribution family groupings:&lt;br /&gt;
**** Added &#039;Debian-based Distributions (Debian GNU/Linux, Ubuntu, Raspberry Pi OS)&#039; — replaces &#039;Debian, Ubuntu (LTS)&#039; and &#039;Raspberry Pi, Raspbian&#039;&lt;br /&gt;
**** Added &#039;Enterprise Linux-based Distributions (Red Hat Enterprise Linux, AlmaLinux, Rocky Linux, Fedora Linux, CentOS Stream)&#039; — replaces &#039;CentOS, Red Hat&#039;&lt;br /&gt;
**** Added &#039;SUSE-based Distributions (SUSE Linux Enterprise, openSUSE Leap, openSUSE Tumbleweed)&#039; — replaces &#039;openSUSE, SUSE&#039;&lt;br /&gt;
**** Added &#039;Alpine Linux (main and edge)&#039;&lt;br /&gt;
**** Added &#039;Long-Term Support (LTS), stable, testing and unstable releases, and rolling releases&#039;&lt;br /&gt;
**** Removed &#039;Linux Mint, Scientific Linux&#039;&lt;br /&gt;
** &#039;&#039;&#039;1.2 Major Open Source Applications&#039;&#039;&#039;&lt;br /&gt;
*** Updated description to clarify that awareness of purpose and features is required, not specific usage or installation details&lt;br /&gt;
*** Changed &#039;Development languages&#039; to &#039;Programming languages&#039;&lt;br /&gt;
*** Added &#039;Web applications&#039;&lt;br /&gt;
*** Added &#039;Software packages and repositories&#039;&lt;br /&gt;
*** Added (awareness level) &#039;Chromium / Chrome, Codium / VS Code, Inkscape, VLC, GPG, R&#039;&lt;br /&gt;
*** Added (awareness level) &#039;Kodi, Jitsi, Big Blue Button, Moodle, Git, GitLab, Forgejo / Gitea&#039;&lt;br /&gt;
*** Added (awareness level) &#039;PostgreSQL&#039;&lt;br /&gt;
*** Added (awareness level) &#039;C++, Rust, Go&#039;&lt;br /&gt;
*** Added &#039;apt, dnf, zypper, apk&#039;&lt;br /&gt;
*** Removed &#039;OpenOffice.org&#039;&lt;br /&gt;
*** Removed &#039;Perl, shell&#039;&lt;br /&gt;
** &#039;&#039;&#039;1.3 Open Source Software and Licensing&#039;&#039;&#039;&lt;br /&gt;
*** Updated description to add digital autonomy and digital sovereignty&lt;br /&gt;
*** Editorial changes to the description&lt;br /&gt;
*** Changed &#039;Open source licensing&#039; to &#039;Open source and open content licensing&#039;&lt;br /&gt;
*** Added &#039;Proprietary software&#039;&lt;br /&gt;
*** Added: &#039;Free software&#039;&lt;br /&gt;
*** Added: &#039;Digital autonomy&#039;, &#039;Digital sovereignty&#039;&lt;br /&gt;
*** Removed: &#039;FOSS, FLOSS&#039;, &#039;Open source business models&#039;&lt;br /&gt;
** &#039;&#039;&#039;1.4 Linux Usage&#039;&#039;&#039; (renamed from &#039;&#039;ICT Skills and Working in Linux&#039;&#039;)&lt;br /&gt;
*** Changed to focus on various kinds of system that run Linux as well as securely accessing remote system, such as cloud providers&lt;br /&gt;
*** Updated description&lt;br /&gt;
*** Added &#039;Understanding types of computers that can run Linux&#039;&lt;br /&gt;
*** Added &#039;Awareness of virtualization, containers and cloud computing&#039;&lt;br /&gt;
*** Added &#039;Awareness of common text editors&#039;&lt;br /&gt;
*** Added &#039;Awareness of configuration management tools&#039;&lt;br /&gt;
*** Added &#039;Secure handling of credentials&#039;&lt;br /&gt;
*** Added &#039;Secure transfer and storage of data&#039;&lt;br /&gt;
*** Added &#039;Desktop computers, laptops and other mobile devices&#039;&lt;br /&gt;
*** Added &#039;Server computers, virtual machines and cloud instances&#039;&lt;br /&gt;
*** Added &#039;Embedded systems and HPC clusters&#039;&lt;br /&gt;
*** Added &#039;Client and server roles&#039;&lt;br /&gt;
*** Added &#039;vi, nano&#039;&lt;br /&gt;
*** Added &#039;Strong password, password managers, multi-factor authentication, passkeys&#039;&lt;br /&gt;
*** Added &#039;Encryption in network protocols (HTTPS), storage media&#039;&lt;br /&gt;
*** Added &#039;Secure handling of USB devices&#039;&lt;br /&gt;
*** Removed &#039;Desktop skills&#039;&lt;br /&gt;
*** Removed &#039;Getting to the command line&#039;&lt;br /&gt;
*** Removed &#039;Industry uses of Linux, cloud computing and virtualization&#039;&lt;br /&gt;
*** Removed &#039;Using a browser, privacy concerns, configuration options, searching the web and saving content&#039;&lt;br /&gt;
*** Removed &#039;Terminal and console&#039;&lt;br /&gt;
*** Removed &#039;Password issues&#039;&lt;br /&gt;
*** Removed &#039;Privacy issues and tools&#039;&lt;br /&gt;
*** Removed &#039;Use of common open source applications in presentations and projects&#039;&lt;br /&gt;
* &#039;&#039;&#039;Topic 2: Command Line Basics&#039;&#039;&#039; (renamed from &#039;&#039;Finding Your Way on a Linux System&#039;&#039;)&lt;br /&gt;
** &#039;&#039;&#039;2.1 Command Line Usage&#039;&#039;&#039; (renamed from &#039;&#039;Command Line Basics&#039;&#039;)&lt;br /&gt;
*** Editorial changes to the description&lt;br /&gt;
*** Added to utilities: &#039;/bin, /usr/bin, /usr/sbin, /sbin&#039;&lt;br /&gt;
** &#039;&#039;&#039;2.2 Documentation, Man Pages and Usage Information&#039;&#039;&#039; (renamed from &#039;&#039;Using the Command Line to Get Help&#039;&#039;)&lt;br /&gt;
*** Updated to include parameters for querying usage information and removed info pages and locate&lt;br /&gt;
*** Updated Description&lt;br /&gt;
*** Added &#039;Common help parameters of command line tools&#039;&lt;br /&gt;
*** Added &#039;-h, --help&#039;&lt;br /&gt;
*** Removed &#039;Info pages&#039;&lt;br /&gt;
*** Removed &#039;info&#039;, &#039;locate&#039;&lt;br /&gt;
** &#039;&#039;&#039;2.3 Files, Directories and Paths&#039;&#039;&#039; (renamed from &#039;&#039;Using Directories and Listing Files&#039;&#039;)&lt;br /&gt;
*** Changed to include find&lt;br /&gt;
*** Updated description&lt;br /&gt;
*** Added &#039;Searching for files based on file names&#039;&lt;br /&gt;
*** Added to utilities: &#039;find&#039;&lt;br /&gt;
*** Added &#039;&#039;&#039;/&#039;&#039;&#039;&#039; (root path)&lt;br /&gt;
*** Changed &#039;home&#039; to &#039;/home&#039;&lt;br /&gt;
** &#039;&#039;&#039;2.4 File and Directory Management&#039;&#039;&#039; (renamed from &#039;&#039;Creating, Moving and Deleting Files&#039;&#039;)&lt;br /&gt;
*** Editorial changes to the description&lt;br /&gt;
* &#039;&#039;&#039;Topic 3: Data Processing&#039;&#039;&#039; (renamed from &#039;&#039;The Power of the Command Line&#039;&#039;)&lt;br /&gt;
** &#039;&#039;&#039;3.1 File Archives and Compression&#039;&#039;&#039; (renamed from &#039;&#039;Archiving Files on the Command Line&#039;&#039;)&lt;br /&gt;
*** Editorial changes to the description&lt;br /&gt;
** &#039;&#039;&#039;3.2 Redirections and String Processing&#039;&#039;&#039; (renamed from &#039;&#039;Searching and Extracting Data from Files&#039;&#039;)&lt;br /&gt;
*** Changed to use Extended Regular Expressions instead of Basic Regular Expressions&lt;br /&gt;
*** Updated Description&lt;br /&gt;
*** Added &#039;grep -E&#039;&lt;br /&gt;
*** Added &#039;uniq&#039;&lt;br /&gt;
** &#039;&#039;&#039;3.3 Shell Scripting Basics&#039;&#039;&#039; (renamed from &#039;&#039;Turning Commands into a Script&#039;&#039;)&lt;br /&gt;
*** Editorial changes to the description&lt;br /&gt;
*** Changed &#039;for loops&#039; to &#039;for loops (iterate over space separated lists and file glob expressions)&#039;&lt;br /&gt;
*** Added &#039;if conditions (file existence and variable equality)&#039;&lt;br /&gt;
*** Removed &#039;Awareness of common text editors (vi and nano)&#039; (now in to 1.4)&lt;br /&gt;
* &#039;&#039;&#039;Topic 4: Linux System Administration Basics&#039;&#039;&#039; (renamed from &#039;&#039;The Linux Operating System&#039;&#039;)&lt;br /&gt;
** &#039;&#039;&#039;4.1 Linux Installation and Provisioning&#039;&#039;&#039; (renamed from &#039;&#039;Choosing an Operating System&#039;&#039;)&lt;br /&gt;
*** Updated cover the installation of Linux on physical machines, VMs and cloud instances&lt;br /&gt;
*** Added &#039;Installing Linux on a computer or in a virtual machine&#039;&lt;br /&gt;
*** Added &#039;Using Linux in cloud instances&#039;&lt;br /&gt;
*** Changed &#039;OS X&#039; to &#039;macOS&#039;&lt;br /&gt;
*** Added &#039;Installation media, ISO files&#039;&lt;br /&gt;
*** Added &#039;Operating system images&#039;&lt;br /&gt;
*** Added &#039;Dual boot&#039;&lt;br /&gt;
*** Added &#039;Windows Subsystem for Linux&#039;&lt;br /&gt;
*** Removed &#039;Distribution life cycle management&#039; (now in 1.1)&lt;br /&gt;
*** Removed &#039;GUI versus command line, desktop configuration&#039;&lt;br /&gt;
*** Removed &#039;Maintenance cycles, beta and stable&#039;&lt;br /&gt;
** &#039;&#039;&#039;4.2 Computer Hardware and Device Access&#039;&#039;&#039; (renamed from &#039;&#039;Understanding Computer Hardware&#039;&#039;)&lt;br /&gt;
*** Changed to include kernel aspects, hardware management and device files&lt;br /&gt;
*** Updated description&lt;br /&gt;
*** Added Key Knowledge Area: &#039;Device files for physical and virtual devices&#039;&lt;br /&gt;
*** Added &#039;processors (x86, ARM)&#039; and &#039;memory&#039;&lt;br /&gt;
*** Added &#039;Network interface cards (Ethernet, WiFi)&#039;&lt;br /&gt;
*** Added &#039;/dev/nvme*&#039;&lt;br /&gt;
*** Added &#039;Raspberry Pi&#039;&lt;br /&gt;
*** Changed &#039;Drivers&#039; to &#039;Drivers and Kernel Modules&#039;&lt;br /&gt;
*** Added &#039;/dev/, /boot/, /sys/&#039;&lt;br /&gt;
*** Added &#039;/dev/null, /dev/zero, /dev/urandom&#039;&lt;br /&gt;
** &#039;&#039;&#039;4.3 Processes and Log Messages&#039;&#039;&#039; (renamed from &#039;&#039;Where Data is Stored&#039;&#039;)&lt;br /&gt;
*** Changed to include systemd service management and journal querying and remove syslog&lt;br /&gt;
*** Updated description&lt;br /&gt;
*** Added &#039;Services&#039;&lt;br /&gt;
*** Added &#039;systemctl (start, stop, status)&#039;&lt;br /&gt;
*** Added &#039;systemd Journal&#039;&lt;br /&gt;
*** Added &#039;journalctl&#039;&lt;br /&gt;
*** Removed &#039;System messaging&#039;&lt;br /&gt;
*** Removed &#039;Memory addresses&#039;&lt;br /&gt;
*** Removed &#039;syslog&#039;&lt;br /&gt;
*** Removed &#039;/boot/, /dev/, /sys/&#039;&lt;br /&gt;
** &#039;&#039;&#039;4.4 Network Configuration&#039;&#039;&#039; (renamed from &#039;&#039;Your Computer on the Network&#039;&#039;)&lt;br /&gt;
*** Changed to include IPv6 and remove net-utils&lt;br /&gt;
*** Updated description&lt;br /&gt;
*** Added &#039;Automatic network configuration&#039;&lt;br /&gt;
*** Added &#039;ip -6 route show&#039;&lt;br /&gt;
*** Added &#039;resolvectl&#039;&lt;br /&gt;
*** Added &#039;DHCP, SLAAC, DHCPv6&#039;&lt;br /&gt;
*** Removed &#039;route&#039;&lt;br /&gt;
*** Removed &#039;ifconfig&#039;&lt;br /&gt;
*** Removed &#039;netstat&#039;&lt;br /&gt;
* &#039;&#039;&#039;Topic 5: Security and File System Permissions&#039;&#039;&#039; (renamed from &#039;&#039;Security and File Permissions&#039;&#039;)&lt;br /&gt;
** &#039;&#039;&#039;5.1 Remote Logins, File Transfers and Elevated Permissions&#039;&#039;&#039; (renamed from &#039;&#039;Basic Security and Identifying User Types&#039;&#039;)&lt;br /&gt;
*** Changed to focusing on SSH, remote access and privilege escalation, user management aspects were moved to 5.2.&lt;br /&gt;
*** Updated description&lt;br /&gt;
*** Added &#039;Executing commands with elevated permissions&#039;&lt;br /&gt;
*** Added &#039;Remote logins using SSH&#039;&lt;br /&gt;
*** Added &#039;SSH key generation and authentication&#039;&lt;br /&gt;
*** Added &#039;ssh, scp&#039;&lt;br /&gt;
*** Added &#039;ssh-keygen&#039;&lt;br /&gt;
*** Added &#039;~/.ssh/authorized_keys&#039;&lt;br /&gt;
*** Removed &#039;/etc/passwd, /etc/shadow, /etc/group&#039; (now in 5.2)&lt;br /&gt;
*** Removed &#039;id, last, who, w&#039; (not in 5.2)&lt;br /&gt;
** &#039;&#039;&#039;5.2 User and Group Management&#039;&#039;&#039; (renamed from &#039;&#039;Creating Users and Groups&#039;&#039;) &lt;br /&gt;
*** Editorial changes to the description&lt;br /&gt;
*** Added &#039;w, last, wtmpdb last&#039;&lt;br /&gt;
** &#039;&#039;&#039;5.3 File System Permissions and Ownership&#039;&#039;&#039; (renamed from &#039;&#039;Managing File Permissions and Ownership&#039;&#039;)&lt;br /&gt;
*** Editorial changes to the description&lt;br /&gt;
** &#039;&#039;&#039;5.4 Special Directories and Files&#039;&#039;&#039;&lt;br /&gt;
*** Editorial changes to the description&lt;/div&gt;</summary>
		<author><name>Babafou</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5784</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5784"/>
		<updated>2023-10-24T15:18:24Z</updated>

		<summary type="html">&lt;p&gt;Babafou: /* 205.2 Backup Operations (weight: 3) */ fix typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
The [[LPIC-2_Objectives_V4|version 4.5 of the LPIC-2 Objectives]] are still online.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux startup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialization and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;202.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;202.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and manage a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Make and Install Programs from Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Backup Operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 206: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;206.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;206.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;206.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and Maintain DNS Zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS Server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP Configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP Client Usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a Router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure Shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security Tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>Babafou</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-1_Summary_Version_4.0_To_5.0&amp;diff=5243</id>
		<title>LPIC-1 Summary Version 4.0 To 5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-1_Summary_Version_4.0_To_5.0&amp;diff=5243"/>
		<updated>2019-03-27T14:49:11Z</updated>

		<summary type="html">&lt;p&gt;Babafou: systemd.socket is in 110.2, not 109.4&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=Purpose=&lt;br /&gt;
&lt;br /&gt;
This document is meant to provide a higher level overview into what has changed with the objectives update for LPIC-1 exams.&lt;br /&gt;
&lt;br /&gt;
The exams that are affect by this update are LPIC-1 (101 and 102) exams.&lt;br /&gt;
&lt;br /&gt;
=Changes in Exam 101=&lt;br /&gt;
&lt;br /&gt;
The following changes constitute the update of exam 101 from version 4.0 to version 5.0:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;101: System Architecture&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;101.1 Determine and configure hardware settings&#039;&#039;&#039;&lt;br /&gt;
*** Removed &#039;Configure systems with or without external peripherals such as keyboards.&#039; &lt;br /&gt;
*** Removed &#039;Know the differences between coldplug and hotplug devices.&#039;&lt;br /&gt;
** &#039;&#039;&#039;101.2 Boot the system&#039;&#039;&#039;&lt;br /&gt;
*** Added coverage of UEFI (equal to BIOS coverage) and journalctl (with respect to boot events)&lt;br /&gt;
** &#039;&#039;&#039;101.3 Change runlevels / boot targets and shutdown or reboot system&#039;&#039;&#039;&lt;br /&gt;
*** Added awareness of acpid&lt;br /&gt;
* &#039;&#039;&#039;102: Linux Installation and Package Management&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;102.1 Design hard disk layout&#039;&#039;&#039;&lt;br /&gt;
*** Added EFI System Partition (ESP)&lt;br /&gt;
** &#039;&#039;&#039;102.2 Install a boot manager&#039;&#039;&#039;&lt;br /&gt;
*** (no changes)&lt;br /&gt;
** &#039;&#039;&#039;102.3 Manage shared libraries&#039;&#039;&#039;&lt;br /&gt;
*** (no changes)&lt;br /&gt;
** &#039;&#039;&#039;102.4 Use Debian package management&#039;&#039;&#039;&lt;br /&gt;
*** Removed aptitude&lt;br /&gt;
*** Added awareness of apt.&lt;br /&gt;
** &#039;&#039;&#039;102.5 Use RPM and YUM package management&#039;&#039;&#039;&lt;br /&gt;
*** Removed yumdownloader&lt;br /&gt;
*** Added Zypper (equal to YUM)&lt;br /&gt;
*** Added awareness of dnf&lt;br /&gt;
** &#039;&#039;&#039;102.6 Linux as a virtualization guest&#039;&#039;&#039;&lt;br /&gt;
*** New objective (weight: 1)&lt;br /&gt;
*** Added specialties of running Linux in a virtual machines and containers on premise and in the cloud&lt;br /&gt;
* &#039;&#039;&#039;103: GNU and Unix Commands&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;103.1 Work on the command line&#039;&#039;&#039;&lt;br /&gt;
*** Added quoting&lt;br /&gt;
*** Added type and which&lt;br /&gt;
** &#039;&#039;&#039;103.2 Process text streams using filters&#039;&#039;&#039;&lt;br /&gt;
*** Decreased weight from 3 to 2&lt;br /&gt;
*** Removed expand, fmt, join, pr and unexpand&lt;br /&gt;
*** Added bzcat, md5sum, sha256sum, sha512sum, xzcat and zcat&lt;br /&gt;
** &#039;&#039;&#039;103.3 Perform basic file management&#039;&#039;&#039;&lt;br /&gt;
*** Added bunzip2 and unxz&lt;br /&gt;
** &#039;&#039;&#039;103.4 Use streams, pipes and redirects&#039;&#039;&#039;&lt;br /&gt;
*** (no changes)&lt;br /&gt;
** &#039;&#039;&#039;103.5 Create, monitor and kill processes&#039;&#039;&#039;&lt;br /&gt;
*** Added watch and tmux&lt;br /&gt;
** &#039;&#039;&#039;103.6 Modify process execution priorities&#039;&#039;&#039;&lt;br /&gt;
*** (no changes)&lt;br /&gt;
** &#039;&#039;&#039;103.7 Search text files using regular expressions&#039;&#039;&#039;&lt;br /&gt;
*** Increased weight from 2 to 3&lt;br /&gt;
*** Added understanding of the differences between basic and extended regular expressions&lt;br /&gt;
*** Added understanding of the concepts of special characters, character classes, quantifiers and anchors&lt;br /&gt;
*** Added use of regular expressions to delete, change and substitute text&lt;br /&gt;
** &#039;&#039;&#039;103.8 Basic file editing&#039;&#039;&#039;&lt;br /&gt;
*** Renamed from &#039;Perform basic file editing operations using vi&#039; to &#039; Basic file editing&#039;&lt;br /&gt;
*** Clarified wording of &#039;Understand and use vi modes.&#039;&lt;br /&gt;
*** Removed vi commands c and :e!&lt;br /&gt;
*** Added awareness of other common editors (Emacs, nano and vim) and setting the default editor (EDITOR environment variable)&lt;br /&gt;
* &#039;&#039;&#039;104: Devices, Linux Filesystems, Filesystem Hierarchy Standard&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;104.1 Create partitions and filesystems&#039;&#039;&#039;&lt;br /&gt;
*** Removed awareness of ReiserFS&lt;br /&gt;
*** Added GPT partition tables&lt;br /&gt;
*** Added exFAT&lt;br /&gt;
*** Changed awareness of Btrfs to &#039;Basic feature knowledge of Btrfs, including multi-device filesystems, compression and subvolumes.&#039;&lt;br /&gt;
** &#039;&#039;&#039;104.2 Maintain the integrity of filesystems&#039;&#039;&#039;&lt;br /&gt;
*** Removed debugfs and dumpe2fs&lt;br /&gt;
*** Changed &#039;XFS tools (such as xfs_metadump and xfs_info)&#039; to coverage of xfs_repair, xfs_fsr and xfs_db&lt;br /&gt;
** &#039;&#039;&#039;104.3 Control mounting and unmounting of filesystems&#039;&#039;&#039;&lt;br /&gt;
*** Added use of labels and UUIDs for identifying and mounting file systems&lt;br /&gt;
*** Added awareness of systemd mount units&lt;br /&gt;
*** Added blkid and lsblk&lt;br /&gt;
** &#039;&#039;&#039;104.4 Manage disk quotas&#039;&#039;&#039;&lt;br /&gt;
*** Removed objective (former weight: 1)&lt;br /&gt;
** &#039;&#039;&#039;104.5 Manage file permissions and ownership&#039;&#039;&#039;&lt;br /&gt;
*** (no changes)&lt;br /&gt;
** &#039;&#039;&#039;104.6 Create and change hard and symbolic links&#039;&#039;&#039;&lt;br /&gt;
*** (no changes)&lt;br /&gt;
** &#039;&#039;&#039;104.7 Find system files and place files in the correct location&#039;&#039;&#039;&lt;br /&gt;
*** (no changes)&lt;br /&gt;
&lt;br /&gt;
=Changes in Exam 102=&lt;br /&gt;
&lt;br /&gt;
The following changes constitute the update of exam 102 from version 4.0 to version 5.0:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;105: Shells and Shell Scripting&#039;&#039;&#039;&lt;br /&gt;
** Renamed from &#039;Shells, Scripting and Data Management&#039; to &#039;Shells and Shell Scripting&#039;&lt;br /&gt;
** &#039;&#039;&#039;105.1 Customize and use the shell environment&#039;&#039;&#039;&lt;br /&gt;
*** Removed lists&lt;br /&gt;
** &#039;&#039;&#039;105.2 Customize or write simple scripts&#039;&#039;&#039;&lt;br /&gt;
*** Added execution of chained commands&lt;br /&gt;
*** Added &amp;amp;&amp;amp; and ||&lt;br /&gt;
** &#039;&#039;&#039;105.3 SQL data management&#039;&#039;&#039;&lt;br /&gt;
*** Removed objective (former weight: 2)&lt;br /&gt;
* &#039;&#039;&#039;106: User Interfaces and Desktops&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;106.1 Install and configure X11&#039;&#039;&#039;&lt;br /&gt;
*** Removed verifying that the video card and monitor are supported by an X server&lt;br /&gt;
*** Removed awareness of the X font server&lt;br /&gt;
*** Removed xwininfo&lt;br /&gt;
*** Removed xpdyinfo&lt;br /&gt;
*** Added understanding of the X11 architecture&lt;br /&gt;
*** Added overwriting specific aspects of Xorg configuration, such as keyboard layout&lt;br /&gt;
*** Added understanding of the components of desktop environments, such as display managers and window managers&lt;br /&gt;
*** Added managing access to the X server and display applications on remote X servers&lt;br /&gt;
*** Added awareness of Wayland.&lt;br /&gt;
*** Added /etc/X11/xorg.conf.d/&lt;br /&gt;
*** Added ~/.xsession-errors&lt;br /&gt;
*** Added xauth&lt;br /&gt;
** &#039;&#039;&#039;106.2 Graphical Desktops&#039;&#039;&#039;&lt;br /&gt;
*** Removed old content (configuration of display managers / LightDM)&lt;br /&gt;
*** Changed to cover awareness of major desktop environments and protocols to access remote desktop sessions&lt;br /&gt;
*** Added KDE, Gnome, Xfce, X11, XDMCP, VNC, Spice and RDP&lt;br /&gt;
** &#039;&#039;&#039;106.3 Accessibility&#039;&#039;&#039;&lt;br /&gt;
*** Removed Basic knowledge of keyboard accessibility settings (AccessX)&lt;br /&gt;
*** Removed Orca, GOK and emacspeak&lt;br /&gt;
*** Added voice recognition&lt;br /&gt;
* &#039;&#039;&#039;107: Administrative Tasks&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;107.1 Manage user and group accounts and related system files&#039;&#039;&#039;&lt;br /&gt;
*** (no changes)&lt;br /&gt;
** &#039;&#039;&#039;107.2 Automate system administration tasks by scheduling jobs&#039;&#039;&#039;&lt;br /&gt;
*** Removed anacron&lt;br /&gt;
*** Added systemd timers&lt;br /&gt;
*** Added systemctl and systemd-run&lt;br /&gt;
** &#039;&#039;&#039;107.3 Localisation and internationalisation&#039;&#039;&#039;&lt;br /&gt;
*** (no changes)&lt;br /&gt;
* &#039;&#039;&#039;108: Essential System Services&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;108.1 Maintain system time&#039;&#039;&#039;&lt;br /&gt;
*** Added chrony (chronyc)&lt;br /&gt;
*** Added timedatectl&lt;br /&gt;
** &#039;&#039;&#039;108.2 System logging&#039;&#039;&#039;&lt;br /&gt;
*** Increased weight from 3 to 4&lt;br /&gt;
*** Removed klogd and syslogd (syslog.conf)&lt;br /&gt;
*** Changed syslog from main topic to awareness&lt;br /&gt;
*** Changed rsyslog from awareness to main topic, focus is basic configuration&lt;br /&gt;
*** Added accessing the systemd journal, including queries, filters, persistent storage, deletion of old events and recovering journal content from a system&#039;s copy.&lt;br /&gt;
*** Added understanding of interaction of rsyslog with systemd-journald&lt;br /&gt;
*** Added systemd-cat&lt;br /&gt;
** &#039;&#039;&#039;108.3 Mail Transfer Agent (MTA) basics&#039;&#039;&#039;&lt;br /&gt;
*** Removed qmail&lt;br /&gt;
** &#039;&#039;&#039;108.4 Manage printers and printing&#039;&#039;&#039;&lt;br /&gt;
*** (no changes)&lt;br /&gt;
* &#039;&#039;&#039;109: Networking Fundamentals&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;109.1 Fundamentals of internet protocols&#039;&#039;&#039;&lt;br /&gt;
*** (no changes)&lt;br /&gt;
** &#039;&#039;&#039;109.2 Persistent network configuration&#039;&#039;&#039;&lt;br /&gt;
*** Renamed from &#039;Basic network configuration&#039; to &#039;Persistent network configuration&#039;&lt;br /&gt;
*** Changed focus from viewing settings to manage the persistent network configuration&lt;br /&gt;
*** Removed ip, route, ping, ifconfig (still in 109.3)&lt;br /&gt;
*** Added configuration of ethernet and wi-fi network configuration using NetworkManager&lt;br /&gt;
*** Added awareness of systemd-networkd&lt;br /&gt;
*** Added /etc/resolv.conf, nmcli and hostnamectl&lt;br /&gt;
** &#039;&#039;&#039;109.3 Basic network troubleshooting&#039;&#039;&#039;&lt;br /&gt;
*** Changed to focus on manual interaction with network interfaces using iproute2&lt;br /&gt;
*** Changed coverage of net-tools commands to awareness &lt;br /&gt;
*** Removed dig and host (still in 109.4)&lt;br /&gt;
*** Removed ifup and ifdown (still in 109.2)&lt;br /&gt;
*** Added ss&lt;br /&gt;
** &#039;&#039;&#039;109.4 Configure client side DNS&#039;&#039;&#039;&lt;br /&gt;
*** Added debuging errors related to name resolution&lt;br /&gt;
*** Added awareness of systemd-resolved&lt;br /&gt;
* &#039;&#039;&#039;110: Security&#039;&#039;&#039;&lt;br /&gt;
** &#039;&#039;&#039;110.1 Perform security administration tasks&#039;&#039;&#039;&lt;br /&gt;
*** (no changes)&lt;br /&gt;
** &#039;&#039;&#039;110.2 Setup host security&#039;&#039;&#039;&lt;br /&gt;
*** Added systemd.socket&lt;br /&gt;
*** Removed /etc/inetd.d/&lt;br /&gt;
*** Removed /etc/inetd.conf&lt;br /&gt;
** &#039;&#039;&#039;110.3 Securing data with encryption&#039;&#039;&#039;&lt;br /&gt;
*** Increased weight from 3 to 4&lt;br /&gt;
*** Added use of GPG to encrypt, decrypt, sign and verify files&lt;br /&gt;
*** Added gpg-agent&lt;br /&gt;
*** Added additional ciphers for SSH keys (~/.ssh/id_ecdsa, id_ecdsa.pub, ~/.ssh/id_ed25519, id_ed25519.pub, /etc/ssh/ssh_host_ecdsa_key, ssh_host_ecdsa_key.pub, /etc/ssh/ssh_host_ed25519_key and ssh_host_ed25519_key.pub)&lt;/div&gt;</summary>
		<author><name>Babafou</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LinuxEssentials_Objectives_V1.6(FR)&amp;diff=5169</id>
		<title>LinuxEssentials Objectives V1.6(FR)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LinuxEssentials_Objectives_V1.6(FR)&amp;diff=5169"/>
		<updated>2019-03-09T18:27:57Z</updated>

		<summary type="html">&lt;p&gt;Babafou: /* 2.1 Bases sur la ligne de commande (valeur : 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
L&#039;objectif de la certification Linux Essentials est de définir les connaissances élémentaires requises pour utiliser de manière compétente un ordinateur fixe ou portable fonctionnant avec le système d&#039;exploitation Linux. Le programme Linux Essentials qui lui est associé guidera et encouragera les jeunes gens (et ceux qui découvrent Linux et le logiciel libre) à comprendre la place de Linux et du logiciel libre dans le contexte plus large de l&#039;industrie informatique.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Description des candidats==&lt;br /&gt;
&lt;br /&gt;
Voici la description d&#039;un candidat qui est à peine qualifié pour réussir l&#039;examen Linux Essentials. Cette personne hypothétique est appelée Candidat Minimalement Qualifié (CMQ). Le niveau de l&#039;examen Linux Essentials est fixé de telle sorte que cette personne (ainsi que quiconque de plus compétent) puisse le réussir mais que quiconque de moins compétent ne le puisse pas.&lt;br /&gt;
&lt;br /&gt;
Le CMQ doit comprendre l&#039;industrie de Linux et du logiciel libre et connaître les applications libres les plus répandues. Le candidat doit comprendre les composants principaux du système d&#039;exploitation Linux et avoir les compétences techniques lui permettant de travailler sous Linux en ligne de commande. Le CMQ doit comprendre les rudiments de la sécurité et de l&#039;administration tels que la gestion des utilisateurs et des groupes, le travail en ligne de commande et les droits d&#039;accès. Le détenteur de la certification Linux Essentials est très probablement l&#039;utilisateur final d&#039;un système administré par ailleurs.&lt;br /&gt;
&lt;br /&gt;
Le &#039;&#039;&#039;CMQ Linux Essentials&#039;&#039;&#039; doit avoir des compétences ou des connaissances rudimentaires dans les domaines suivants :&lt;br /&gt;
&lt;br /&gt;
* le logiciel libre ou à code source ouvert, les différentes communautés et licences&lt;br /&gt;
* les processus, les programmes et les composants d&#039;un système d&#039;exploitation&lt;br /&gt;
* le matériel informatique&lt;br /&gt;
* la sécurité du système, les utilisateurs, les groupes et les droits d&#039;accès pour des répertoires publiques et privés&lt;br /&gt;
* rendre le système accessible et pouvoir le raccorder à d&#039;autres ordinateurs en réseau local&lt;br /&gt;
* les applications libres sur le lieu de travail et comment elles se rapportent à leurs équivalent propriétaires&lt;br /&gt;
* les explorateurs du système de fichiers sur un poste de travail sous Linux&lt;br /&gt;
* où trouver de l&#039;aide&lt;br /&gt;
* travailler en ligne de commande et avec des fichiers&lt;br /&gt;
* réaliser des sauvegardes et des archives simples et les restaurer&lt;br /&gt;
* utiliser un éditeur élémentaire en ligne de commande &lt;br /&gt;
* comprimer des fichiers&lt;br /&gt;
* créer et exécuter des scripts shell simples&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Informations de version==&lt;br /&gt;
&lt;br /&gt;
Ceci est la version 1.6 des objectifs.&lt;br /&gt;
&lt;br /&gt;
Vous trouverez également le [[LinuxEssentials_Summary_Version_1.5_To_1.6|résumé et les informations détaillées]] concernant les différences entre les versions 1.5 et 1.6 des objectifs.&lt;br /&gt;
&lt;br /&gt;
La [[LinuxEssentials Objectives V1.5|version 1.5 des objectifs]] est disponible [[LinuxEssentials Objectives V1.5|ici]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traductions des objectifs==&lt;br /&gt;
&lt;br /&gt;
Les traductions suivantes sont disponibles sur ce wiki :&lt;br /&gt;
&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6|Anglais]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(PT-BR)|Portugais (brésilien)]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(ZH)|Chinois (simplifié)]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(ZH-TW)|Chinois (traditionnel)]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(NL)|Néerlandais]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(FR)|Français]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(DE)|Allemand]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(IT)|Italien]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(JA)|Japonais]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(ES)|Espagnol]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Examens et prérequis==&lt;br /&gt;
&lt;br /&gt;
La certification Linux Essentials est décernée après avoir réussi l&#039;examen :&lt;br /&gt;
&lt;br /&gt;
* 010 (40 questions en 60 minutes)&lt;br /&gt;
&lt;br /&gt;
Il n&#039;est pas nécessaire de posséder une autre certification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectifs==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 1 : Communauté Linux et carrière dans le logiciel libre&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;1.1 Évolution de Linux et systèmes d&#039;exploitation populaires (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Connaissance de l&#039;évolution de Linux et des distributions principales.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Distributions&lt;br /&gt;
* Systèmes embarqués&lt;br /&gt;
* Linux dans le nuage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Debian, Ubuntu (LTS)&lt;br /&gt;
* CentOS, openSUSE, Red Hat, SUSE&lt;br /&gt;
* Linux Mint, Scientific Linux&lt;br /&gt;
* Raspberry Pi, Raspbian&lt;br /&gt;
* Android&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;1.2 Applications libres majeures (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Savoir quelles sont les applications majeures ainsi que leurs utilisations et leur évolution.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Applications pour postes de travail&lt;br /&gt;
* Applications pour serveurs&lt;br /&gt;
* Langages de programmation&lt;br /&gt;
* Outils de gestion et dépôts de paquetages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenOffice.org, LibreOffice, Thunderbird, Firefox, GIMP&lt;br /&gt;
* Nextcloud, ownCloud&lt;br /&gt;
* Apache HTTPD, NGINX, MariaDB, MySQL, NFS, Samba&lt;br /&gt;
* C, Java, JavaScript, Perl, shell, Python, PHP&lt;br /&gt;
* dpkg, apt-get, rpm, yum&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;1.3 Logiciel à code source ouvert et licences (valeur : 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Communautés ouvertes et licences de logiciels à code source ouvert pour les entreprises.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Philosophie des logiciels à code source ouvert&lt;br /&gt;
* Licences des logiciels à code source ouvert&lt;br /&gt;
* Free Software Foundation (FSF), Open Source Initiative (OSI)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Copyleft, Permissive&lt;br /&gt;
* GPL, BSD, Creative Commons&lt;br /&gt;
* Free Software, Open Source Software, FOSS, FLOSS&lt;br /&gt;
* Modèles économiques des logiciels à code source ouvert&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;1.4 Compétences informatiques et travail sous Linux (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Compétences élémentaires en technologies de l&#039;information et de la communication(TIC) et travail sous Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Compétences en bureautique&lt;br /&gt;
* Accéder à la ligne de commande&lt;br /&gt;
* Utilisations de Linux, de l&#039;informatique en nuage et de la virtualisation dans l&#039;industrie&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Utilisation d&#039;un navigateur Web, préoccupations de confidentialité, options de configuration, recherche sur le Web et sauvegarde de contenu&lt;br /&gt;
* Terminal et console&lt;br /&gt;
* Problématiques de mots de passe&lt;br /&gt;
* Problématiques et outils de confidentialité&lt;br /&gt;
* Utilisation d&#039;applications à code source ouvert courantes pour des présentations et des projets&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 2 : Trouver son chemin sur un système Linux&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;2.1 Bases sur la ligne de commande (valeur : 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Bases d&#039;utilisation en ligne de commande sous Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Interpréteur de commandes élémentaire&lt;br /&gt;
* Syntaxe en ligne de commande&lt;br /&gt;
* Variables&lt;br /&gt;
* Mise entre apostrophes ou guillemets&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bash&lt;br /&gt;
* echo&lt;br /&gt;
* history&lt;br /&gt;
* Variable d&#039;environnement PATH&lt;br /&gt;
* export&lt;br /&gt;
* type&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;2.2 Utilisation de la ligne de commande pour obtenir de l&#039;aide (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Exécution de commandes d&#039;aide et navigation dans les différents systèmes d&#039;aide.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Pages de manuel&lt;br /&gt;
* Pages d&#039;information&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* man&lt;br /&gt;
* info&lt;br /&gt;
* /usr/share/doc/&lt;br /&gt;
* locate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;2.3 Utilisation des répertoires et liste des fichiers (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Navigation dans le répertoire personnel et les répertoires du système et affichage de listes de fichiers à différents emplacements.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Fichiers, répertoires&lt;br /&gt;
* Fichiers et répertoires cachés&lt;br /&gt;
* Répertoires personnels&lt;br /&gt;
* Chemins d&#039;accès absolus et relatifs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Options courantes de ls&lt;br /&gt;
* listes récursives de fichiers&lt;br /&gt;
* cd &lt;br /&gt;
* &#039;&#039;&#039;.&#039;&#039;&#039; et &#039;&#039;&#039;..&#039;&#039;&#039;&lt;br /&gt;
* répertoire personnel et ~&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;2.4 Création, déplacement et suppression de fichiers (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Créer, déplacer et supprimer fichiers et répertoires dans le répertoire personnel.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Fichiers et répertoires&lt;br /&gt;
* Sensibilité à la casse&lt;br /&gt;
* Englobements simples&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mv, cp, rm, touch&lt;br /&gt;
* mkdir, rmdir&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 3 : Le pouvoir de la ligne de commande&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;3.1 Archivage de fichiers en ligne de commande (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Archiver des fichiers dans le répertoire personnel de l&#039;utilisateur.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Fichiers, répertoires&lt;br /&gt;
* Archives, compression&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
* Options courantes de tar&lt;br /&gt;
* gzip, bzip2, xz&lt;br /&gt;
* zip, unzip&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;3.2 Recherche et extraction de données à partir de fichiers (valeur : 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Rechercher et extraire des données à partir de fichiers dans le répertoire personnel.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tuyaux en ligne de commande&lt;br /&gt;
* Redirection d&#039;entrée-sortie&lt;br /&gt;
* Expressions rationnelles élémentaires utilisant ., [ ], *, et ?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* grep&lt;br /&gt;
* less&lt;br /&gt;
* cat, head, tail&lt;br /&gt;
* sort&lt;br /&gt;
* cut&lt;br /&gt;
* wc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;3.3 Conversion de commandes en script (valeur : 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Convertir des commandes répétitives en scripts simples.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Faire des scripts shell simples&lt;br /&gt;
* Connaître des éditeurs de texte courants (vi et nano)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* #! (shebang)&lt;br /&gt;
* /bin/bash&lt;br /&gt;
* Variables&lt;br /&gt;
* Arguments&lt;br /&gt;
* boucle for&lt;br /&gt;
* echo&lt;br /&gt;
* Statut de sortie&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 4 : Le système d&#039;exploitation Linux&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;4.1 Choix d&#039;un système d&#039;exploitation (valeur : 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Connaissance des systèmes d&#039;exploitation et distributions Linux majeurs.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Différences entre Windows, OS X et Linux&lt;br /&gt;
* Gestion du cycle de vie des distributions&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Interface graphique par rapport à la ligne de commande, configuration d&#039;un poste de travail&lt;br /&gt;
* Cycles de maintenance, versions bêta et stables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;4.2 Compréhension du matériel informatique (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Être familier avec les composants entrant dans la construction d&#039;ordinateurs de bureau et de serveurs.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Matériel informatique&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cartes mères, processeurs, alimentations, disques optiques, périphériques&lt;br /&gt;
* Disques durs, SSD et partitions, /dev/sd*&lt;br /&gt;
* Pilotes de périphériques&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;4.3 Localisation des données (valeur : 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Où les différents types d&#039;informations sont stockés sur un système Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Programmes et configuration&lt;br /&gt;
* Processus&lt;br /&gt;
* Adresses en mémoire&lt;br /&gt;
* Messagerie système&lt;br /&gt;
* Journalisation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ps, top, free&lt;br /&gt;
* syslog, dmesg&lt;br /&gt;
* /etc/, /var/log/&lt;br /&gt;
* /boot/, /proc/, /dev/, /sys/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;4.4 Intégration au réseau (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Interrogation des paramètres de configuration importants du réseau et détermination des prérequis élémentaires pour intégrer un ordinateur à un réseau local.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Internet, réseau, routeurs&lt;br /&gt;
* Interrogation de la configuration DNS cliente&lt;br /&gt;
* Interrogation de la configuration du réseau&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* route, ip route show&lt;br /&gt;
* ifconfig, ip addr show&lt;br /&gt;
* netstat, ss&lt;br /&gt;
* /etc/resolv.conf, /etc/hosts&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
* ping&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 5 : Sécurité et droits d&#039;accès aux fichiers&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;5.1 Sécurité élémentaire et identification des catégories d&#039;utilisateurs (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Différentes catégories d&#039;utilisateurs sur un système Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Root et utilisateurs standards&lt;br /&gt;
* Utilisateurs système&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/passwd, /etc/shadow, /etc/group&lt;br /&gt;
* id, last, who, w&lt;br /&gt;
* sudo, su&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;5.2 Création des utilisateurs et des groupes (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Créer des utilisateurs et des groupes sur un système Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Commandes de création d&#039;utilisateurs et de groupes&lt;br /&gt;
* Identification des utilisateurs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/passwd, /etc/shadow, /etc/group, /etc/skel/&lt;br /&gt;
* useradd, groupadd&lt;br /&gt;
* passwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;5.3 Gestion des propriétés et des droits d&#039;accès aux fichiers (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Comprendre et manipuler les paramètres de droits d&#039;accès et de propriété sur les fichiers.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Droits d&#039;accès et propriété des fichiers et répertoires&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ls -l, ls -a&lt;br /&gt;
* chmod, chown&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;5.4 Répertoires et fichiers spéciaux (valeur : 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Répertoires et fichiers spéciaux sur un système Linux, y compris les droits d&#039;accès spéciaux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Utilisation de fichiers et répertoires temporaires&lt;br /&gt;
* Liens symboliques&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /tmp/, /var/tmp/ et Sticky Bit&lt;br /&gt;
* ls -d&lt;br /&gt;
* ln -s&lt;/div&gt;</summary>
		<author><name>Babafou</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LinuxEssentials_Objectives_V1.6(FR)&amp;diff=5168</id>
		<title>LinuxEssentials Objectives V1.6(FR)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LinuxEssentials_Objectives_V1.6(FR)&amp;diff=5168"/>
		<updated>2019-03-09T18:24:25Z</updated>

		<summary type="html">&lt;p&gt;Babafou: /* 2.4 Création, déplacement et suppression de fichiers (valeur : 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
L&#039;objectif de la certification Linux Essentials est de définir les connaissances élémentaires requises pour utiliser de manière compétente un ordinateur fixe ou portable fonctionnant avec le système d&#039;exploitation Linux. Le programme Linux Essentials qui lui est associé guidera et encouragera les jeunes gens (et ceux qui découvrent Linux et le logiciel libre) à comprendre la place de Linux et du logiciel libre dans le contexte plus large de l&#039;industrie informatique.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Description des candidats==&lt;br /&gt;
&lt;br /&gt;
Voici la description d&#039;un candidat qui est à peine qualifié pour réussir l&#039;examen Linux Essentials. Cette personne hypothétique est appelée Candidat Minimalement Qualifié (CMQ). Le niveau de l&#039;examen Linux Essentials est fixé de telle sorte que cette personne (ainsi que quiconque de plus compétent) puisse le réussir mais que quiconque de moins compétent ne le puisse pas.&lt;br /&gt;
&lt;br /&gt;
Le CMQ doit comprendre l&#039;industrie de Linux et du logiciel libre et connaître les applications libres les plus répandues. Le candidat doit comprendre les composants principaux du système d&#039;exploitation Linux et avoir les compétences techniques lui permettant de travailler sous Linux en ligne de commande. Le CMQ doit comprendre les rudiments de la sécurité et de l&#039;administration tels que la gestion des utilisateurs et des groupes, le travail en ligne de commande et les droits d&#039;accès. Le détenteur de la certification Linux Essentials est très probablement l&#039;utilisateur final d&#039;un système administré par ailleurs.&lt;br /&gt;
&lt;br /&gt;
Le &#039;&#039;&#039;CMQ Linux Essentials&#039;&#039;&#039; doit avoir des compétences ou des connaissances rudimentaires dans les domaines suivants :&lt;br /&gt;
&lt;br /&gt;
* le logiciel libre ou à code source ouvert, les différentes communautés et licences&lt;br /&gt;
* les processus, les programmes et les composants d&#039;un système d&#039;exploitation&lt;br /&gt;
* le matériel informatique&lt;br /&gt;
* la sécurité du système, les utilisateurs, les groupes et les droits d&#039;accès pour des répertoires publiques et privés&lt;br /&gt;
* rendre le système accessible et pouvoir le raccorder à d&#039;autres ordinateurs en réseau local&lt;br /&gt;
* les applications libres sur le lieu de travail et comment elles se rapportent à leurs équivalent propriétaires&lt;br /&gt;
* les explorateurs du système de fichiers sur un poste de travail sous Linux&lt;br /&gt;
* où trouver de l&#039;aide&lt;br /&gt;
* travailler en ligne de commande et avec des fichiers&lt;br /&gt;
* réaliser des sauvegardes et des archives simples et les restaurer&lt;br /&gt;
* utiliser un éditeur élémentaire en ligne de commande &lt;br /&gt;
* comprimer des fichiers&lt;br /&gt;
* créer et exécuter des scripts shell simples&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Informations de version==&lt;br /&gt;
&lt;br /&gt;
Ceci est la version 1.6 des objectifs.&lt;br /&gt;
&lt;br /&gt;
Vous trouverez également le [[LinuxEssentials_Summary_Version_1.5_To_1.6|résumé et les informations détaillées]] concernant les différences entre les versions 1.5 et 1.6 des objectifs.&lt;br /&gt;
&lt;br /&gt;
La [[LinuxEssentials Objectives V1.5|version 1.5 des objectifs]] est disponible [[LinuxEssentials Objectives V1.5|ici]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traductions des objectifs==&lt;br /&gt;
&lt;br /&gt;
Les traductions suivantes sont disponibles sur ce wiki :&lt;br /&gt;
&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6|Anglais]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(PT-BR)|Portugais (brésilien)]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(ZH)|Chinois (simplifié)]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(ZH-TW)|Chinois (traditionnel)]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(NL)|Néerlandais]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(FR)|Français]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(DE)|Allemand]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(IT)|Italien]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(JA)|Japonais]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(ES)|Espagnol]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Examens et prérequis==&lt;br /&gt;
&lt;br /&gt;
La certification Linux Essentials est décernée après avoir réussi l&#039;examen :&lt;br /&gt;
&lt;br /&gt;
* 010 (40 questions en 60 minutes)&lt;br /&gt;
&lt;br /&gt;
Il n&#039;est pas nécessaire de posséder une autre certification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectifs==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 1 : Communauté Linux et carrière dans le logiciel libre&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;1.1 Évolution de Linux et systèmes d&#039;exploitation populaires (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Connaissance de l&#039;évolution de Linux et des distributions principales.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Distributions&lt;br /&gt;
* Systèmes embarqués&lt;br /&gt;
* Linux dans le nuage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Debian, Ubuntu (LTS)&lt;br /&gt;
* CentOS, openSUSE, Red Hat, SUSE&lt;br /&gt;
* Linux Mint, Scientific Linux&lt;br /&gt;
* Raspberry Pi, Raspbian&lt;br /&gt;
* Android&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;1.2 Applications libres majeures (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Savoir quelles sont les applications majeures ainsi que leurs utilisations et leur évolution.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Applications pour postes de travail&lt;br /&gt;
* Applications pour serveurs&lt;br /&gt;
* Langages de programmation&lt;br /&gt;
* Outils de gestion et dépôts de paquetages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenOffice.org, LibreOffice, Thunderbird, Firefox, GIMP&lt;br /&gt;
* Nextcloud, ownCloud&lt;br /&gt;
* Apache HTTPD, NGINX, MariaDB, MySQL, NFS, Samba&lt;br /&gt;
* C, Java, JavaScript, Perl, shell, Python, PHP&lt;br /&gt;
* dpkg, apt-get, rpm, yum&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;1.3 Logiciel à code source ouvert et licences (valeur : 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Communautés ouvertes et licences de logiciels à code source ouvert pour les entreprises.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Philosophie des logiciels à code source ouvert&lt;br /&gt;
* Licences des logiciels à code source ouvert&lt;br /&gt;
* Free Software Foundation (FSF), Open Source Initiative (OSI)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Copyleft, Permissive&lt;br /&gt;
* GPL, BSD, Creative Commons&lt;br /&gt;
* Free Software, Open Source Software, FOSS, FLOSS&lt;br /&gt;
* Modèles économiques des logiciels à code source ouvert&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;1.4 Compétences informatiques et travail sous Linux (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Compétences élémentaires en technologies de l&#039;information et de la communication(TIC) et travail sous Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Compétences en bureautique&lt;br /&gt;
* Accéder à la ligne de commande&lt;br /&gt;
* Utilisations de Linux, de l&#039;informatique en nuage et de la virtualisation dans l&#039;industrie&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Utilisation d&#039;un navigateur Web, préoccupations de confidentialité, options de configuration, recherche sur le Web et sauvegarde de contenu&lt;br /&gt;
* Terminal et console&lt;br /&gt;
* Problématiques de mots de passe&lt;br /&gt;
* Problématiques et outils de confidentialité&lt;br /&gt;
* Utilisation d&#039;applications à code source ouvert courantes pour des présentations et des projets&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 2 : Trouver son chemin sur un système Linux&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;2.1 Bases sur la ligne de commande (valeur : 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Bases d&#039;utilisation en ligne de commande sous Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Interpréteur de commandes élémentaire&lt;br /&gt;
* Syntaxe en ligne de commande&lt;br /&gt;
* Variables&lt;br /&gt;
* TODO Quoting&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bash&lt;br /&gt;
* echo&lt;br /&gt;
* history&lt;br /&gt;
* Variable d&#039;environnement PATH&lt;br /&gt;
* export&lt;br /&gt;
* type&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;2.2 Utilisation de la ligne de commande pour obtenir de l&#039;aide (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Exécution de commandes d&#039;aide et navigation dans les différents systèmes d&#039;aide.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Pages de manuel&lt;br /&gt;
* Pages d&#039;information&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* man&lt;br /&gt;
* info&lt;br /&gt;
* /usr/share/doc/&lt;br /&gt;
* locate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;2.3 Utilisation des répertoires et liste des fichiers (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Navigation dans le répertoire personnel et les répertoires du système et affichage de listes de fichiers à différents emplacements.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Fichiers, répertoires&lt;br /&gt;
* Fichiers et répertoires cachés&lt;br /&gt;
* Répertoires personnels&lt;br /&gt;
* Chemins d&#039;accès absolus et relatifs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Options courantes de ls&lt;br /&gt;
* listes récursives de fichiers&lt;br /&gt;
* cd &lt;br /&gt;
* &#039;&#039;&#039;.&#039;&#039;&#039; et &#039;&#039;&#039;..&#039;&#039;&#039;&lt;br /&gt;
* répertoire personnel et ~&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;2.4 Création, déplacement et suppression de fichiers (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Créer, déplacer et supprimer fichiers et répertoires dans le répertoire personnel.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Fichiers et répertoires&lt;br /&gt;
* Sensibilité à la casse&lt;br /&gt;
* Englobements simples&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mv, cp, rm, touch&lt;br /&gt;
* mkdir, rmdir&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 3 : Le pouvoir de la ligne de commande&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;3.1 Archivage de fichiers en ligne de commande (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Archiver des fichiers dans le répertoire personnel de l&#039;utilisateur.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Fichiers, répertoires&lt;br /&gt;
* Archives, compression&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
* Options courantes de tar&lt;br /&gt;
* gzip, bzip2, xz&lt;br /&gt;
* zip, unzip&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;3.2 Recherche et extraction de données à partir de fichiers (valeur : 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Rechercher et extraire des données à partir de fichiers dans le répertoire personnel.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tuyaux en ligne de commande&lt;br /&gt;
* Redirection d&#039;entrée-sortie&lt;br /&gt;
* Expressions rationnelles élémentaires utilisant ., [ ], *, et ?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* grep&lt;br /&gt;
* less&lt;br /&gt;
* cat, head, tail&lt;br /&gt;
* sort&lt;br /&gt;
* cut&lt;br /&gt;
* wc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;3.3 Conversion de commandes en script (valeur : 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Convertir des commandes répétitives en scripts simples.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Faire des scripts shell simples&lt;br /&gt;
* Connaître des éditeurs de texte courants (vi et nano)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* #! (shebang)&lt;br /&gt;
* /bin/bash&lt;br /&gt;
* Variables&lt;br /&gt;
* Arguments&lt;br /&gt;
* boucle for&lt;br /&gt;
* echo&lt;br /&gt;
* Statut de sortie&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 4 : Le système d&#039;exploitation Linux&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;4.1 Choix d&#039;un système d&#039;exploitation (valeur : 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Connaissance des systèmes d&#039;exploitation et distributions Linux majeurs.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Différences entre Windows, OS X et Linux&lt;br /&gt;
* Gestion du cycle de vie des distributions&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Interface graphique par rapport à la ligne de commande, configuration d&#039;un poste de travail&lt;br /&gt;
* Cycles de maintenance, versions bêta et stables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;4.2 Compréhension du matériel informatique (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Être familier avec les composants entrant dans la construction d&#039;ordinateurs de bureau et de serveurs.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Matériel informatique&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cartes mères, processeurs, alimentations, disques optiques, périphériques&lt;br /&gt;
* Disques durs, SSD et partitions, /dev/sd*&lt;br /&gt;
* Pilotes de périphériques&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;4.3 Localisation des données (valeur : 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Où les différents types d&#039;informations sont stockés sur un système Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Programmes et configuration&lt;br /&gt;
* Processus&lt;br /&gt;
* Adresses en mémoire&lt;br /&gt;
* Messagerie système&lt;br /&gt;
* Journalisation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ps, top, free&lt;br /&gt;
* syslog, dmesg&lt;br /&gt;
* /etc/, /var/log/&lt;br /&gt;
* /boot/, /proc/, /dev/, /sys/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;4.4 Intégration au réseau (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Interrogation des paramètres de configuration importants du réseau et détermination des prérequis élémentaires pour intégrer un ordinateur à un réseau local.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Internet, réseau, routeurs&lt;br /&gt;
* Interrogation de la configuration DNS cliente&lt;br /&gt;
* Interrogation de la configuration du réseau&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* route, ip route show&lt;br /&gt;
* ifconfig, ip addr show&lt;br /&gt;
* netstat, ss&lt;br /&gt;
* /etc/resolv.conf, /etc/hosts&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
* ping&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 5 : Sécurité et droits d&#039;accès aux fichiers&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;5.1 Sécurité élémentaire et identification des catégories d&#039;utilisateurs (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Différentes catégories d&#039;utilisateurs sur un système Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Root et utilisateurs standards&lt;br /&gt;
* Utilisateurs système&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/passwd, /etc/shadow, /etc/group&lt;br /&gt;
* id, last, who, w&lt;br /&gt;
* sudo, su&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;5.2 Création des utilisateurs et des groupes (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Créer des utilisateurs et des groupes sur un système Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Commandes de création d&#039;utilisateurs et de groupes&lt;br /&gt;
* Identification des utilisateurs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/passwd, /etc/shadow, /etc/group, /etc/skel/&lt;br /&gt;
* useradd, groupadd&lt;br /&gt;
* passwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;5.3 Gestion des propriétés et des droits d&#039;accès aux fichiers (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Comprendre et manipuler les paramètres de droits d&#039;accès et de propriété sur les fichiers.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Droits d&#039;accès et propriété des fichiers et répertoires&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ls -l, ls -a&lt;br /&gt;
* chmod, chown&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;5.4 Répertoires et fichiers spéciaux (valeur : 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Répertoires et fichiers spéciaux sur un système Linux, y compris les droits d&#039;accès spéciaux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Utilisation de fichiers et répertoires temporaires&lt;br /&gt;
* Liens symboliques&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /tmp/, /var/tmp/ et Sticky Bit&lt;br /&gt;
* ls -d&lt;br /&gt;
* ln -s&lt;/div&gt;</summary>
		<author><name>Babafou</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LinuxEssentials_Objectives_V1.6(FR)&amp;diff=5167</id>
		<title>LinuxEssentials Objectives V1.6(FR)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LinuxEssentials_Objectives_V1.6(FR)&amp;diff=5167"/>
		<updated>2019-03-09T15:50:44Z</updated>

		<summary type="html">&lt;p&gt;Babafou: French names for other translations&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
L&#039;objectif de la certification Linux Essentials est de définir les connaissances élémentaires requises pour utiliser de manière compétente un ordinateur fixe ou portable fonctionnant avec le système d&#039;exploitation Linux. Le programme Linux Essentials qui lui est associé guidera et encouragera les jeunes gens (et ceux qui découvrent Linux et le logiciel libre) à comprendre la place de Linux et du logiciel libre dans le contexte plus large de l&#039;industrie informatique.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Description des candidats==&lt;br /&gt;
&lt;br /&gt;
Voici la description d&#039;un candidat qui est à peine qualifié pour réussir l&#039;examen Linux Essentials. Cette personne hypothétique est appelée Candidat Minimalement Qualifié (CMQ). Le niveau de l&#039;examen Linux Essentials est fixé de telle sorte que cette personne (ainsi que quiconque de plus compétent) puisse le réussir mais que quiconque de moins compétent ne le puisse pas.&lt;br /&gt;
&lt;br /&gt;
Le CMQ doit comprendre l&#039;industrie de Linux et du logiciel libre et connaître les applications libres les plus répandues. Le candidat doit comprendre les composants principaux du système d&#039;exploitation Linux et avoir les compétences techniques lui permettant de travailler sous Linux en ligne de commande. Le CMQ doit comprendre les rudiments de la sécurité et de l&#039;administration tels que la gestion des utilisateurs et des groupes, le travail en ligne de commande et les droits d&#039;accès. Le détenteur de la certification Linux Essentials est très probablement l&#039;utilisateur final d&#039;un système administré par ailleurs.&lt;br /&gt;
&lt;br /&gt;
Le &#039;&#039;&#039;CMQ Linux Essentials&#039;&#039;&#039; doit avoir des compétences ou des connaissances rudimentaires dans les domaines suivants :&lt;br /&gt;
&lt;br /&gt;
* le logiciel libre ou à code source ouvert, les différentes communautés et licences&lt;br /&gt;
* les processus, les programmes et les composants d&#039;un système d&#039;exploitation&lt;br /&gt;
* le matériel informatique&lt;br /&gt;
* la sécurité du système, les utilisateurs, les groupes et les droits d&#039;accès pour des répertoires publiques et privés&lt;br /&gt;
* rendre le système accessible et pouvoir le raccorder à d&#039;autres ordinateurs en réseau local&lt;br /&gt;
* les applications libres sur le lieu de travail et comment elles se rapportent à leurs équivalent propriétaires&lt;br /&gt;
* les explorateurs du système de fichiers sur un poste de travail sous Linux&lt;br /&gt;
* où trouver de l&#039;aide&lt;br /&gt;
* travailler en ligne de commande et avec des fichiers&lt;br /&gt;
* réaliser des sauvegardes et des archives simples et les restaurer&lt;br /&gt;
* utiliser un éditeur élémentaire en ligne de commande &lt;br /&gt;
* comprimer des fichiers&lt;br /&gt;
* créer et exécuter des scripts shell simples&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Informations de version==&lt;br /&gt;
&lt;br /&gt;
Ceci est la version 1.6 des objectifs.&lt;br /&gt;
&lt;br /&gt;
Vous trouverez également le [[LinuxEssentials_Summary_Version_1.5_To_1.6|résumé et les informations détaillées]] concernant les différences entre les versions 1.5 et 1.6 des objectifs.&lt;br /&gt;
&lt;br /&gt;
La [[LinuxEssentials Objectives V1.5|version 1.5 des objectifs]] est disponible [[LinuxEssentials Objectives V1.5|ici]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traductions des objectifs==&lt;br /&gt;
&lt;br /&gt;
Les traductions suivantes sont disponibles sur ce wiki :&lt;br /&gt;
&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6|Anglais]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(PT-BR)|Portugais (brésilien)]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(ZH)|Chinois (simplifié)]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(ZH-TW)|Chinois (traditionnel)]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(NL)|Néerlandais]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(FR)|Français]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(DE)|Allemand]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(IT)|Italien]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(JA)|Japonais]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(ES)|Espagnol]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Examens et prérequis==&lt;br /&gt;
&lt;br /&gt;
La certification Linux Essentials est décernée après avoir réussi l&#039;examen :&lt;br /&gt;
&lt;br /&gt;
* 010 (40 questions en 60 minutes)&lt;br /&gt;
&lt;br /&gt;
Il n&#039;est pas nécessaire de posséder une autre certification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectifs==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 1 : Communauté Linux et carrière dans le logiciel libre&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;1.1 Évolution de Linux et systèmes d&#039;exploitation populaires (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Connaissance de l&#039;évolution de Linux et des distributions principales.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Distributions&lt;br /&gt;
* Systèmes embarqués&lt;br /&gt;
* Linux dans le nuage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Debian, Ubuntu (LTS)&lt;br /&gt;
* CentOS, openSUSE, Red Hat, SUSE&lt;br /&gt;
* Linux Mint, Scientific Linux&lt;br /&gt;
* Raspberry Pi, Raspbian&lt;br /&gt;
* Android&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;1.2 Applications libres majeures (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Savoir quelles sont les applications majeures ainsi que leurs utilisations et leur évolution.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Applications pour postes de travail&lt;br /&gt;
* Applications pour serveurs&lt;br /&gt;
* Langages de programmation&lt;br /&gt;
* Outils de gestion et dépôts de paquetages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenOffice.org, LibreOffice, Thunderbird, Firefox, GIMP&lt;br /&gt;
* Nextcloud, ownCloud&lt;br /&gt;
* Apache HTTPD, NGINX, MariaDB, MySQL, NFS, Samba&lt;br /&gt;
* C, Java, JavaScript, Perl, shell, Python, PHP&lt;br /&gt;
* dpkg, apt-get, rpm, yum&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;1.3 Logiciel à code source ouvert et licences (valeur : 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Communautés ouvertes et licences de logiciels à code source ouvert pour les entreprises.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Philosophie des logiciels à code source ouvert&lt;br /&gt;
* Licences des logiciels à code source ouvert&lt;br /&gt;
* Free Software Foundation (FSF), Open Source Initiative (OSI)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Copyleft, Permissive&lt;br /&gt;
* GPL, BSD, Creative Commons&lt;br /&gt;
* Free Software, Open Source Software, FOSS, FLOSS&lt;br /&gt;
* Modèles économiques des logiciels à code source ouvert&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;1.4 Compétences informatiques et travail sous Linux (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Compétences élémentaires en technologies de l&#039;information et de la communication(TIC) et travail sous Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Compétences en bureautique&lt;br /&gt;
* Accéder à la ligne de commande&lt;br /&gt;
* Utilisations de Linux, de l&#039;informatique en nuage et de la virtualisation dans l&#039;industrie&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Utilisation d&#039;un navigateur Web, préoccupations de confidentialité, options de configuration, recherche sur le Web et sauvegarde de contenu&lt;br /&gt;
* Terminal et console&lt;br /&gt;
* Problématiques de mots de passe&lt;br /&gt;
* Problématiques et outils de confidentialité&lt;br /&gt;
* Utilisation d&#039;applications à code source ouvert courantes pour des présentations et des projets&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 2 : Trouver son chemin sur un système Linux&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;2.1 Bases sur la ligne de commande (valeur : 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Bases d&#039;utilisation en ligne de commande sous Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Interpréteur de commandes élémentaire&lt;br /&gt;
* Syntaxe en ligne de commande&lt;br /&gt;
* Variables&lt;br /&gt;
* TODO Quoting&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bash&lt;br /&gt;
* echo&lt;br /&gt;
* history&lt;br /&gt;
* Variable d&#039;environnement PATH&lt;br /&gt;
* export&lt;br /&gt;
* type&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;2.2 Utilisation de la ligne de commande pour obtenir de l&#039;aide (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Exécution de commandes d&#039;aide et navigation dans les différents systèmes d&#039;aide.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Pages de manuel&lt;br /&gt;
* Pages d&#039;information&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* man&lt;br /&gt;
* info&lt;br /&gt;
* /usr/share/doc/&lt;br /&gt;
* locate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;2.3 Utilisation des répertoires et liste des fichiers (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Navigation dans le répertoire personnel et les répertoires du système et affichage de listes de fichiers à différents emplacements.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Fichiers, répertoires&lt;br /&gt;
* Fichiers et répertoires cachés&lt;br /&gt;
* Répertoires personnels&lt;br /&gt;
* Chemins d&#039;accès absolus et relatifs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Options courantes de ls&lt;br /&gt;
* listes récursives de fichiers&lt;br /&gt;
* cd &lt;br /&gt;
* &#039;&#039;&#039;.&#039;&#039;&#039; et &#039;&#039;&#039;..&#039;&#039;&#039;&lt;br /&gt;
* répertoire personnel et ~&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;2.4 Création, déplacement et suppression de fichiers (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Créer, déplacer et supprimer fichiers et répertoires dans le répertoire personnel.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Fichiers et répertoires&lt;br /&gt;
* Sensibilité à la casse&lt;br /&gt;
* TODO Englobement simple Simple globbing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mv, cp, rm, touch&lt;br /&gt;
* mkdir, rmdir&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 3 : Le pouvoir de la ligne de commande&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;3.1 Archivage de fichiers en ligne de commande (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Archiver des fichiers dans le répertoire personnel de l&#039;utilisateur.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Fichiers, répertoires&lt;br /&gt;
* Archives, compression&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
* Options courantes de tar&lt;br /&gt;
* gzip, bzip2, xz&lt;br /&gt;
* zip, unzip&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;3.2 Recherche et extraction de données à partir de fichiers (valeur : 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Rechercher et extraire des données à partir de fichiers dans le répertoire personnel.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tuyaux en ligne de commande&lt;br /&gt;
* Redirection d&#039;entrée-sortie&lt;br /&gt;
* Expressions rationnelles élémentaires utilisant ., [ ], *, et ?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* grep&lt;br /&gt;
* less&lt;br /&gt;
* cat, head, tail&lt;br /&gt;
* sort&lt;br /&gt;
* cut&lt;br /&gt;
* wc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;3.3 Conversion de commandes en script (valeur : 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Convertir des commandes répétitives en scripts simples.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Faire des scripts shell simples&lt;br /&gt;
* Connaître des éditeurs de texte courants (vi et nano)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* #! (shebang)&lt;br /&gt;
* /bin/bash&lt;br /&gt;
* Variables&lt;br /&gt;
* Arguments&lt;br /&gt;
* boucle for&lt;br /&gt;
* echo&lt;br /&gt;
* Statut de sortie&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 4 : Le système d&#039;exploitation Linux&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;4.1 Choix d&#039;un système d&#039;exploitation (valeur : 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Connaissance des systèmes d&#039;exploitation et distributions Linux majeurs.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Différences entre Windows, OS X et Linux&lt;br /&gt;
* Gestion du cycle de vie des distributions&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Interface graphique par rapport à la ligne de commande, configuration d&#039;un poste de travail&lt;br /&gt;
* Cycles de maintenance, versions bêta et stables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;4.2 Compréhension du matériel informatique (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Être familier avec les composants entrant dans la construction d&#039;ordinateurs de bureau et de serveurs.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Matériel informatique&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cartes mères, processeurs, alimentations, disques optiques, périphériques&lt;br /&gt;
* Disques durs, SSD et partitions, /dev/sd*&lt;br /&gt;
* Pilotes de périphériques&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;4.3 Localisation des données (valeur : 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Où les différents types d&#039;informations sont stockés sur un système Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Programmes et configuration&lt;br /&gt;
* Processus&lt;br /&gt;
* Adresses en mémoire&lt;br /&gt;
* Messagerie système&lt;br /&gt;
* Journalisation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ps, top, free&lt;br /&gt;
* syslog, dmesg&lt;br /&gt;
* /etc/, /var/log/&lt;br /&gt;
* /boot/, /proc/, /dev/, /sys/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;4.4 Intégration au réseau (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Interrogation des paramètres de configuration importants du réseau et détermination des prérequis élémentaires pour intégrer un ordinateur à un réseau local.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Internet, réseau, routeurs&lt;br /&gt;
* Interrogation de la configuration DNS cliente&lt;br /&gt;
* Interrogation de la configuration du réseau&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* route, ip route show&lt;br /&gt;
* ifconfig, ip addr show&lt;br /&gt;
* netstat, ss&lt;br /&gt;
* /etc/resolv.conf, /etc/hosts&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
* ping&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 5 : Sécurité et droits d&#039;accès aux fichiers&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;5.1 Sécurité élémentaire et identification des catégories d&#039;utilisateurs (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Différentes catégories d&#039;utilisateurs sur un système Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Root et utilisateurs standards&lt;br /&gt;
* Utilisateurs système&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/passwd, /etc/shadow, /etc/group&lt;br /&gt;
* id, last, who, w&lt;br /&gt;
* sudo, su&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;5.2 Création des utilisateurs et des groupes (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Créer des utilisateurs et des groupes sur un système Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Commandes de création d&#039;utilisateurs et de groupes&lt;br /&gt;
* Identification des utilisateurs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/passwd, /etc/shadow, /etc/group, /etc/skel/&lt;br /&gt;
* useradd, groupadd&lt;br /&gt;
* passwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;5.3 Gestion des propriétés et des droits d&#039;accès aux fichiers (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Comprendre et manipuler les paramètres de droits d&#039;accès et de propriété sur les fichiers.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Droits d&#039;accès et propriété des fichiers et répertoires&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ls -l, ls -a&lt;br /&gt;
* chmod, chown&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;5.4 Répertoires et fichiers spéciaux (valeur : 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Répertoires et fichiers spéciaux sur un système Linux, y compris les droits d&#039;accès spéciaux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Utilisation de fichiers et répertoires temporaires&lt;br /&gt;
* Liens symboliques&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /tmp/, /var/tmp/ et Sticky Bit&lt;br /&gt;
* ls -d&lt;br /&gt;
* ln -s&lt;/div&gt;</summary>
		<author><name>Babafou</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-1_Objectives_V5.0(FR)&amp;diff=5166</id>
		<title>LPIC-1 Objectives V5.0(FR)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-1_Objectives_V5.0(FR)&amp;diff=5166"/>
		<updated>2019-03-09T15:47:28Z</updated>

		<summary type="html">&lt;p&gt;Babafou: /* Traductions des objectifs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Cet examen est nécessaire pour obtenir la certification LPI de niveau 1. Il couvre les compétences d&#039;administration Linux communes aux différentes distributions.&lt;br /&gt;
&lt;br /&gt;
Cette page présente les objectifs de la version actuelle de la certification LPIC-1. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Informations de version==&lt;br /&gt;
&lt;br /&gt;
Ceci est la version 5.0.0 des objectifs.&lt;br /&gt;
&lt;br /&gt;
Vous trouverez également le [[LPIC-1_Summary_Version_4.0_To_5.0|résumé et les informations détaillées]] concernant les différences entre les versions 4.0 et 5.0 des objectifs.&lt;br /&gt;
&lt;br /&gt;
La version [[LPIC-1_Objectives_V4(FR)|4 des objectifs]] est disponible [[LPIC-1_Objectives_V4(FR)|ici]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Examens==&lt;br /&gt;
&lt;br /&gt;
Pour être certifié [[LPIC-1 Objectives V5.0(FR)|LPIC-1]], le candidat doit obtenir les examens [[LPIC-1 Objectives V5(FR)#Objectifs: Examen 101|101]] et [[LPIC-1 Objectives V5(FR)#Objectifs: Examen 102|102]].&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 101|101]]&lt;br /&gt;
* [[#Objectives: Exam 102|102]]&lt;br /&gt;
&lt;br /&gt;
==Mises à jour==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traductions des objectifs==&lt;br /&gt;
&lt;br /&gt;
Les traductions suivantes sont disponibles sur ce wiki :&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-1 Objectives V5.0|Anglais]]&lt;br /&gt;
* [[LPIC-1 Objectives V5.0(PT-BR)|Portugais(Portugal)]]&lt;br /&gt;
* [[LPIC-1 Objectives V5.0(ZH)|Chinois (simplifié)]]&lt;br /&gt;
* [[LPIC-1 Objectives V5.0(ZH-TW)|Chinois (traditionnel)]]&lt;br /&gt;
* [[LPIC-1 Objectives V5.0(FR)|Français]]&lt;br /&gt;
* [[LPIC-1 Objectives V5.0(DE)|Allemand]]&lt;br /&gt;
* [[LPIC-1 Objectives V5.0(IT)|Italien]]&lt;br /&gt;
* [[LPIC-1 Objectives V5.0(JA)|Japonais]]&lt;br /&gt;
* [[LPIC-1 Objectives V5.0(ES)|Espagnol]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectifs de l&#039;examen LPI 101==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 101 : Architecture système&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;101.1 Détermination et configuration des paramètres du matériel&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de déterminer et de configurer le matériel.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Activer et désactiver les périphériques intégrés.&lt;br /&gt;
* Savoir différencier les types de périphériques de stockage de masse.&lt;br /&gt;
* Déterminer les ressources matérielles des périphériques.&lt;br /&gt;
* Outils et commandes permettant d&#039;obtenir des informations sur les périphériques (par exemple lsusb, lspci, etc.).&lt;br /&gt;
* Outils et commandes permettant de manipuler les périphériques USB.&lt;br /&gt;
* Compréhension des concepts sysfs, udev et dbus.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sys/&lt;br /&gt;
* /proc/&lt;br /&gt;
* /dev/&lt;br /&gt;
* modprobe&lt;br /&gt;
* lsmod&lt;br /&gt;
* lspci&lt;br /&gt;
* lsusb &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;101.2 Démarrage du système&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de guider le système dans la procédure d&#039;initialisation.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Passage de commandes au chargeur de démarrage et passage de paramètres d&#039;amorçage au noyau. &lt;br /&gt;
* Démontrer sa connaissance des séquences d&#039;amorçage depuis le BIOS / UEFI jusqu&#039;à l&#039;achèvement des séquences de démarrage.&lt;br /&gt;
* Compréhension de l&#039;init SysV et de systemd.&lt;br /&gt;
* Sensibilisation à Upstart. &lt;br /&gt;
* Consulter les événements de la phase de démarrage dans les journaux (logs). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
* journalctl&lt;br /&gt;
* BIOS&lt;br /&gt;
* UEFI&lt;br /&gt;
* chargeur d&#039;amorçage (bootloader)&lt;br /&gt;
* kernel&lt;br /&gt;
* initramfs&lt;br /&gt;
* init&lt;br /&gt;
* SysVinit&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;101.3 Changement de niveaux d&#039;exécution / des cibles de démarrage de systemd et arrêt ou redémarrage du système &amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de gérer les niveaux d&#039;exécution d&#039;init SysV et les cibles (target) systemd du système. Cet objectif inclut le passage en mode mono-utilisateur, l&#039;arrêt et le redémarrage du système. Les candidats doivent être en mesure de prévenir les utilisateurs avant de changer de niveau d&#039;exécution ou de cible systemd (target) et de terminer correctement les processus. Cet objectif inclut également le paramétrage du niveau d&#039;exécution ou de la cible systemd par défaut. Il inclut également la connaissance d&#039;Upstart comme alternative à init SysV ou à systemd.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Paramétrage du niveau d&#039;exécution ou de la cible systemd par défaut.&lt;br /&gt;
* Passage d&#039;un niveau d&#039;exécution / d&#039;une cible systemd à un(e) autre, y compris en mode mono-utilisateur.&lt;br /&gt;
* Arrêt et redémarrage du système en ligne de commande.&lt;br /&gt;
* Avertissement des utilisateurs avant un changement de niveau d&#039;exécution / de cible systemd ou pour d&#039;autres événements système importants.&lt;br /&gt;
* Terminer les processus correctement.&lt;br /&gt;
* Connaissance de base de acpid.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/inittab&lt;br /&gt;
* shutdown&lt;br /&gt;
* init&lt;br /&gt;
* /etc/init.d/&lt;br /&gt;
* telinit &lt;br /&gt;
* systemd&lt;br /&gt;
* systemctl&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
* wall&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 102 : Installation de Linux et gestion de paquetages&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;102.1 Conception du schéma de partitionnement&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de concevoir un schéma de partitionnement du disque dur pour un système Linux. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Répartition des systèmes de fichiers et de l&#039;espace d&#039;échange (swap) sur des partitions ou des disques séparés.&lt;br /&gt;
* Ajustement du schéma de partitionnement en fonction de l&#039;usage prévu du système. &lt;br /&gt;
* Vérification que la partition /boot est conforme aux besoins de l&#039;architecture matérielle pour le démarrage.  &lt;br /&gt;
* Connaissance des caractéristiques de base de LVM.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* système de fichiers racine /&lt;br /&gt;
* système de fichiers /var&lt;br /&gt;
* système de fichiers /home&lt;br /&gt;
* système de fichiers /boot&lt;br /&gt;
* partition système EFI - EFI System Partition (ESP)&lt;br /&gt;
* espace d&#039;échange swap&lt;br /&gt;
* points de montage&lt;br /&gt;
* partitions&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;102.2 Installation d&#039;un gestionnaire d&#039;amorçage&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de sélectionner, d&#039;installer et de configurer un gestionnaire d&#039;amorçage.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Démarrage sur des images d&#039;amorçage alternatives et sauvegarde des options de démarrage.&lt;br /&gt;
* Installation et configuration d&#039;un chargeur de démarrage tel que GRUB Legacy.&lt;br /&gt;
* Modifications élémentaires pour GRUB2.&lt;br /&gt;
* Interactions avec le chargeur d&#039;amorçage. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* menu.lst, grub.cfg et grub.conf&lt;br /&gt;
* grub-install&lt;br /&gt;
* grub-mkconfig&lt;br /&gt;
* MBR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;102.3 Gestion des bibliothèques partagées&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de déterminer les bibliothèques partagées dont dépendent les programmes et les installer en cas de besoin.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Identification des bibliothèques partagées.&lt;br /&gt;
* Identification des emplacements typiques des bibliothèques systèmes.&lt;br /&gt;
* Chargement des bibliothèques partagées. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldd&lt;br /&gt;
* ldconfig&lt;br /&gt;
* /etc/ld.so.conf&lt;br /&gt;
* LD_LIBRARY_PATH &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;102.4 Utilisation du gestionnaire de paquetage Debian&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de gérer les paquetages en utilisant les outils de gestion de paquetages Debian.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Installation, mise à jour et désinstallation des paquetages binaires Debian. &lt;br /&gt;
* Recherche des paquetages contenant des fichiers ou des bibliothèques spécifiques installés ou non. &lt;br /&gt;
* Obtention d&#039;informations sur un paquetage Debian comme la version, le contenu, les dépendances, l&#039;intégrité du paquetage, et l&#039;état d&#039;installation (que le paquetage soit installé ou non). &lt;br /&gt;
* Connaissance de base de apt.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/apt/sources.list&lt;br /&gt;
* dpkg&lt;br /&gt;
* dpkg-reconfigure&lt;br /&gt;
* apt-get&lt;br /&gt;
* apt-cache&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;102.5 Utilisation des gestionnaires de paquetage RPM et YUM&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de gérer les paquetages avec les outils RPM, YUM et Zypper. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
*Installation, réinstallation, mise à jour et suppression des paquetages avec RPM, YUM et Zypper. &lt;br /&gt;
* Obtention d&#039;informations sur un paquetage RPM comme la version, le contenu, les dépendances, l&#039;intégrité du paquetage, la signature et l&#039;état d&#039;installation.&lt;br /&gt;
* Détermination des fichiers relatifs à un paquetage donné, et recherche du paquetage auquel appartient un fichier donné. &lt;br /&gt;
* Connaissance de base de dnf.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* rpm&lt;br /&gt;
* rpm2cpio&lt;br /&gt;
* /etc/yum.conf&lt;br /&gt;
* /etc/yum.repos.d/&lt;br /&gt;
* yum&lt;br /&gt;
* zypper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;102.6 Linux en tant que système virtuel hébergé&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de comprendre les implications de la virtualisation et du cloud computing pour un système Linux virtualisé. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Compréhension des concepts généraux concernant la virtualisation et les conteneurs&lt;br /&gt;
* Compréhension des éléments communs de virtualisation dans le Cloud IaaS (Infratruction as a Service), comme les  instances de machines, les blocs de stockage et le réseau&lt;br /&gt;
* Compréhension des propriétés de configuration uniques d&#039;un système Linux à changer en cas de clone ou d&#039;utilisation d&#039;un modèle&lt;br /&gt;
* Compréhension de la manière dont les images système sont utilisées pour déployer les machines virtuelles, instances de machines dans le cloud ou les conteneurs&lt;br /&gt;
* Compréhension des extensions Linux permettant d&#039;intégrer Linux à un outil de virtualisation&lt;br /&gt;
* Connaissance de base de cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Machine virtuelles&lt;br /&gt;
* Conteneur Linux&lt;br /&gt;
* Conteneur d&#039;application&lt;br /&gt;
* Pilotes invité (guest drivers)&lt;br /&gt;
* Clés SSH machine&lt;br /&gt;
* D-Bus machine id&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 103 : Commandes GNU et Unix&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;103.1 Travail en ligne de commande&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure d&#039;interagir avec des shells et des commandes à partir de la ligne de commande. Cet objectif est basé sur le shell Bash.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Utilisation de commandes ou de séquences de commandes pour réaliser des tâches simples en ligne de commande.&lt;br /&gt;
* Utilisation et modification de l&#039;environnement du shell, en particulier la définition, l&#039;export et le référencement des variables d&#039;environnement.&lt;br /&gt;
* Utilisation et édition de l&#039;historique des commandes.&lt;br /&gt;
* Exécution des commandes comprises ou non dans le chemin (path) par défaut.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* bash&lt;br /&gt;
* echo&lt;br /&gt;
* env&lt;br /&gt;
* export&lt;br /&gt;
* pwd&lt;br /&gt;
* set&lt;br /&gt;
* unset&lt;br /&gt;
* type&lt;br /&gt;
* which&lt;br /&gt;
* man&lt;br /&gt;
* uname&lt;br /&gt;
* history &lt;br /&gt;
* .bash_history&lt;br /&gt;
* Protection (quoting)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;103.2 Traitement de flux de type texte avec des filtres&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure d&#039;appliquer des filtres à un flux de type texte. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Envoi de fichiers textes ou de sorties de commandes à des filtres textuels pour les modifier en utilisant des commandes UNIX appartenant au paquetage GNU textutils.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* bzcat&lt;br /&gt;
* cat&lt;br /&gt;
* cut&lt;br /&gt;
* head&lt;br /&gt;
* less&lt;br /&gt;
* md5sum&lt;br /&gt;
* nl&lt;br /&gt;
* od&lt;br /&gt;
* paste&lt;br /&gt;
* sed&lt;br /&gt;
* sha256sum&lt;br /&gt;
* sha512sum&lt;br /&gt;
* sort&lt;br /&gt;
* split&lt;br /&gt;
* tail&lt;br /&gt;
* tr&lt;br /&gt;
* uniq&lt;br /&gt;
* wc &lt;br /&gt;
* xzcat&lt;br /&gt;
* zcat&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;103.3 Gestion élémentaire des fichiers&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure d&#039;utiliser les commandes Linux de base pour gérer les fichiers et les répertoires. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Copie, déplacement et suppression des fichiers ou des répertoires individuellement. &lt;br /&gt;
* Copie récursive de plusieurs fichiers et répertoires.&lt;br /&gt;
* Suppression récursive de fichiers et répertoires.&lt;br /&gt;
* Utilisation simple et avancée des caractères génériques (wildcard) dans les commandes.&lt;br /&gt;
* Utilisation de find pour localiser et agir sur des fichiers en se basant sur leurs types, leurs tailles ou leurs temps (de création, modification ou accès). &lt;br /&gt;
* Utilisation des commandes tar, cpio et dd. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* cp&lt;br /&gt;
* find&lt;br /&gt;
* mkdir&lt;br /&gt;
* mv&lt;br /&gt;
* ls&lt;br /&gt;
* rm&lt;br /&gt;
* rmdir&lt;br /&gt;
* touch&lt;br /&gt;
* tar&lt;br /&gt;
* cpio&lt;br /&gt;
* dd&lt;br /&gt;
* file&lt;br /&gt;
* gzip&lt;br /&gt;
* gunzip&lt;br /&gt;
* bzip2&lt;br /&gt;
* bunzip2&lt;br /&gt;
* xz&lt;br /&gt;
* unxz&lt;br /&gt;
* Développement des noms de fichiers (file globbing) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;103.4 Utilisation des flux, des tubes et des redirections&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de rediriger des flux et de les associer pour traiter efficacement des données textuelles.  Ces tâches incluent les redirections de l&#039;entrée standard, de la sortie standard et de l&#039;erreur standard, la redirection de la sortie d&#039;une commande vers l&#039;entrée d&#039;une autre, l&#039;utilisation de la sortie d&#039;une commande comme paramètres pour une autre commande et l&#039;envoi de la sortie à la fois sur la sortie standard et dans un fichier.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Redirection de l&#039;entrée standard, de la sortie standard et de l&#039;erreur standard.&lt;br /&gt;
* Connexion de la sortie d&#039;une commande à l&#039;entrée d&#039;une autre commande.&lt;br /&gt;
* Utilisation de la sortie d&#039;une commande comme paramètres d&#039;une autre commande.&lt;br /&gt;
* Envoi simultané du résultat d&#039;une commande vers la sortie standard et vers un fichier. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* tee&lt;br /&gt;
* xargs &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;103.5 Création, contrôle et interruption des processus&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure d&#039;effectuer une gestion élémentaire des processus. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Exécution de tâches au premier plan et en arrière plan.&lt;br /&gt;
* Indiquer à un programme qu&#039;il doit continuer à s&#039;exécuter après la déconnexion.&lt;br /&gt;
* Contrôle des processus actifs.&lt;br /&gt;
* Sélection et tri des processus à afficher. &lt;br /&gt;
* Envoi de signaux aux processus.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &amp;amp;&lt;br /&gt;
* bg&lt;br /&gt;
* fg&lt;br /&gt;
* jobs&lt;br /&gt;
* kill&lt;br /&gt;
* nohup&lt;br /&gt;
* ps&lt;br /&gt;
* top&lt;br /&gt;
* free&lt;br /&gt;
* uptime&lt;br /&gt;
* pgrep&lt;br /&gt;
* pkill&lt;br /&gt;
* killall&lt;br /&gt;
* watch&lt;br /&gt;
* screen &lt;br /&gt;
* tmux&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;103.6 Modification des priorités des processus&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de gérer les priorités des processus.  &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Connaissance de la priorité par défaut affectée à un nouveau processus.&lt;br /&gt;
* Exécution de programme avec une priorité plus haute ou plus basse que celle par défaut. &lt;br /&gt;
* Changement de la priorité d&#039;un processus en cours d&#039;exécution.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nice&lt;br /&gt;
* ps&lt;br /&gt;
* renice&lt;br /&gt;
* top &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;103.7 Recherche dans des fichiers texte avec les expressions rationnelles&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de manipuler des fichiers et des données de type texte en utilisant des expressions rationnelles. Cet objectif inclut la création d&#039;expressions rationnelles simples contenant différents caractères de notation ainsi que la compréhension des différences entre les expressions rationnelles de simples et étendues. Cela inclut également l&#039;utilisation des expressions rationnelles dans des commandes pour effectuer des recherches dans une arborescence ou dans le contenu d&#039;un fichier. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Création d&#039;expressions rationnelles simples contenant différents éléments de notation. &lt;br /&gt;
* Compréhension des différences entre les expressions rationnelles simples et étendues.&lt;br /&gt;
* Compréhension des concepts de caractères spéciaux, classes de caractères et ancres.&lt;br /&gt;
* Utilisation des expressions rationnelles dans des commandes pour effectuer des recherches dans une arborescence ou dans le contenu d&#039;un fichier. &lt;br /&gt;
* Utilisation des expressions rationnelles pour supprimer, modifier et substituer du texte.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* grep&lt;br /&gt;
* egrep&lt;br /&gt;
* fgrep&lt;br /&gt;
* sed&lt;br /&gt;
* regex(7) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;103.8 Édition de fichier simple&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure d&#039;éditer des fichiers texte avec vi. Cet objectif inclut le déplacement dans vi, les modes de base de vi, l&#039;insertion, la modification, la suppression, la copie et la recherche de texte.  Cela inclut également la connaissance d&#039;autres éditeurs de texte courants ainsi que la configuration de l&#039;éditeur de texte par défaut..&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Déplacement dans un document édité avec vi. &lt;br /&gt;
* Compréhension et utilisation des modes de base de vi.&lt;br /&gt;
* Insertion, modification, suppression, copie et recherche de texte dans vi.&lt;br /&gt;
* Connaissance de base de Emacs, nano et vim.&lt;br /&gt;
* Configuration de l&#039;éditeur de texte par défaut.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* vi&lt;br /&gt;
* /, ?&lt;br /&gt;
* h,j,k,l&lt;br /&gt;
* i, o, a&lt;br /&gt;
* d, p, y, dd, yy&lt;br /&gt;
* ZZ, :w!, :q!&lt;br /&gt;
* EDITOR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 104 : Disques, systèmes de fichiers Linux , arborescence de fichiers standard (FHS) &#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;104.1 Création des partitions et des systèmes de fichiers&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de configurer le partitionnement des disques puis de créer des systèmes de fichiers sur des supports comme les disques durs. Ceci inclut la prise en charge des partitions d&#039;échange (swap). &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Gestion des tables de partition MBR et GPT&lt;br /&gt;
* Utilisation des différentes commandes mkfs pour le paramétrage des partitions et la création des différents systèmes de fichiers comme :&lt;br /&gt;
** ext2/ext3/ext4&lt;br /&gt;
** XFS&lt;br /&gt;
** VFAT&lt;br /&gt;
** exFAT&lt;br /&gt;
* Connaissance de base de Btrfs, y compris les systèmes de fichiers sur plusieurs périphériques, la compression et les sous-volumes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* fdisk&lt;br /&gt;
* gdisk&lt;br /&gt;
* parted&lt;br /&gt;
* mkfs&lt;br /&gt;
* mkswap &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;104.2 Maintenance de l&#039;intégrité des systèmes de fichiers&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de maintenir l&#039;intégrité d&#039;un système de fichiers standard, ainsi que les informations supplémentaires associées à la journalisation. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Vérification de l&#039;intégrité des systèmes de fichiers.&lt;br /&gt;
* Contrôle de l&#039;espace et des inodes libres.&lt;br /&gt;
* Réparation de problèmes élémentaires sur les système de fichiers. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* du&lt;br /&gt;
* df&lt;br /&gt;
* fsck&lt;br /&gt;
* e2fsck&lt;br /&gt;
* mke2fs&lt;br /&gt;
* tune2fs&lt;br /&gt;
* xfs_repair&lt;br /&gt;
* xfs_fsr&lt;br /&gt;
* xfs_db&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;104.3 Montage et démontage des systèmes de fichiers&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de configurer le montage d&#039;un système de fichiers. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Montage et démontage manuel des systèmes de fichiers.&lt;br /&gt;
* Configuration du montage des systèmes de fichiers au démarrage du système. &lt;br /&gt;
* Configuration des options de montage des systèmes de fichiers.&lt;br /&gt;
* Utilisation des étiquettes et UUID pour l&#039;identification et le montage des systèmes de fichier&lt;br /&gt;
* Connaissance de base des unités de montage systemd mount units (systemd mount units).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
* /media/&lt;br /&gt;
* mount&lt;br /&gt;
* umount &lt;br /&gt;
* blkid&lt;br /&gt;
* lsblk&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;104.4 Supprimé&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;104.5 Gestion des permissions et de la propriété sur les fichiers&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de contrôler l&#039;accès aux fichiers en utilisant les droits d&#039;accès et les propriétés appropriés. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Gestion des permissions d&#039;accès sur les fichiers standards et les fichiers spéciaux, ainsi que sur les répertoires. &lt;br /&gt;
* Utilisation des modes d&#039;accès comme suid, sgid et sticky bit pour maintenir la sécurité.&lt;br /&gt;
* Savoir changer le masque de création des fichiers par défaut.&lt;br /&gt;
* Utilisation du champ groupe pour attribuer les permissions aux membres d&#039;un groupe. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* chmod&lt;br /&gt;
* umask&lt;br /&gt;
* chown&lt;br /&gt;
* chgrp &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;104.6 Création et modification des liens physiques et symboliques sur les fichiers&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de créer et de gérer les liens physiques et symboliques vers un fichier. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Création des liens.&lt;br /&gt;
* Identification des liens physiques et/ou symboliques.&lt;br /&gt;
* Copie versus liens vers les fichiers.&lt;br /&gt;
* Utilisation des liens pour les tâches d&#039;administration système.&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ln&lt;br /&gt;
* ls&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;104.7 Recherche de fichiers et placement des fichiers aux endroits adéquats&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être parfaitement familiarisés avec la norme de la hiérarchie des systèmes de fichiers (FHS - Filesystem Hierarchy Standard), y compris le placement adéquat des fichiers et l&#039;organisation des répertoires. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Compréhension de l&#039;emplacement correct des fichiers dans le FHS.&lt;br /&gt;
* Recherche de fichiers et de commandes sur un système Linux&lt;br /&gt;
* Connaissance de l&#039;emplacement et du but des fichiers et des répertoires importants tels que définis dans la FHS. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* find&lt;br /&gt;
* locate&lt;br /&gt;
* updatedb&lt;br /&gt;
* whereis&lt;br /&gt;
* which&lt;br /&gt;
* type&lt;br /&gt;
* /etc/updatedb.conf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectifs de l&#039;examen LPI 102==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 105 : Shells et scripts Shell&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;105.1 Personnalisation et utilisation de l&#039;environnement du shell&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de personnaliser l&#039;environnement du shell afin de l&#039;adapter aux besoins des utilisateurs.  Les candidats doivent pouvoir modifier les profils globaux et utilisateurs.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Définition des variables environnement (par exemple le PATH) utilisées lors de la connexion ou au lancement d&#039;un nouveau shell.&lt;br /&gt;
* Réalisation de fonctions BASH pour des séquences de commandes fréquentes.&lt;br /&gt;
* Mise à jour des répertoires squelette pour les nouveaux comptes utilisateurs.&lt;br /&gt;
* Définition correcte de la liste des chemins d&#039;accès pour les commandes. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* .&lt;br /&gt;
* source&lt;br /&gt;
* /etc/bash.bashrc&lt;br /&gt;
* /etc/profile&lt;br /&gt;
* env&lt;br /&gt;
* export&lt;br /&gt;
* set&lt;br /&gt;
* unset&lt;br /&gt;
* ~/.bash_profile&lt;br /&gt;
* ~/.bash_login&lt;br /&gt;
* ~/.profile&lt;br /&gt;
* ~/.bashrc&lt;br /&gt;
* ~/.bash_logout&lt;br /&gt;
* function&lt;br /&gt;
* alias &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;105.2 Personnalisation ou écriture de scripts simples&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de personnaliser des scripts existants ou d&#039;écrire des scripts Bash simples.  &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Utilisation de la syntaxe standard du shell sh (boucles, tests).&lt;br /&gt;
* Utilisation de la substitution de commandes.&lt;br /&gt;
* Test de la valeur de retour d’une fonction indiquant la réussite, l’échec ou d’autres informations.&lt;br /&gt;
* Exécution de commandes chaînées.&lt;br /&gt;
* Envoi conditionnel de courriels au superutilisateur.&lt;br /&gt;
* Sélection correcte de l’interpréteur de commandes à utiliser dans l’entête du script (#!).&lt;br /&gt;
* Gestion de l&#039;emplacement, des propriétés, des droits d’exécution et les droits spéciaux (suid) des scripts. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* for&lt;br /&gt;
* while&lt;br /&gt;
* test&lt;br /&gt;
* if&lt;br /&gt;
* read&lt;br /&gt;
* seq&lt;br /&gt;
* exec&lt;br /&gt;
* ||&lt;br /&gt;
* &amp;amp;&amp;amp;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 106 : Interfaces et bureaux utilisateur&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;106.1 Installation et configuration de X11&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure d&#039;installer et de configurer un serveur X11. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Compréhension de l&#039;architecture X11.&lt;br /&gt;
* Compréhension et connaissances de base du fichier de configuration de X Window.&lt;br /&gt;
* Remplacement d&#039;aspects spécifiques de la configuration, comme l&#039;agencement du clavier.&lt;br /&gt;
* Compréhension des composants des environements de bureau, comme les gestionnaires d&#039;affichage et les gestionnaires de fenêtres.&lt;br /&gt;
* Gestion de l&#039;accès au serveur X et affichage d&#039;applications sur des serveurs X distants.&lt;br /&gt;
* Connaissance de base de Wayland.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/X11/xorg.conf&lt;br /&gt;
* /etc/X11/xorg.conf.d/&lt;br /&gt;
* ~/.xsession-errors&lt;br /&gt;
* xhost&lt;br /&gt;
* xauth&lt;br /&gt;
* DISPLAY&lt;br /&gt;
* X &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;106.2 Bureaux graphiques&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent connaître les bureaux graphiques les plus importants sous Linux. De plus, les candidats doivent connaître les protocoles utilisés pour accéder à des sessions graphiques distantes.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Connaissance des bureaux graphiques les plus importants.&lt;br /&gt;
* Connaissance des protocoles utilisés pour accéder aux sessions graphiques distantes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* KDE&lt;br /&gt;
* Gnome&lt;br /&gt;
* Xfce&lt;br /&gt;
* X11&lt;br /&gt;
* XDMCP&lt;br /&gt;
* VNC&lt;br /&gt;
* Spice&lt;br /&gt;
* RDP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;106.3 Accessibilité&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats devront faire la preuve de leurs connaissances et de leur sensibilisation aux technologies d&#039;accessibilité. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Connaissance de base des paramètres d&#039;affichage et des thèmes.&lt;br /&gt;
* Connaissance de base des outils d&#039;accessibilité.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Thèmes du bureau à fort contraste ou grandes polices.&lt;br /&gt;
* Lecteur d&#039;écran.&lt;br /&gt;
* Lecteur braille.&lt;br /&gt;
* Loupe d&#039;écran.&lt;br /&gt;
* Clavier virtuel.&lt;br /&gt;
* Touches Difficiles/Répétition.&lt;br /&gt;
* Touches lentes/rebond/inverser.&lt;br /&gt;
* Émulation de la souris au clavier.&lt;br /&gt;
* Gestuelles.&lt;br /&gt;
* Reconnaissance vocale.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 107 : Tâches d&#039;administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;107.1 Gestion des comptes utilisateurs et des groupes ainsi que des fichiers systèmes concernés&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure d’ajouter, de supprimer, de suspendre et de modifier des comptes utilisateurs. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Ajout, modification et suppression d&#039;utilisateurs et de groupes.&lt;br /&gt;
* Gestion des informations associées aux utilisateurs et aux groupes dans les fichiers de bases de données système.&lt;br /&gt;
* Création et gestion de comptes pour des usages spécifiques et limités. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/shadow&lt;br /&gt;
* /etc/group&lt;br /&gt;
* /etc/skel/&lt;br /&gt;
* chage&lt;br /&gt;
* getent&lt;br /&gt;
* groupadd&lt;br /&gt;
* groupdel&lt;br /&gt;
* groupmod&lt;br /&gt;
* passwd&lt;br /&gt;
* useradd&lt;br /&gt;
* userdel&lt;br /&gt;
* usermod &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;107.2 Automatisation des tâches d&#039;administration par la planification des travaux&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure d’utiliser cron et les horloges systemd (systemd timers) pour exécuter des commandes planifiées et récurrentes ainsi que d’utiliser at pour lancer des commandes à un instant précis. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Gestion des tâches cron et at.&lt;br /&gt;
* Configuration des accès aux services cron et atd.&lt;br /&gt;
* Compréhension des unités d&#039;horloge systemd (systemd timer units).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/cron.{d,daily,hourly,monthly,weekly}/&lt;br /&gt;
* /etc/at.deny&lt;br /&gt;
* /etc/at.allow&lt;br /&gt;
* /etc/crontab&lt;br /&gt;
* /etc/cron.allow&lt;br /&gt;
* /etc/cron.deny&lt;br /&gt;
* /var/spool/cron/&lt;br /&gt;
* crontab&lt;br /&gt;
* at&lt;br /&gt;
* atq&lt;br /&gt;
* atrm&lt;br /&gt;
* systemctl&lt;br /&gt;
* systemd-run&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;107.3 Paramètres régionaux et langues&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de paramétrer le système dans une langue autre que l&#039;anglais. Cet objectif inclut la compréhension de l&#039;intérêt de LANG=C pour l&#039;écriture de scripts.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration de l&#039;environnement linguistique et des variables d&#039;environnement correspondantes.&lt;br /&gt;
* Configuration du fuseau horaire et des variables d&#039;environnement correspondantes.&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/timezone&lt;br /&gt;
* /etc/localtime&lt;br /&gt;
* /usr/share/zoneinfo/&lt;br /&gt;
* LC_*&lt;br /&gt;
* LC_ALL&lt;br /&gt;
* LANG&lt;br /&gt;
* TZ&lt;br /&gt;
* /usr/bin/locale&lt;br /&gt;
* tzselect&lt;br /&gt;
* timedatectl&lt;br /&gt;
* date&lt;br /&gt;
* iconv&lt;br /&gt;
* UTF-8&lt;br /&gt;
* ISO-8859&lt;br /&gt;
* ASCII&lt;br /&gt;
* Unicode &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 108 : Services systèmes essentiels&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;108.1 Gestion de l&#039;horloge système&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de maintenir l&#039;horloge système et de synchroniser l&#039;horloge avec le protocole NTP. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration de la date et de l’heure système.&lt;br /&gt;
* Configuration de l’horloge matérielle correctement en temps UTC.&lt;br /&gt;
* Configuration du fuseau horaire.&lt;br /&gt;
* Configuration élémentaire de NTP avec ntpd et chrony.&lt;br /&gt;
* Connaissance du service pool.ntp.org.&lt;br /&gt;
* Connaissance de base de la commande ntpq.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/share/zoneinfo/&lt;br /&gt;
* /etc/timezone&lt;br /&gt;
* /etc/localtime&lt;br /&gt;
* /etc/ntp.conf&lt;br /&gt;
* /etc/chrony.conf&lt;br /&gt;
* date&lt;br /&gt;
* hwclock&lt;br /&gt;
* timedatectl&lt;br /&gt;
* ntpd&lt;br /&gt;
* ntpdate&lt;br /&gt;
* chronyc&lt;br /&gt;
* pool.ntp.org &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;108.2 Journaux systèmes&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de configurer le service rsyslog. Cet objectif inclut également la configuration du serveur de log pour envoyer la sortie des journaux vers un serveur central ou pour accepter les journaux en tant que serveur central. L&#039;utilisation du sous-système de gestion de journal systemd est couverte.  De même, la connaissance des alternatives que sont syslog et syslog-ng est au programme.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration de base de rsyslog.&lt;br /&gt;
* Compréhension des sous-systèmes (facilities), priorités et actions standards.&lt;br /&gt;
* Interrogation du journal systemd.&lt;br /&gt;
* Filtrage des données du journal systemd sur des critères comme la date, leservice ou la priorité&lt;br /&gt;
* Configuration du stockage persistant du journal systemd et de la taille du journal&lt;br /&gt;
* Suppression des anciennes informations du journal systemd&lt;br /&gt;
* Récupération du journal systemd à partir d&#039;une sauvegarde ou d&#039;une copie&lt;br /&gt;
* Compréhension des interactions entre rsyslog et systemd-journald&lt;br /&gt;
* Configuration de logrotate.&lt;br /&gt;
* Connaissance de base de syslog et syslog-ng.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/rsyslog.conf&lt;br /&gt;
* /var/log/&lt;br /&gt;
* logger &lt;br /&gt;
* logrotate&lt;br /&gt;
* /etc/logrotate.conf&lt;br /&gt;
* /etc/logrotate.d/&lt;br /&gt;
* journalctl&lt;br /&gt;
* systemd-cat&lt;br /&gt;
* /etc/systemd/journald.conf&lt;br /&gt;
* /var/log/journal/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;108.3 Bases sur l&#039;agent de transfert de courrier (MTA)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent connaître les principaux serveurs SMTP, être capables de faire suivre les courriers (forward) et de configurer les alias sur un poste client. Les autres fichiers de configuration ne sont pas au programme.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Création des alias de courriel.&lt;br /&gt;
* Transfert de courriel (forward).&lt;br /&gt;
* Connaissance des principaux serveurs SMTP (postfix, sendmail, et exim) (sans configuration). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ~/.forward&lt;br /&gt;
* couche d&#039;émulation des commandes sendmail&lt;br /&gt;
* newaliases&lt;br /&gt;
* mail&lt;br /&gt;
* mailq&lt;br /&gt;
* postfix&lt;br /&gt;
* sendmail&lt;br /&gt;
* exim&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;108.4 Gestion des imprimantes et de l&#039;impression&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de gérer les files et les travaux d&#039;impression avec CUPS et d&#039;utiliser les commandes de compatibilité avec le système d&#039;impression LPD. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration élémentaire de CUPS (pour les imprimantes locales et distantes).&lt;br /&gt;
* Gestion des files d&#039;attente des utilisateurs.&lt;br /&gt;
* Résolution des problèmes d&#039;impression.&lt;br /&gt;
* Ajout et suppression des travaux des files d&#039;impression configurées. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Fichiers, outils et utilitaires de configuration de CUPS&lt;br /&gt;
* /etc/cups/&lt;br /&gt;
* Interface héritée de lpd (lpr, lprm, lpq) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 109 : Notions élémentaires sur les réseaux&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;109.1 Notions élémentaires sur les protocoles Internet&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de démontrer leur bonne connaissance des fondamentaux sur les réseaux TCP/IP. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Compréhension des masques réseau et de la notation CIDR.&lt;br /&gt;
* Connaissance des différences entre les adresses IP privées et publiques.&lt;br /&gt;
* Connaissance des ports TCP et UDP les plus courants (20, 21, 22, 23, 25, 53, 80, 110, 123, 139, 143, 161, 162, 389, 443, 465, 514, 636, 993, 995).&lt;br /&gt;
* Connaissance des caractéristiques principales et des différences entre UDP, TCP et ICMP.&lt;br /&gt;
* Connaissance des différences principales entre IPv4 et IPv6. &lt;br /&gt;
* Connaissance des caractéristiques de base d&#039;IPv6.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
* Sous-réseaux&lt;br /&gt;
* TCP, UDP, ICMP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;109.2 Configuration réseau persistante&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de gérer la configuration réseau persistante sur un système Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Compréhension de la configuration TCP/IP élémentaire&lt;br /&gt;
* Configuration ethernet et wi-fi network à partir de NetworkManager&lt;br /&gt;
* Connaissance de base de systemd-networkd&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
* /etc/nsswitch.conf&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
* nmcli&lt;br /&gt;
* hostnamectl&lt;br /&gt;
* ifup&lt;br /&gt;
* ifdown&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;109.3 Résolution de problèmes réseaux simples&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de dépanner les problèmes réseau sur les postes de travail. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration manuelle des interfaces réseau, y compris l&#039;affichage et la modification de la configuration des interfaces réseau à partir de iproute2.&lt;br /&gt;
* Configuration manuelle du routage, y compris l&#039;affichage et la modification, de même que la configuration de la passerelle par défaut à partir de iproute2.&lt;br /&gt;
* Résolution des problèmes associés à la configuration réseau. &lt;br /&gt;
* Connaissance des commandes historiques net-tools.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
* hostname&lt;br /&gt;
* ss&lt;br /&gt;
* ping&lt;br /&gt;
* ping6&lt;br /&gt;
* traceroute&lt;br /&gt;
* traceroute6 &lt;br /&gt;
* tracepath&lt;br /&gt;
* tracepath6&lt;br /&gt;
* netcat&lt;br /&gt;
* ifconfig&lt;br /&gt;
* netstat&lt;br /&gt;
* route&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;109.4 Configuration de la résolution de noms&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure de configurer la résolution de noms d&#039;hôtes sur les postes de travail.  &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Requêtes sur serveurs DNS distants.&lt;br /&gt;
* Configuration de la résolution de nom locale et utilisation de serveurs DNS distants.&lt;br /&gt;
* Modification de l&#039;ordre de la résolution des noms. &lt;br /&gt;
* Résolution d&#039;erreurs reliées avec la résolution de nom.&lt;br /&gt;
* Connaissance de base de systemd-resolved&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
* /etc/nsswitch.conf &lt;br /&gt;
* host&lt;br /&gt;
* dig&lt;br /&gt;
* getent&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 110 : Securité&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;110.1 Tâches d&#039;administration de sécurité&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent savoir vérifier la configuration du système afin de s’assurer que la sécurité de la machine est en accord avec les politiques de sécurité. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Audit du système pour retrouver les fichiers ayant les permissions suid/guid positionnées.&lt;br /&gt;
* Définition ou modification des mots de passe utilisateur ainsi que des informations d&#039;expiration du compte.&lt;br /&gt;
* Utilisation de nmap et netstat pour connaître les ports ouverts sur une machine&lt;br /&gt;
* Définition des limites utilisateur pour les connexions, les processus et l&#039;utilisation de la mémoire.&lt;br /&gt;
* Détermination des connexions utilisateur passées ou actuelles.&lt;br /&gt;
* Configuration et utilisation élémentaire de sudo. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* find&lt;br /&gt;
* passwd&lt;br /&gt;
* fuser&lt;br /&gt;
* lsof&lt;br /&gt;
* nmap&lt;br /&gt;
* chage&lt;br /&gt;
* netstat&lt;br /&gt;
* sudo&lt;br /&gt;
* /etc/sudoers&lt;br /&gt;
* su&lt;br /&gt;
* usermod&lt;br /&gt;
* ulimit&lt;br /&gt;
* who, w, last&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;110.2 Configuration de la sécurité du système&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Les candidats doivent savoir configurer un niveau élémentaire de sécurité système. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Compréhension des mots de passe shadow et de leur fonctionnement.&lt;br /&gt;
* Arrêt des services inutiles.&lt;br /&gt;
* Compréhension du rôle des TCP wrappers. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/nologin&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/shadow&lt;br /&gt;
* /etc/xinetd.d/&lt;br /&gt;
* /etc/xinetd.conf&lt;br /&gt;
* systemd.socket&lt;br /&gt;
* /etc/inittab&lt;br /&gt;
* /etc/init.d/&lt;br /&gt;
* /etc/hosts.allow&lt;br /&gt;
* /etc/hosts.deny &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;110.3 Sécurisation des données avec le chiffrement&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Les candidats doivent être en mesure d&#039;utiliser les techniques de chiffrement à partir des clés publiques pour sécuriser les données et les communications.&lt;br /&gt;
 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration élémentaire et utilisation des clients OpenSSH2.&lt;br /&gt;
* Compréhension du rôle des clés du serveur hôte OpenSSH.&lt;br /&gt;
* Utilisation et configuration de base de GnuPG, y compris la révocation des clés.&lt;br /&gt;
* Utilisation de GPG pour chiffrer, déchiffrer, signer et vérifier des fichiers.&lt;br /&gt;
* Compréhension des tunnels SSH (y compris les tunnels X11).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-add&lt;br /&gt;
* ~/.ssh/id_rsa et id_rsa.pub&lt;br /&gt;
* ~/.ssh/id_dsa et id_dsa.pub&lt;br /&gt;
* ~/.ssh/id_ecdsa et id_ecdsa.pub&lt;br /&gt;
* ~/.ssh/id_ed25519 et id_ed25519.pub&lt;br /&gt;
* /etc/ssh/ssh_host_rsa_key et ssh_host_rsa_key.pub&lt;br /&gt;
* /etc/ssh/ssh_host_dsa_key et ssh_host_dsa_key.pub&lt;br /&gt;
* /etc/ssh/ssh_host_ecdsa_key et ssh_host_ecdsa_key.pub&lt;br /&gt;
* /etc/ssh/ssh_host_ed25519_key et ssh_host_ed25519_key.pub&lt;br /&gt;
* ~/.ssh/authorized_keys&lt;br /&gt;
* ssh_known_hosts&lt;br /&gt;
* gpg&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/&lt;br /&gt;
&lt;br /&gt;
==Considérations de modifications ultérieures==&lt;br /&gt;
&lt;br /&gt;
Les prochaines versions des objectifs pourront inclure les changements suivants :&lt;br /&gt;
&lt;br /&gt;
* Suppression de ifup/ifdown et des commandes net-tools historiques&lt;br /&gt;
* Suppression de TCP wrappers&lt;/div&gt;</summary>
		<author><name>Babafou</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LinuxEssentials_Objectives_V1.6(FR)&amp;diff=5165</id>
		<title>LinuxEssentials Objectives V1.6(FR)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LinuxEssentials_Objectives_V1.6(FR)&amp;diff=5165"/>
		<updated>2019-03-09T15:42:42Z</updated>

		<summary type="html">&lt;p&gt;Babafou: French translation for Linux Essentials 1.6 objectives&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
L&#039;objectif de la certification Linux Essentials est de définir les connaissances élémentaires requises pour utiliser de manière compétente un ordinateur fixe ou portable fonctionnant avec le système d&#039;exploitation Linux. Le programme Linux Essentials qui lui est associé guidera et encouragera les jeunes gens (et ceux qui découvrent Linux et le logiciel libre) à comprendre la place de Linux et du logiciel libre dans le contexte plus large de l&#039;industrie informatique.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Description des candidats==&lt;br /&gt;
&lt;br /&gt;
Voici la description d&#039;un candidat qui est à peine qualifié pour réussir l&#039;examen Linux Essentials. Cette personne hypothétique est appelée Candidat Minimalement Qualifié (CMQ). Le niveau de l&#039;examen Linux Essentials est fixé de telle sorte que cette personne (ainsi que quiconque de plus compétent) puisse le réussir mais que quiconque de moins compétent ne le puisse pas.&lt;br /&gt;
&lt;br /&gt;
Le CMQ doit comprendre l&#039;industrie de Linux et du logiciel libre et connaître les applications libres les plus répandues. Le candidat doit comprendre les composants principaux du système d&#039;exploitation Linux et avoir les compétences techniques lui permettant de travailler sous Linux en ligne de commande. Le CMQ doit comprendre les rudiments de la sécurité et de l&#039;administration tels que la gestion des utilisateurs et des groupes, le travail en ligne de commande et les droits d&#039;accès. Le détenteur de la certification Linux Essentials est très probablement l&#039;utilisateur final d&#039;un système administré par ailleurs.&lt;br /&gt;
&lt;br /&gt;
Le &#039;&#039;&#039;CMQ Linux Essentials&#039;&#039;&#039; doit avoir des compétences ou des connaissances rudimentaires dans les domaines suivants :&lt;br /&gt;
&lt;br /&gt;
* le logiciel libre ou à code source ouvert, les différentes communautés et licences&lt;br /&gt;
* les processus, les programmes et les composants d&#039;un système d&#039;exploitation&lt;br /&gt;
* le matériel informatique&lt;br /&gt;
* la sécurité du système, les utilisateurs, les groupes et les droits d&#039;accès pour des répertoires publiques et privés&lt;br /&gt;
* rendre le système accessible et pouvoir le raccorder à d&#039;autres ordinateurs en réseau local&lt;br /&gt;
* les applications libres sur le lieu de travail et comment elles se rapportent à leurs équivalent propriétaires&lt;br /&gt;
* les explorateurs du système de fichiers sur un poste de travail sous Linux&lt;br /&gt;
* où trouver de l&#039;aide&lt;br /&gt;
* travailler en ligne de commande et avec des fichiers&lt;br /&gt;
* réaliser des sauvegardes et des archives simples et les restaurer&lt;br /&gt;
* utiliser un éditeur élémentaire en ligne de commande &lt;br /&gt;
* comprimer des fichiers&lt;br /&gt;
* créer et exécuter des scripts shell simples&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Informations de version==&lt;br /&gt;
&lt;br /&gt;
Ceci est la version 1.6 des objectifs.&lt;br /&gt;
&lt;br /&gt;
Vous trouverez également le [[LinuxEssentials_Summary_Version_1.5_To_1.6|résumé et les informations détaillées]] concernant les différences entre les versions 1.5 et 1.6 des objectifs.&lt;br /&gt;
&lt;br /&gt;
La [[LinuxEssentials Objectives V1.5|version 1.5 des objectifs]] est disponible [[LinuxEssentials Objectives V1.5|ici]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traductions des objectifs==&lt;br /&gt;
&lt;br /&gt;
Les traductions suivantes sont disponibles sur ce wiki :&lt;br /&gt;
&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6|English]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(NL)|Dutch]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(FR)|French]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(DE)|German]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(IT)|Italian]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(JA)|Japanese]]&lt;br /&gt;
* [[LinuxEssentials Objectives V1.6(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Examens et prérequis==&lt;br /&gt;
&lt;br /&gt;
La certification Linux Essentials est décernée après avoir réussi l&#039;examen :&lt;br /&gt;
&lt;br /&gt;
* 010 (40 questions en 60 minutes)&lt;br /&gt;
&lt;br /&gt;
Il n&#039;est pas nécessaire de posséder une autre certification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectifs==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 1 : Communauté Linux et carrière dans le logiciel libre&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;1.1 Évolution de Linux et systèmes d&#039;exploitation populaires (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Connaissance de l&#039;évolution de Linux et des distributions principales.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Distributions&lt;br /&gt;
* Systèmes embarqués&lt;br /&gt;
* Linux dans le nuage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Debian, Ubuntu (LTS)&lt;br /&gt;
* CentOS, openSUSE, Red Hat, SUSE&lt;br /&gt;
* Linux Mint, Scientific Linux&lt;br /&gt;
* Raspberry Pi, Raspbian&lt;br /&gt;
* Android&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;1.2 Applications libres majeures (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Savoir quelles sont les applications majeures ainsi que leurs utilisations et leur évolution.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Applications pour postes de travail&lt;br /&gt;
* Applications pour serveurs&lt;br /&gt;
* Langages de programmation&lt;br /&gt;
* Outils de gestion et dépôts de paquetages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenOffice.org, LibreOffice, Thunderbird, Firefox, GIMP&lt;br /&gt;
* Nextcloud, ownCloud&lt;br /&gt;
* Apache HTTPD, NGINX, MariaDB, MySQL, NFS, Samba&lt;br /&gt;
* C, Java, JavaScript, Perl, shell, Python, PHP&lt;br /&gt;
* dpkg, apt-get, rpm, yum&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;1.3 Logiciel à code source ouvert et licences (valeur : 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Communautés ouvertes et licences de logiciels à code source ouvert pour les entreprises.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Philosophie des logiciels à code source ouvert&lt;br /&gt;
* Licences des logiciels à code source ouvert&lt;br /&gt;
* Free Software Foundation (FSF), Open Source Initiative (OSI)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Copyleft, Permissive&lt;br /&gt;
* GPL, BSD, Creative Commons&lt;br /&gt;
* Free Software, Open Source Software, FOSS, FLOSS&lt;br /&gt;
* Modèles économiques des logiciels à code source ouvert&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;1.4 Compétences informatiques et travail sous Linux (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Compétences élémentaires en technologies de l&#039;information et de la communication(TIC) et travail sous Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Compétences en bureautique&lt;br /&gt;
* Accéder à la ligne de commande&lt;br /&gt;
* Utilisations de Linux, de l&#039;informatique en nuage et de la virtualisation dans l&#039;industrie&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Utilisation d&#039;un navigateur Web, préoccupations de confidentialité, options de configuration, recherche sur le Web et sauvegarde de contenu&lt;br /&gt;
* Terminal et console&lt;br /&gt;
* Problématiques de mots de passe&lt;br /&gt;
* Problématiques et outils de confidentialité&lt;br /&gt;
* Utilisation d&#039;applications à code source ouvert courantes pour des présentations et des projets&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 2 : Trouver son chemin sur un système Linux&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;2.1 Bases sur la ligne de commande (valeur : 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Bases d&#039;utilisation en ligne de commande sous Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Interpréteur de commandes élémentaire&lt;br /&gt;
* Syntaxe en ligne de commande&lt;br /&gt;
* Variables&lt;br /&gt;
* TODO Quoting&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bash&lt;br /&gt;
* echo&lt;br /&gt;
* history&lt;br /&gt;
* Variable d&#039;environnement PATH&lt;br /&gt;
* export&lt;br /&gt;
* type&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;2.2 Utilisation de la ligne de commande pour obtenir de l&#039;aide (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Exécution de commandes d&#039;aide et navigation dans les différents systèmes d&#039;aide.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Pages de manuel&lt;br /&gt;
* Pages d&#039;information&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* man&lt;br /&gt;
* info&lt;br /&gt;
* /usr/share/doc/&lt;br /&gt;
* locate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;2.3 Utilisation des répertoires et liste des fichiers (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Navigation dans le répertoire personnel et les répertoires du système et affichage de listes de fichiers à différents emplacements.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Fichiers, répertoires&lt;br /&gt;
* Fichiers et répertoires cachés&lt;br /&gt;
* Répertoires personnels&lt;br /&gt;
* Chemins d&#039;accès absolus et relatifs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Options courantes de ls&lt;br /&gt;
* listes récursives de fichiers&lt;br /&gt;
* cd &lt;br /&gt;
* &#039;&#039;&#039;.&#039;&#039;&#039; et &#039;&#039;&#039;..&#039;&#039;&#039;&lt;br /&gt;
* répertoire personnel et ~&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;2.4 Création, déplacement et suppression de fichiers (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Créer, déplacer et supprimer fichiers et répertoires dans le répertoire personnel.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Fichiers et répertoires&lt;br /&gt;
* Sensibilité à la casse&lt;br /&gt;
* TODO Englobement simple Simple globbing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mv, cp, rm, touch&lt;br /&gt;
* mkdir, rmdir&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 3 : Le pouvoir de la ligne de commande&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;3.1 Archivage de fichiers en ligne de commande (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Archiver des fichiers dans le répertoire personnel de l&#039;utilisateur.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Fichiers, répertoires&lt;br /&gt;
* Archives, compression&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
* Options courantes de tar&lt;br /&gt;
* gzip, bzip2, xz&lt;br /&gt;
* zip, unzip&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;3.2 Recherche et extraction de données à partir de fichiers (valeur : 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Rechercher et extraire des données à partir de fichiers dans le répertoire personnel.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tuyaux en ligne de commande&lt;br /&gt;
* Redirection d&#039;entrée-sortie&lt;br /&gt;
* Expressions rationnelles élémentaires utilisant ., [ ], *, et ?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* grep&lt;br /&gt;
* less&lt;br /&gt;
* cat, head, tail&lt;br /&gt;
* sort&lt;br /&gt;
* cut&lt;br /&gt;
* wc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;3.3 Conversion de commandes en script (valeur : 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Convertir des commandes répétitives en scripts simples.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Faire des scripts shell simples&lt;br /&gt;
* Connaître des éditeurs de texte courants (vi et nano)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* #! (shebang)&lt;br /&gt;
* /bin/bash&lt;br /&gt;
* Variables&lt;br /&gt;
* Arguments&lt;br /&gt;
* boucle for&lt;br /&gt;
* echo&lt;br /&gt;
* Statut de sortie&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 4 : Le système d&#039;exploitation Linux&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;4.1 Choix d&#039;un système d&#039;exploitation (valeur : 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Connaissance des systèmes d&#039;exploitation et distributions Linux majeurs.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Différences entre Windows, OS X et Linux&lt;br /&gt;
* Gestion du cycle de vie des distributions&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Interface graphique par rapport à la ligne de commande, configuration d&#039;un poste de travail&lt;br /&gt;
* Cycles de maintenance, versions bêta et stables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;4.2 Compréhension du matériel informatique (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Être familier avec les composants entrant dans la construction d&#039;ordinateurs de bureau et de serveurs.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Matériel informatique&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cartes mères, processeurs, alimentations, disques optiques, périphériques&lt;br /&gt;
* Disques durs, SSD et partitions, /dev/sd*&lt;br /&gt;
* Pilotes de périphériques&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;4.3 Localisation des données (valeur : 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Où les différents types d&#039;informations sont stockés sur un système Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Programmes et configuration&lt;br /&gt;
* Processus&lt;br /&gt;
* Adresses en mémoire&lt;br /&gt;
* Messagerie système&lt;br /&gt;
* Journalisation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ps, top, free&lt;br /&gt;
* syslog, dmesg&lt;br /&gt;
* /etc/, /var/log/&lt;br /&gt;
* /boot/, /proc/, /dev/, /sys/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;4.4 Intégration au réseau (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Interrogation des paramètres de configuration importants du réseau et détermination des prérequis élémentaires pour intégrer un ordinateur à un réseau local.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Internet, réseau, routeurs&lt;br /&gt;
* Interrogation de la configuration DNS cliente&lt;br /&gt;
* Interrogation de la configuration du réseau&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* route, ip route show&lt;br /&gt;
* ifconfig, ip addr show&lt;br /&gt;
* netstat, ss&lt;br /&gt;
* /etc/resolv.conf, /etc/hosts&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
* ping&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Sujet 5 : Sécurité et droits d&#039;accès aux fichiers&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;5.1 Sécurité élémentaire et identification des catégories d&#039;utilisateurs (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Différentes catégories d&#039;utilisateurs sur un système Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Root et utilisateurs standards&lt;br /&gt;
* Utilisateurs système&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/passwd, /etc/shadow, /etc/group&lt;br /&gt;
* id, last, who, w&lt;br /&gt;
* sudo, su&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;5.2 Création des utilisateurs et des groupes (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Créer des utilisateurs et des groupes sur un système Linux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Commandes de création d&#039;utilisateurs et de groupes&lt;br /&gt;
* Identification des utilisateurs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/passwd, /etc/shadow, /etc/group, /etc/skel/&lt;br /&gt;
* useradd, groupadd&lt;br /&gt;
* passwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;5.3 Gestion des propriétés et des droits d&#039;accès aux fichiers (valeur : 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Comprendre et manipuler les paramètres de droits d&#039;accès et de propriété sur les fichiers.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Droits d&#039;accès et propriété des fichiers et répertoires&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ls -l, ls -a&lt;br /&gt;
* chmod, chown&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
e=&amp;quot;color:navy&amp;quot;&amp;gt;5.4 Répertoires et fichiers spéciaux (valeur : 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valeur&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Répertoires et fichiers spéciaux sur un système Linux, y compris les droits d&#039;accès spéciaux.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Domaines de connaissance les plus importants :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Utilisation de fichiers et répertoires temporaires&lt;br /&gt;
* Liens symboliques&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Liste partielle de termes, fichiers et utilitaires utilisés pour cet objectif :&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /tmp/, /var/tmp/ et Sticky Bit&lt;br /&gt;
* ls -d&lt;br /&gt;
* ln -s&lt;/div&gt;</summary>
		<author><name>Babafou</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303_Objectives_V2&amp;diff=4683</id>
		<title>LPIC-303 Objectives V2</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303_Objectives_V2&amp;diff=4683"/>
		<updated>2018-07-31T09:13:34Z</updated>

		<summary type="html">&lt;p&gt;Babafou: Correct path is /etc/idmapd.conf, not /etc/idmap.conf&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
The description of the entire [[LPIC-3]] programme is listed [[LPIC-3|here]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are version 2.0.0.&lt;br /&gt;
&lt;br /&gt;
The version [[LPIC-303 Objectives V1|1.x objectives]] can be found [[LPIC-303 Objectives V1|here]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
* [[LPIC-303|English]]&lt;br /&gt;
* [[LPIC-303(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
===&#039;&#039;Topic 325: Cryptography&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.1 X.509 Certificates and Public Key Infrastructures (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand X.509 certificates and public key infrastructures. They should know how to configure and use OpenSSL to implement certification authorities and issue SSL certificates for various purposes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand X.509 certificates, X.509 certificate lifecycle, X.509 certificate fields and X.509v3 certificate extensions.&lt;br /&gt;
* Understand trust chains and public key infrastructures.&lt;br /&gt;
* Generate and manage public and private keys.&lt;br /&gt;
* Create, operate and secure a certification authority.&lt;br /&gt;
* Request, sign and manage server and client certificates.&lt;br /&gt;
* Revoke certificates and certification authorities.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* openssl, including relevant subcommands&lt;br /&gt;
* OpenSSL configuration&lt;br /&gt;
* PEM, DER, PKCS&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL&lt;br /&gt;
* OCSP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.2 X.509 Certificates for Encryption, Signing and Authentication (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use X.509 certificates for both server and client authentication. Candidates should be able to implement user and server authentication for Apache HTTPD. The version of Apache HTTPD covered is 2.4 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand of SSL, TLS and protocol versions.&lt;br /&gt;
* Understand common transport layer security threats, for example Man-in-the-Middle.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to provide HTTPS service, including SNI and HSTS.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to authenticate users using certificates.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to provide OCSP stapling.&lt;br /&gt;
* Use OpenSSL for SSL/TLS client and server tests. &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Intermediate certification authorities&lt;br /&gt;
* Cipher configuration (no cipher-specific knowledge)&lt;br /&gt;
* httpd.conf&lt;br /&gt;
* mod_ssl&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.3 Encrypted File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up and configure encrypted file systems. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand block device and file system encryption.&lt;br /&gt;
* Use dm-crypt with LUKS to encrypt block devices.&lt;br /&gt;
* Use eCryptfs to encrypt file systems, including home directories and PAM integration.&lt;br /&gt;
* Be aware of plain dm-crypt and EncFS.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* cryptsetup&lt;br /&gt;
* cryptmount&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
* ecryptfsd&lt;br /&gt;
* ecryptfs-* commands&lt;br /&gt;
* mount.ecryptfs, umount.ecryptfs&lt;br /&gt;
* pam_ecryptfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.4 DNS and Cryptography (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND. The version of BIND covered is 9.7 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DNSSEC and DANE.&lt;br /&gt;
* Configure and troubleshoot BIND as an authoritative name server serving DNSSEC secured zones.&lt;br /&gt;
* Configure BIND as an recursive name server that performs DNSSEC validation on behalf of its clients. &lt;br /&gt;
* Key Signing Key, Zone Signing Key, Key Tag&lt;br /&gt;
* Key generation, key storage, key management and key rollover&lt;br /&gt;
* Maintenance and re-signing of zones&lt;br /&gt;
* Use DANE to publish X.509 certificate information in DNS.&lt;br /&gt;
* Use TSIG for secure communication with BIND.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* DNS, EDNS, Zones, Resource Records&lt;br /&gt;
* DNS resource records: DS, DNSKEY, RRSIG, NSEC, NSEC3, NSEC3PARAM, TLSA&lt;br /&gt;
* DO-Bit, AD-Bit&lt;br /&gt;
* TSIG&lt;br /&gt;
* named.conf&lt;br /&gt;
* dnssec-keygen&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
* dnssec-settime&lt;br /&gt;
* dnssec-dsfromkey&lt;br /&gt;
* rndc&lt;br /&gt;
* dig&lt;br /&gt;
* delv&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 326: Host Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.1 Host Hardening (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure computers running Linux against common threats. This includes kernel and software configuration.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure BIOS and boot loader (GRUB 2) security.&lt;br /&gt;
* Disable useless software and services.&lt;br /&gt;
* Use sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration.&lt;br /&gt;
* Limit resource usage.&lt;br /&gt;
* Work with chroot environments.&lt;br /&gt;
* Drop unnecessary capabilities.&lt;br /&gt;
* Be aware of the security advantages of virtualization.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* grub.cfg&lt;br /&gt;
* chkconfig, systemctl&lt;br /&gt;
* ulimit&lt;br /&gt;
* /etc/security/limits.conf&lt;br /&gt;
* pam_limits.so&lt;br /&gt;
* chroot&lt;br /&gt;
* sysctl&lt;br /&gt;
* /etc/sysctl.conf&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.2 Host Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes updates and maintenance as well as automated host scans.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Use and configure the Linux Audit system.&lt;br /&gt;
* Use chkrootkit.&lt;br /&gt;
* Use and configure rkhunter, including updates.&lt;br /&gt;
* Use Linux Malware Detect.&lt;br /&gt;
* Automate host scans using cron.&lt;br /&gt;
* Configure and use AIDE, including rule management.&lt;br /&gt;
* Be aware of OpenSCAP.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* auditd&lt;br /&gt;
* auditctl&lt;br /&gt;
* ausearch, aureport&lt;br /&gt;
* auditd.conf&lt;br /&gt;
* audit.rules&lt;br /&gt;
* pam_tty_audit.so&lt;br /&gt;
* chkrootkit&lt;br /&gt;
* rkhunter&lt;br /&gt;
* /etc/rkhunter.conf&lt;br /&gt;
* maldet&lt;br /&gt;
* conf.maldet&lt;br /&gt;
* aide&lt;br /&gt;
* /etc/aide/aide.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.3 User Management and Authentication (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with management and authentication of user accounts. This includes configuration and use of NSS, PAM, SSSD and Kerberos for both local and remote directories and authentication mechanisms as well as enforcing a password policy. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand and configure NSS.&lt;br /&gt;
* Understand and configure PAM.&lt;br /&gt;
* Enforce password complexity policies and periodic password changes.&lt;br /&gt;
* Lock accounts automatically after failed login attempts.&lt;br /&gt;
* Configure and use SSSD.&lt;br /&gt;
* Configure NSS and PAM for use with SSSD.&lt;br /&gt;
* Configure SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains.&lt;br /&gt;
* Obtain and manage Kerberos tickets.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* /etc/login.defs&lt;br /&gt;
* pam_cracklib.so&lt;br /&gt;
* chage&lt;br /&gt;
* pam_tally.so, pam_tally2.so&lt;br /&gt;
* faillog&lt;br /&gt;
* pam_sss.so&lt;br /&gt;
* sssd&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.4 FreeIPA Installation and Samba Integration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with FreeIPA v4.x. This includes installation and maintenance of a server instance with a FreeIPA domain as well as integration of FreeIPA with Active Directory.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand FreeIPA, including its architecture and components.&lt;br /&gt;
* Understand system and configuration prerequisites for installing FreeIPA.&lt;br /&gt;
* Install and manage a FreeIPA server and domain.&lt;br /&gt;
* Understand and configure Active Directory replication and Kerberos cross-realm trusts.&lt;br /&gt;
* Be aware of sudo, autofs, SSH and SELinux integration in FreeIPA.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* 389 Directory Server, MIT Kerberos, Dogtag Certificate System, NTP, DNS, SSSD, certmonger&lt;br /&gt;
* ipa, including relevant subcommands&lt;br /&gt;
* ipa-server-install, ipa-client-install, ipa-replica-install&lt;br /&gt;
* ipa-replica-prepare, ipa-replica-manage&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 327: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.1 Discretionary Access Control (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are required to understand Discretionary Access Control and know how to implement it using Access Control Lists. Additionally, candidates are required to understand and know how to use Extended Attributes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand and manage file ownership and permissions, including SUID and SGID.&lt;br /&gt;
* Understand and manage access control lists.&lt;br /&gt;
* Understand and manage extended attributes and attribute classes.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.2 Mandatory Access Control (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with Mandatory Access Control systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the concepts of TE, RBAC, MAC and DAC.&lt;br /&gt;
* Configure, manage and use SELinux.&lt;br /&gt;
* Be aware of AppArmor and Smack.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getenforce, setenforce, selinuxenabled&lt;br /&gt;
* getsebool, setsebool, togglesebool&lt;br /&gt;
* fixfiles, restorecon, setfiles&lt;br /&gt;
* newrole, runcon&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus, seinfo&lt;br /&gt;
* apol&lt;br /&gt;
* seaudit, seaudit-report, audit2why, audit2allow&lt;br /&gt;
* /etc/selinux/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.3 Network File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 clients and servers as well as CIFS client services. Earlier versions of NFS are not required knowledge.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand NFSv4 security issues and improvements.&lt;br /&gt;
* Configure NFSv4 server and clients.&lt;br /&gt;
* Understand and configure NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos).&lt;br /&gt;
* Understand and use NFSv4 pseudo file system.&lt;br /&gt;
* Understand and use NFSv4 ACLs.&lt;br /&gt;
* Configure CIFS clients.&lt;br /&gt;
* Understand and use CIFS Unix Extensions.&lt;br /&gt;
* Understand and configure CIFS security modes (NTLM, Kerberos).&lt;br /&gt;
* Understand and manage mapping and handling of CIFS ACLs and SIDs in a Linux system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/exports &lt;br /&gt;
* /etc/idmapd.conf&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* mount.cifs parameters related to ownership, permissions and security modes&lt;br /&gt;
* winbind&lt;br /&gt;
* getcifsacl, setcifsacl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 328: Network Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.1 Network Hardening (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure networks against common threats. This includes verification of the effectiveness of security measures.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure FreeRADIUS to authenticate network nodes.&lt;br /&gt;
* Use nmap to scan networks and hosts, including different scan methods.&lt;br /&gt;
* Use Wireshark to analyze network traffic, including filters and statistics.&lt;br /&gt;
* Identify and deal with rogue router advertisements and DHCP messages.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* radiusd&lt;br /&gt;
* radmin&lt;br /&gt;
* radtest, radclient&lt;br /&gt;
* radlast, radwho&lt;br /&gt;
* radiusd.conf&lt;br /&gt;
* /etc/raddb/*&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* ndpmon&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.2 Network Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Implement bandwidth usage monitoring.&lt;br /&gt;
* Configure and use Snort, including rule management.&lt;br /&gt;
* Configure and use OpenVAS, including NASL.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* Cacti&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/*&lt;br /&gt;
* openvas-adduser, openvas-rmuser&lt;br /&gt;
* openvas-nvt-sync&lt;br /&gt;
* openvassd&lt;br /&gt;
* openvas-mkcert&lt;br /&gt;
* /etc/openvas/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.3 Packet Filtering (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of packet filters. This includes netfilter, iptables and ip6tables as well as basic knowledge of nftables, nft and ebtables.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand common firewall architectures, including DMZ.&lt;br /&gt;
* Understand and use netfilter, iptables and ip6tables, including standard modules, tests and targets.&lt;br /&gt;
* Implement packet filtering for both IPv4 and IPv6.&lt;br /&gt;
* Implement connection tracking and network address translation.&lt;br /&gt;
* Define IP sets and use them in netfilter rules.&lt;br /&gt;
* Have basic knowledge of nftables and nft.&lt;br /&gt;
* Have basic knowledge of ebtables.&lt;br /&gt;
* Be aware of conntrackd.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* ip6tables&lt;br /&gt;
* iptables-save, iptables-restore &lt;br /&gt;
* ip6tables-save, ip6tables-restore &lt;br /&gt;
* ipset&lt;br /&gt;
* nft&lt;br /&gt;
* ebtables&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.4 Virtual Private Networks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of OpenVPN and IPsec.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure and operate OpenVPN server and clients for both bridged and routed VPN networks.&lt;br /&gt;
* Configure and operate IPsec server and clients for routed VPN networks using IPsec-Tools / racoon.&lt;br /&gt;
* Awareness of L2TP.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/*&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
* setkey&lt;br /&gt;
* /etc/ipsec-tools.conf&lt;br /&gt;
* /etc/racoon/racoon.conf&lt;br /&gt;
&lt;br /&gt;
==Other Comments for consideration==&lt;br /&gt;
&lt;br /&gt;
As examples, following items are not in the current objectives:&lt;br /&gt;
&lt;br /&gt;
1) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Wireless LAN:&amp;lt;/b&amp;gt; (Note: It’s not only for Linux though, it is necessary to consider because there are many points to be taken care for configuration in terms of security measure.)&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Some aspects (i.e. Radius) are implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
2) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to IPv6:&amp;lt;/b&amp;gt; Not only IPv4, but also IPv6 should be considered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 wherever applicable (fth)&lt;br /&gt;
&lt;br /&gt;
3) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Security features in Linux:&amp;lt;/b&amp;gt; For example, ASLR and Exec-Shield (ASCII Armor) should be considered, because it causes security level lower if those are disabled.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in host hardening in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
4) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Forensics:&amp;lt;/b&amp;gt; In the survey of malware’s behavior, Sleuth Kit would be used to analyze the hard disk on Linux machine. Also in some cases, LVM commands would be used to restore the disk which became un-mountable. So that this area should be learned.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interesting topic, but it goes beyond basic security in the sense it &amp;quot;prevention and defending&amp;quot;. This is postmortal analysis. As the exam already contains a lot of topic this is postponed but up to discussion (fth)&lt;br /&gt;
&lt;br /&gt;
5) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Database (RDB, NoSQL) security:&amp;lt;/b&amp;gt; Because Application Security (bind, apache, etc.) is covered now, this item would be nice to cover. And this item is listed in the CIF, security contest almost every time. Also the counter-measure in server side is necessary.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As the other software / service aspects beyond Linux system security have been dropped this is considered out of scope for now too (fth)&lt;br /&gt;
&lt;br /&gt;
6) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to OpenFlow:&amp;lt;/b&amp;gt; There are several points to be considered in terms of security measure about the configuration of OpenFlow.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is considered as an application aspect which seems to be beyond the scope for not (fth).&lt;br /&gt;
&lt;br /&gt;
7) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;RADIUS:&amp;lt;/b&amp;gt; This was covered in 301 though, this is not covered now. This should be covered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
8) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;DNS:&amp;lt;/b&amp;gt; More DNSSEC and DANE.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
9) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Secure development, hardening&amp;lt;/b&amp;gt;&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hardening has been implemented for both hosts and networks in V2 (fth), Secure development is considered out of scope for now (fth)&lt;br /&gt;
&lt;br /&gt;
10) Certificate Transparency&lt;br /&gt;
&lt;br /&gt;
11) polkit&lt;br /&gt;
&lt;br /&gt;
==Changes since version 1==&lt;br /&gt;
&lt;br /&gt;
===321.3===&lt;br /&gt;
The following aspects have been removed from objective 321.3 User Management and Authentication:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Kerberos Key Distribution Centre&lt;br /&gt;
* Kerberos Principals&lt;br /&gt;
* Kerberos Tickets&lt;br /&gt;
* password cracking  &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* krb5kdc/kdc.conf&lt;br /&gt;
* kdb5_util&lt;br /&gt;
* rb5kdc/kadm5.acl&lt;br /&gt;
* kadmin, kadmin.local&lt;br /&gt;
* john&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to key servers. Managing multiple private keys and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Use GPG for encryption and signing.&lt;br /&gt;
* Configure GPG.&lt;br /&gt;
* Manage private and public keys.&lt;br /&gt;
* Interact with GPG key servers to publish and retrieve public keys. &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.6 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure and use OpenSSH.&lt;br /&gt;
* Manage OpenSSH keys and access control.&lt;br /&gt;
* Be aware of SSH protocol v1 and v2 security issues.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/ssh/*&lt;br /&gt;
* ~/.ssh/*&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Babafou</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303_Objectives_V2&amp;diff=3849</id>
		<title>LPIC-303 Objectives V2</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303_Objectives_V2&amp;diff=3849"/>
		<updated>2016-04-19T12:49:23Z</updated>

		<summary type="html">&lt;p&gt;Babafou: /* 327.2 Mandatory Access Control (weight: 4) */ s/setsebol/setsebool/&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
The description of the entire [[LPIC-3]] programme is listed [[LPIC-3|here]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are version 2.0.0.&lt;br /&gt;
&lt;br /&gt;
The version [[LPIC-303 Objectives V1|1.x objectives]] can be found [[LPIC-303 Objectives V1|here]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
* [[LPIC-303|English]]&lt;br /&gt;
* [[LPIC-303(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
===&#039;&#039;Topic 325: Cryptography&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.1 X.509 Certificates and Public Key Infrastructures (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand X.509 certificates and public key infrastructures. They should know how to configure and use OpenSSL to implement certification authorities and issue SSL certificates for various purposes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand X.509 certificates, X.509 certificate lifecycle, X.509 certificate fields and X.509v3 certificate extensions.&lt;br /&gt;
* Understand trust chains and public key infrastructures.&lt;br /&gt;
* Generate and manage public and private keys.&lt;br /&gt;
* Create, operate and secure a certification authority.&lt;br /&gt;
* Request, sign and manage server and client certificates.&lt;br /&gt;
* Revoke certificates and certification authorities.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* openssl, including relevant subcommands&lt;br /&gt;
* OpenSSL configuration&lt;br /&gt;
* PEM, DER, PKCS&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL&lt;br /&gt;
* OCSP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.2 X.509 Certificates for Encryption, Signing and Authentication (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use X.509 certificates for both server and client authentication. Candidates should be able to implement user and server authentication for Apache HTTPD. The version of Apache HTTPD covered is 2.4 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand of SSL, TLS and protocol versions.&lt;br /&gt;
* Understand common transport layer security threats, for example Man-in-the-Middle.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to provide HTTPS service, including SNI and HSTS.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to authenticate users using certificates.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to provide OCSP stapling.&lt;br /&gt;
* Use OpenSSL for SSL/TLS client and server tests. &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Intermediate certification authorities&lt;br /&gt;
* Cipher configuration (no cipher-specific knowledge)&lt;br /&gt;
* httpd.conf&lt;br /&gt;
* mod_ssl&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.3 Encrypted File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up and configure encrypted file systems. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand block device and file system encryption.&lt;br /&gt;
* Use dm-crypt with LUKS to encrypt block devices.&lt;br /&gt;
* Use eCryptfs to encrypt file systems, including home directories and PAM integration.&lt;br /&gt;
* Be aware of plain dm-crypt and EncFS.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* cryptsetup&lt;br /&gt;
* cryptmount&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
* ecryptfsd&lt;br /&gt;
* ecryptfs-* commands&lt;br /&gt;
* mount.ecryptfs, umount.ecryptfs&lt;br /&gt;
* pam_ecryptfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.4 DNS and Cryptography (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND. The version of BIND covered is 9.7 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DNSSEC and DANE.&lt;br /&gt;
* Configure and troubleshoot BIND as an authoritative name server serving DNSSEC secured zones.&lt;br /&gt;
* Configure BIND as an recursive name server that performs DNSSEC validation on behalf of its clients. &lt;br /&gt;
* Key Signing Key, Zone Signing Key, Key Tag&lt;br /&gt;
* Key generation, key storage, key management and key rollover&lt;br /&gt;
* Maintenance and re-signing of zones&lt;br /&gt;
* Use DANE to publish X.509 certificate information in DNS.&lt;br /&gt;
* Use TSIG for secure communication with BIND.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* DNS, EDNS, Zones, Resource Records&lt;br /&gt;
* DNS resource records: DS, DNSKEY, RRSIG, NSEC, NSEC3, NSEC3PARAM, TLSA&lt;br /&gt;
* DO-Bit, AD-Bit&lt;br /&gt;
* TSIG&lt;br /&gt;
* named.conf&lt;br /&gt;
* dnssec-keygen&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
* dnssec-settime&lt;br /&gt;
* dnssec-dsfromkey&lt;br /&gt;
* rndc&lt;br /&gt;
* dig&lt;br /&gt;
* delv&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 326: Host Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.1 Host Hardening (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure computers running Linux against common threats. This includes kernel and software configuration.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure BIOS and boot loader (GRUB 2) security.&lt;br /&gt;
* Disable useless software and services.&lt;br /&gt;
* Use sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration.&lt;br /&gt;
* Limit resource usage.&lt;br /&gt;
* Work with chroot environments.&lt;br /&gt;
* Drop unnecessary capabilities.&lt;br /&gt;
* Be aware of the security advantages of virtualization.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* grub.cfg&lt;br /&gt;
* chkconfig, systemctl&lt;br /&gt;
* ulimit&lt;br /&gt;
* /etc/security/limits.conf&lt;br /&gt;
* pam_limits.so&lt;br /&gt;
* chroot&lt;br /&gt;
* sysctl&lt;br /&gt;
* /etc/sysctl.conf&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.2 Host Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes updates and maintenance as well as automated host scans.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Use and configure the Linux Audit system.&lt;br /&gt;
* Use chkrootkit.&lt;br /&gt;
* Use and configure rkhunter, including updates.&lt;br /&gt;
* Use Linux Malware Detect.&lt;br /&gt;
* Automate host scans using cron.&lt;br /&gt;
* Configure and use AIDE, including rule management.&lt;br /&gt;
* Be aware of OpenSCAP.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* auditd&lt;br /&gt;
* auditctl&lt;br /&gt;
* ausearch, aureport&lt;br /&gt;
* /etc/auditd/auditd.conf&lt;br /&gt;
* /etc/auditd/audit.rules&lt;br /&gt;
* pam_tty_audit.so&lt;br /&gt;
* chkrootkit&lt;br /&gt;
* rkhunter&lt;br /&gt;
* /etc/rkhunter.conf&lt;br /&gt;
* maldet&lt;br /&gt;
* conf.maldet&lt;br /&gt;
* aide&lt;br /&gt;
* /etc/aide/aide.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.3 User Management and Authentication (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with management and authentication of user accounts. This includes configuration and use of NSS, PAM, SSSD and Kerberos for both local and remote directories and authentication mechanisms as well as enforcing a password policy. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand and configure NSS.&lt;br /&gt;
* Understand and configure PAM.&lt;br /&gt;
* Enforce password complexity policies and periodic password changes.&lt;br /&gt;
* Lock accounts automatically after failed login attempts.&lt;br /&gt;
* Configure and use SSSD.&lt;br /&gt;
* Configure NSS and PAM for use with SSSD.&lt;br /&gt;
* Configure SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains.&lt;br /&gt;
* Obtain and manage Kerberos tickets.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* /etc/login.defs&lt;br /&gt;
* pam_cracklib.so&lt;br /&gt;
* chage&lt;br /&gt;
* pam_tally.so, pam_tally2.so&lt;br /&gt;
* faillog&lt;br /&gt;
* pam_sss.so&lt;br /&gt;
* sssd&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.4 FreeIPA Installation and Samba Integration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with FreeIPA v4.x. This includes installation and maintenance of a server instance with a FreeIPA domain as well as integration of FreeIPA with Active Directory.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand FreeIPA, including its architecture and components.&lt;br /&gt;
* Understand system and configuration prerequisites for installing FreeIPA.&lt;br /&gt;
* Install and manage a FreeIPA server and domain.&lt;br /&gt;
* Understand and configure Active Directory replication and Kerberos cross-realm trusts.&lt;br /&gt;
* Be aware of sudo, autofs, SSH and SELinux integration in FreeIPA.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* 389 Directory Server, MIT Kerberos, Dogtag Certificate System, NTP, DNS, SSSD, certmonger&lt;br /&gt;
* ipa, including relevant subcommands&lt;br /&gt;
* ipa-server-install, ipa-client-install, ipa-replica-install&lt;br /&gt;
* ipa-replica-prepare, ipa-replica-manage&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 327: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.1 Discretionary Access Control (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are required to understand Discretionary Access Control and know how to implement it using Access Control Lists. Additionally, candidates are required to understand and know how to use Extended Attributes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand and manage file ownership and permissions, including SUID and SGID.&lt;br /&gt;
* Understand and manage access control lists.&lt;br /&gt;
* Understand and manage extended attributes and attribute classes.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.2 Mandatory Access Control (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with Mandatory Access Control systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the concepts of TE, RBAC, MAC and DAC.&lt;br /&gt;
* Configure, manage and use SELinux.&lt;br /&gt;
* Be aware of AppArmor and Smack.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getenforce, setenforce, selinuxenabled&lt;br /&gt;
* getsebool, setsebool, togglesebool&lt;br /&gt;
* fixfiles, restorecon, setfiles&lt;br /&gt;
* newrole, runcon&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus, seinfo&lt;br /&gt;
* apol&lt;br /&gt;
* seaudit, seaudit-report, audit2why, audit2allow&lt;br /&gt;
* /etc/selinux/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.3 Network File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 clients and servers as well as CIFS client services. Earlier versions of NFS are not required knowledge.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand NFSv4 security issues and improvements.&lt;br /&gt;
* Configure NFSv4 server and clients.&lt;br /&gt;
* Understand and configure NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos).&lt;br /&gt;
* Understand and use NFSv4 pseudo file system.&lt;br /&gt;
* Understand and use NFSv4 ACLs.&lt;br /&gt;
* Configure CIFS clients.&lt;br /&gt;
* Understand and use CIFS Unix Extensions.&lt;br /&gt;
* Understand and configure CIFS security modes (NTLM, Kerberos).&lt;br /&gt;
* Understand and manage mapping and handling of CIFS ACLs and SIDs in a Linux system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/exports &lt;br /&gt;
* /etc/idmap.conf&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* mount.cifs parameters related to ownership, permissions and security modes&lt;br /&gt;
* winbind&lt;br /&gt;
* getcifsacl, setcifsacl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 328: Network Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.1 Network Hardening (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure networks against common threats. This includes verification of the effectiveness of security measures.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure FreeRADIUS to authenticate network nodes.&lt;br /&gt;
* Use nmap to scan networks and hosts, including different scan methods.&lt;br /&gt;
* Use Wireshark to analyze network traffic, including filters and statistics.&lt;br /&gt;
* Identify and deal with rogue router advertisements and DHCP messages.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* radiusd&lt;br /&gt;
* radmin&lt;br /&gt;
* radtest, radclient&lt;br /&gt;
* radlast, radwho&lt;br /&gt;
* radiusd.conf&lt;br /&gt;
* /etc/raddb/*&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* ndpmon&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.2 Network Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Implement bandwidth usage monitoring.&lt;br /&gt;
* Configure and use Snort, including rule management.&lt;br /&gt;
* Configure and use OpenVAS, including NASL.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* Cacti&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/*&lt;br /&gt;
* openvas-adduser, openvas-rmuser&lt;br /&gt;
* openvas-nvt-sync&lt;br /&gt;
* openvassd&lt;br /&gt;
* openvas-mkcert&lt;br /&gt;
* /etc/openvas/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.3 Packet Filtering (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of packet filters. This includes netfilter, iptables and ip6tables as well as basic knowledge of nftables, nft and ebtables.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand common firewall architectures, including DMZ.&lt;br /&gt;
* Understand and use netfilter, iptables and ip6tables, including standard modules, tests and targets.&lt;br /&gt;
* Implement packet filtering for both IPv4 and IPv6.&lt;br /&gt;
* Implement connection tracking and network address translation.&lt;br /&gt;
* Define IP sets and use them in netfilter rules.&lt;br /&gt;
* Have basic knowledge of nftables and nft.&lt;br /&gt;
* Have basic knowledge of ebtables.&lt;br /&gt;
* Be aware of conntrackd.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* ip6tables&lt;br /&gt;
* iptables-save, iptables-restore &lt;br /&gt;
* ip6tables-save, ip6tables-restore &lt;br /&gt;
* ipset&lt;br /&gt;
* nft&lt;br /&gt;
* ebtables&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.4 Virtual Private Networks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of OpenVPN and IPsec.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure and operate OpenVPN server and clients for both bridged and routed VPN networks.&lt;br /&gt;
* Configure and operate IPsec server and clients for routed VPN networks using IPsec-Tools / racoon.&lt;br /&gt;
* Awareness of L2TP.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/*&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
* setkey&lt;br /&gt;
* /etc/ipsec-tools.conf&lt;br /&gt;
* /etc/racoon/racoon.conf&lt;br /&gt;
&lt;br /&gt;
==Other Comments for consideration==&lt;br /&gt;
&lt;br /&gt;
As examples, following items are not in the current objectives:&lt;br /&gt;
&lt;br /&gt;
1) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Wireless LAN:&amp;lt;/b&amp;gt; (Note: It’s not only for Linux though, it is necessary to consider because there are many points to be taken care for configuration in terms of security measure.)&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Some aspects (i.e. Radius) are implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
2) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to IPv6:&amp;lt;/b&amp;gt; Not only IPv4, but also IPv6 should be considered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 wherever applicable (fth)&lt;br /&gt;
&lt;br /&gt;
3) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Security features in Linux:&amp;lt;/b&amp;gt; For example, ASLR and Exec-Shield (ASCII Armor) should be considered, because it causes security level lower if those are disabled.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in host hardening in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
4) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Forensics:&amp;lt;/b&amp;gt; In the survey of malware’s behavior, Sleuth Kit would be used to analyze the hard disk on Linux machine. Also in some cases, LVM commands would be used to restore the disk which became un-mountable. So that this area should be learned.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interesting topic, but it goes beyond basic security in the sense it &amp;quot;prevention and defending&amp;quot;. This is postmortal analysis. As the exam already contains a lot of topic this is postponed but up to discussion (fth)&lt;br /&gt;
&lt;br /&gt;
5) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Database (RDB, NoSQL) security:&amp;lt;/b&amp;gt; Because Application Security (bind, apache, etc.) is covered now, this item would be nice to cover. And this item is listed in the CIF, security contest almost every time. Also the counter-measure in server side is necessary.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As the other software / service aspects beyond Linux system security have been dropped this is considered out of scope for now too (fth)&lt;br /&gt;
&lt;br /&gt;
6) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to OpenFlow:&amp;lt;/b&amp;gt; There are several points to be considered in terms of security measure about the configuration of OpenFlow.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is considered as an application aspect which seems to be beyond the scope for not (fth).&lt;br /&gt;
&lt;br /&gt;
7) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;RADIUS:&amp;lt;/b&amp;gt; This was covered in 301 though, this is not covered now. This should be covered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
8) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;DNS:&amp;lt;/b&amp;gt; More DNSSEC and DANE.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
9) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Secure development, hardening&amp;lt;/b&amp;gt;&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hardening has been implemented for both hosts and networks in V2 (fth), Secure development is considered out of scope for now (fth)&lt;br /&gt;
&lt;br /&gt;
==Changes since version 1==&lt;br /&gt;
&lt;br /&gt;
===321.3===&lt;br /&gt;
The following aspects have been removed from objective 321.3 User Management and Authentication:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Kerberos Key Distribution Centre&lt;br /&gt;
* Kerberos Principals&lt;br /&gt;
* Kerberos Tickets&lt;br /&gt;
* password cracking  &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* krb5kdc/kdc.conf&lt;br /&gt;
* kdb5_util&lt;br /&gt;
* rb5kdc/kadm5.acl&lt;br /&gt;
* kadmin, kadmin.local&lt;br /&gt;
* john&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to key servers. Managing multiple private keys and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Use GPG for encryption and signing.&lt;br /&gt;
* Configure GPG.&lt;br /&gt;
* Manage private and public keys.&lt;br /&gt;
* Interact with GPG key servers to publish and retrieve public keys. &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.6 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure and use OpenSSH.&lt;br /&gt;
* Manage OpenSSH keys and access control.&lt;br /&gt;
* Be aware of SSH protocol v1 and v2 security issues.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/ssh/*&lt;br /&gt;
* ~/.ssh/*&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Babafou</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-1_Objectives_V4&amp;diff=3257</id>
		<title>LPIC-1 Objectives V4</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-1_Objectives_V4&amp;diff=3257"/>
		<updated>2015-02-10T13:56:25Z</updated>

		<summary type="html">&lt;p&gt;Babafou: /* 106.2 Setup a display manager */ fix typo (Manger -&amp;gt; Manager)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This is a required exam for LPIC-1 or LPI certification Level 1. It covers basic skills for the Linux professional that are common across all distributions of Linux.&lt;br /&gt;
&lt;br /&gt;
This page covers the currently released objective for the LPIC-1 certification. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are version 4.0.0.&lt;br /&gt;
&lt;br /&gt;
There is also a [[LPIC1SummaryVersion3To4|summary and detailed information]] on the changes from version 3.5 to 4.0 of the objectives.&lt;br /&gt;
&lt;br /&gt;
The version [[LPIC-1 Objectives V3|3.x objectives]] can be found [[LPIC-1 Objectives V3|here]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-1 Objectives V4|LPIC-1]], the candidate must pass both the [[LPIC-1 Objectives V4#Objectives: Exam 101|101]] and [[LPIC-1 Objectives V4#Objectives: Exam 102|102]] exams.&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-1 Objectives V4#Objectives: Exam 101|101]]&lt;br /&gt;
* [[LPIC-1 Objectives V4#Objectives: Exam 102|102]]&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-1 Objectives V4(Catalan)|Catalan]] (currently 101 only).&lt;br /&gt;
* [[LPIC-1 Objectives V4|English]].&lt;br /&gt;
* [[LPIC-1 Objectives V4(FR)|French]].&lt;br /&gt;
* [http://www.lpice.eu/de/lpi-zertifizierungsinhalte.html German].&lt;br /&gt;
* [[LPIC-1 Objectives V4(Greek)|Greek]].&lt;br /&gt;
* [[LPIC-1 Objectives V4(PT-PT)|Portuguese(Portugal)]].&lt;br /&gt;
* [[LPIC-1 Objectives V4(RU)|Russian]].&lt;br /&gt;
* [[LPIC-1 Objectives V4(ES)|Spanish]].&lt;br /&gt;
* [[LPIC-1 Objectives V4(SW)|Swahili]].&lt;br /&gt;
* [[LPIC-1 Objectives V4(SV)|Swedish]].&lt;br /&gt;
* [[LPIC-1 Objectives V4(TR)|Turkish]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 101==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 101: System Architecture&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;101.1 Determine and configure hardware settings&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to determine and configure fundamental system hardware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Enable and disable integrated peripherals.&lt;br /&gt;
* Configure systems with or without external peripherals such as keyboards.&lt;br /&gt;
* Differentiate between the various types of mass storage devices.&lt;br /&gt;
* Know the differences between coldplug and hotplug devices.&lt;br /&gt;
* Determine hardware resources for devices.&lt;br /&gt;
* Tools and utilities to list various hardware information (e.g. lsusb, lspci, etc.).&lt;br /&gt;
* Tools and utilities to manipulate USB devices.&lt;br /&gt;
* Conceptual understanding of sysfs, udev, dbus.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sys/&lt;br /&gt;
* /proc/&lt;br /&gt;
* /dev/&lt;br /&gt;
* modprobe&lt;br /&gt;
* lsmod&lt;br /&gt;
* lspci&lt;br /&gt;
* lsusb &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;101.2 Boot the system&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to guide the system through the booting process.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Provide common commands to the boot loader and options to the kernel at boot time.&lt;br /&gt;
* Demonstrate knowledge of the boot sequence from BIOS to boot completion.&lt;br /&gt;
* Understanding of SysVinit and systemd.&lt;br /&gt;
* Awareness of Upstart. &lt;br /&gt;
* Check boot events in the log files. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
* BIOS&lt;br /&gt;
* bootloader&lt;br /&gt;
* kernel&lt;br /&gt;
* initramfs&lt;br /&gt;
* init&lt;br /&gt;
* SysVinit&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;101.3 Change runlevels / boot targets and shutdown or reboot system &amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to manage the SysVinit runlevel or systemd boot target of the system. This objective includes changing to single user mode, shutdown or rebooting the system. Candidates should be able to alert users before switching runlevels / boot targets and properly terminate processes. This objective also includes setting the default SysVinit runlevel or systemd boot target. It also includes awareness of Upstart as an alternative to SysVinit or systemd.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set the default runlevel or boot target.&lt;br /&gt;
* Change between runlevels / boot targets including single user mode.&lt;br /&gt;
* Shutdown and reboot from the command line.&lt;br /&gt;
* Alert users before switching runlevels / boot targets or other major system events.&lt;br /&gt;
* Properly terminate processes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/inittab&lt;br /&gt;
* shutdown&lt;br /&gt;
* init&lt;br /&gt;
* /etc/init.d/&lt;br /&gt;
* telinit &lt;br /&gt;
* systemd&lt;br /&gt;
* systemctl&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
* wall&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 102: Linux Installation and Package Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;102.1 Design hard disk layout&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to design a disk partitioning scheme for a Linux system.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Allocate filesystems and swap space to separate partitions or disks.&lt;br /&gt;
* Tailor the design to the intended use of the system.&lt;br /&gt;
* Ensure the /boot partition conforms to the hardware architecture requirements for booting. &lt;br /&gt;
* Knowledge of basic features of LVM.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* / (root) filesystem&lt;br /&gt;
* /var filesystem&lt;br /&gt;
* /home filesystem&lt;br /&gt;
* /boot filesystem&lt;br /&gt;
* swap space&lt;br /&gt;
* mount points&lt;br /&gt;
* partitions&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;102.2 Install a boot manager&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to select, install and configure a boot manager.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Providing alternative boot locations and backup boot options.&lt;br /&gt;
* Install and configure a boot loader such as GRUB Legacy.&lt;br /&gt;
* Perform basic configuration changes for GRUB 2.&lt;br /&gt;
* Interact with the boot loader. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* menu.lst, grub.cfg and grub.conf&lt;br /&gt;
* grub-install&lt;br /&gt;
* grub-mkconfig&lt;br /&gt;
* MBR&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;102.3 Manage shared libraries&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to determine the shared libraries that executable programs depend on and install them when necessary.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Identify shared libraries.&lt;br /&gt;
* Identify the typical locations of system libraries.&lt;br /&gt;
* Load shared libraries. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldd&lt;br /&gt;
* ldconfig&lt;br /&gt;
* /etc/ld.so.conf&lt;br /&gt;
* LD_LIBRARY_PATH &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;102.4 Use Debian package management&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to perform package management using the Debian package tools.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Install, upgrade and uninstall Debian binary packages.&lt;br /&gt;
* Find packages containing specific files or libraries which may or may not be installed.&lt;br /&gt;
* Obtain package information like version, content, dependencies, package integrity and installation status (whether or not the package is installed).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/apt/sources.list&lt;br /&gt;
* dpkg&lt;br /&gt;
* dpkg-reconfigure&lt;br /&gt;
* apt-get&lt;br /&gt;
* apt-cache&lt;br /&gt;
* aptitude &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;102.5 Use RPM and YUM package management&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to perform package management using RPM and YUM tools.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Install, re-install, upgrade and remove packages using RPM and YUM.&lt;br /&gt;
&lt;br /&gt;
* Obtain information on RPM packages such as version, status, dependencies, integrity and signatures.&lt;br /&gt;
* Determine what files a package provides, as well as find which package a specific file comes from. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* rpm&lt;br /&gt;
* rpm2cpio&lt;br /&gt;
* /etc/yum.conf&lt;br /&gt;
* /etc/yum.repos.d/&lt;br /&gt;
* yum&lt;br /&gt;
* yumdownloader &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 103: GNU and Unix Commands&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;103.1 Work on the command line&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to interact with shells and commands using the command line. The objective assumes the Bash shell.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use single shell commands and one line command sequences to perform basic tasks on the command line.&lt;br /&gt;
* Use and modify the shell environment including defining, referencing and exporting environment variables.&lt;br /&gt;
* Use and edit command history.&lt;br /&gt;
* Invoke commands inside and outside the defined path. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* bash&lt;br /&gt;
* echo&lt;br /&gt;
* env&lt;br /&gt;
* export&lt;br /&gt;
* pwd&lt;br /&gt;
* set&lt;br /&gt;
* unset&lt;br /&gt;
* man&lt;br /&gt;
* uname&lt;br /&gt;
* history &lt;br /&gt;
* .bash_history&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;103.2 Process text streams using filters&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should should be able to apply filters to text streams. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Send text files and output streams through text utility filters to modify the output using standard UNIX commands found in the GNU textutils package. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* cat&lt;br /&gt;
* cut&lt;br /&gt;
* expand&lt;br /&gt;
* fmt&lt;br /&gt;
* head&lt;br /&gt;
* join&lt;br /&gt;
* less&lt;br /&gt;
* nl&lt;br /&gt;
* od&lt;br /&gt;
* paste&lt;br /&gt;
* pr&lt;br /&gt;
* sed&lt;br /&gt;
* sort&lt;br /&gt;
* split&lt;br /&gt;
* tail&lt;br /&gt;
* tr&lt;br /&gt;
* unexpand&lt;br /&gt;
* uniq&lt;br /&gt;
* wc &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;103.3 Perform basic file management&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to use the basic Linux commands to manage files and directories.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Copy, move and remove files and directories individually.&lt;br /&gt;
* Copy multiple files and directories recursively.&lt;br /&gt;
* Remove files and directories recursively.&lt;br /&gt;
* Use simple and advanced wildcard specifications in commands.&lt;br /&gt;
* Using find to locate and act on files based on type, size, or time.&lt;br /&gt;
* Usage of tar, cpio and dd. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* cp&lt;br /&gt;
* find&lt;br /&gt;
* mkdir&lt;br /&gt;
* mv&lt;br /&gt;
* ls&lt;br /&gt;
* rm&lt;br /&gt;
* rmdir&lt;br /&gt;
* touch&lt;br /&gt;
* tar&lt;br /&gt;
* cpio&lt;br /&gt;
* dd&lt;br /&gt;
* file&lt;br /&gt;
* gzip&lt;br /&gt;
* gunzip&lt;br /&gt;
* bzip2&lt;br /&gt;
* xz&lt;br /&gt;
* file globbing &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;103.4 Use streams, pipes and redirects&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to redirect streams and connect them in order to efficiently process textual data. Tasks include redirecting standard input, standard output and standard error, piping the output of one command to the input of another command, using the output of one command as arguments to another command and sending output to both stdout and a file.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Redirecting standard input, standard output and standard error.&lt;br /&gt;
* Pipe the output of one command to the input of another command.&lt;br /&gt;
* Use the output of one command as arguments to another command.&lt;br /&gt;
* Send output to both stdout and a file. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* tee&lt;br /&gt;
* xargs &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;103.5 Create, monitor and kill processes&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to perform basic process management. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Run jobs in the foreground and background.&lt;br /&gt;
* Signal a program to continue running after logout.&lt;br /&gt;
* Monitor active processes.&lt;br /&gt;
* Select and sort processes for display.&lt;br /&gt;
* Send signals to processes. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &amp;amp;&lt;br /&gt;
* bg&lt;br /&gt;
* fg&lt;br /&gt;
* jobs&lt;br /&gt;
* kill&lt;br /&gt;
* nohup&lt;br /&gt;
* ps&lt;br /&gt;
* top&lt;br /&gt;
* free&lt;br /&gt;
* uptime&lt;br /&gt;
* pgrep&lt;br /&gt;
* pkill&lt;br /&gt;
* killall&lt;br /&gt;
* screen &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;103.6 Modify process execution priorities&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should should be able to manage process execution priorities. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know the default priority of a job that is created.&lt;br /&gt;
* Run a program with higher or lower priority than the default.&lt;br /&gt;
* Change the priority of a running process. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nice&lt;br /&gt;
* ps&lt;br /&gt;
* renice&lt;br /&gt;
* top &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;103.7 Search text files using regular expressions&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to manipulate files and text data using regular expressions. This objective includes creating simple regular expressions containing several notational elements. It also includes using regular expression tools to perform searches through a filesystem or file content.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create simple regular expressions containing several notational elements.&lt;br /&gt;
* Use regular expression tools to perform searches through a filesystem or file content. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* grep&lt;br /&gt;
* egrep&lt;br /&gt;
* fgrep&lt;br /&gt;
* sed&lt;br /&gt;
* regex(7) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;103.8 Perform basic file editing operations using vi&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to edit text files using vi. This objective includes vi navigation, basic vi modes, inserting, editing, deleting, copying and finding text.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Navigate a document using vi.&lt;br /&gt;
* Use basic vi modes.&lt;br /&gt;
* Insert, edit, delete, copy and find text.&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* vi&lt;br /&gt;
* /, ?&lt;br /&gt;
* h,j,k,l&lt;br /&gt;
* i, o, a&lt;br /&gt;
* c, d, p, y, dd, yy&lt;br /&gt;
* ZZ, :w!, :q!, :e! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 104: Devices, Linux Filesystems, Filesystem Hierarchy Standard&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;104.1 Create partitions and filesystems&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure disk partitions and then create filesystems on media such as hard disks. This includes the handling of swap partitions.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Manage MBR partition tables&lt;br /&gt;
* Use various mkfs commands to create various filesystems such as:&lt;br /&gt;
** ext2/ext3/ext4&lt;br /&gt;
** XFS&lt;br /&gt;
** VFAT&lt;br /&gt;
* Awareness of ReiserFS and Btrfs&lt;br /&gt;
* Basic knowledge of gdisk and parted with GPT.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* fdisk&lt;br /&gt;
* gdisk&lt;br /&gt;
* parted&lt;br /&gt;
* mkfs&lt;br /&gt;
* mkswap &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;104.2 Maintain the integrity of filesystems&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to maintain a standard filesystem, as well as the extra data associated with a journaling filesystem.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of filesystems.&lt;br /&gt;
* Monitor free space and inodes.&lt;br /&gt;
* Repair simple filesystem problems. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* du&lt;br /&gt;
* df&lt;br /&gt;
* fsck&lt;br /&gt;
* e2fsck&lt;br /&gt;
* mke2fs&lt;br /&gt;
* debugfs&lt;br /&gt;
* dumpe2fs&lt;br /&gt;
* tune2fs&lt;br /&gt;
* XFS tools (such as xfs_metadump and xfs_info) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;104.3 Control mounting and unmounting of filesystems&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure the mounting of a filesystem.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Manually mount and unmount filesystems.&lt;br /&gt;
* Configure filesystem mounting on bootup.&lt;br /&gt;
* Configure user mountable removable filesystems. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
* /media/&lt;br /&gt;
* mount&lt;br /&gt;
* umount &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;104.4 Manage disk quotas&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to manage disk quotas for users. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set up a disk quota for a filesystem.&lt;br /&gt;
* Edit, check and generate user quota reports. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* quota&lt;br /&gt;
* edquota&lt;br /&gt;
* repquota&lt;br /&gt;
* quotaon &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;104.5 Manage file permissions and ownership&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to control file access through the proper use of permissions and ownerships. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Manage access permissions on regular and special files as well as directories.&lt;br /&gt;
* Use access modes such as suid, sgid and the sticky bit to maintain security.&lt;br /&gt;
* Know how to change the file creation mask.&lt;br /&gt;
* Use the group field to grant file access to group members. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* chmod&lt;br /&gt;
* umask&lt;br /&gt;
* chown&lt;br /&gt;
* chgrp &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;104.6 Create and change hard and symbolic links&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to create and manage hard and symbolic links to a file. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create links.&lt;br /&gt;
* Identify hard and/or soft links.&lt;br /&gt;
* Copying versus linking files.&lt;br /&gt;
* Use links to support system administration tasks.&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ln&lt;br /&gt;
* ls&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;104.7 Find system files and place files in the correct location&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be thoroughly familiar with the Filesystem Hierarchy Standard (FHS), including typical file locations and directory classifications.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the correct locations of files under the FHS.&lt;br /&gt;
* Find files and commands on a Linux system.&lt;br /&gt;
* Know the location and purpose of important file and directories as defined in the FHS. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* find&lt;br /&gt;
* locate&lt;br /&gt;
* updatedb&lt;br /&gt;
* whereis&lt;br /&gt;
* which&lt;br /&gt;
* type&lt;br /&gt;
* /etc/updatedb.conf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 102==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 105: Shells, Scripting and Data Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;105.1 Customize and use the shell environment&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to customize shell environments to meet users&#039; needs. Candidates should be able to modify global and user profiles.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set environment variables (e.g. PATH) at login or when spawning a new shell.&lt;br /&gt;
* Write Bash functions for frequently used sequences of commands.&lt;br /&gt;
* Maintain skeleton directories for new user accounts.&lt;br /&gt;
* Set command search path with the proper directory. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* .&lt;br /&gt;
* source&lt;br /&gt;
* /etc/bash.bashrc&lt;br /&gt;
* /etc/profile&lt;br /&gt;
* env&lt;br /&gt;
* export&lt;br /&gt;
* set&lt;br /&gt;
* unset&lt;br /&gt;
* ~/.bash_profile&lt;br /&gt;
* ~/.bash_login&lt;br /&gt;
* ~/.profile&lt;br /&gt;
* ~/.bashrc&lt;br /&gt;
* ~/.bash_logout&lt;br /&gt;
* function&lt;br /&gt;
* alias&lt;br /&gt;
* lists &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;105.2 Customize or write simple scripts&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to customize existing scripts, or write simple new Bash scripts. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use standard sh syntax (loops, tests).&lt;br /&gt;
* Use command substitution.&lt;br /&gt;
* Test return values for success or failure or other information provided by a command.&lt;br /&gt;
* Perform conditional mailing to the superuser.&lt;br /&gt;
* Correctly select the script interpreter through the shebang (#!) line.&lt;br /&gt;
* Manage the location, ownership, execution and suid-rights of scripts. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* for&lt;br /&gt;
* while&lt;br /&gt;
* test&lt;br /&gt;
* if&lt;br /&gt;
* read&lt;br /&gt;
* seq &lt;br /&gt;
* exec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;105.3 SQL data management&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to query databases and manipulate data using basic SQL commands. This objective includes performing queries involving joining of 2 tables and/or subselects.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use of basic SQL commands.&lt;br /&gt;
* Perform basic data manipulation. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* insert&lt;br /&gt;
* update&lt;br /&gt;
* select&lt;br /&gt;
* delete&lt;br /&gt;
* from&lt;br /&gt;
* where&lt;br /&gt;
* group by&lt;br /&gt;
* order by&lt;br /&gt;
* join &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 106: User Interfaces and Desktops&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;106.1 Install and configure X11&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to install and configure X11. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Verify that the video card and monitor are supported by an X server.&lt;br /&gt;
* Awareness of the X font server.&lt;br /&gt;
* Basic understanding and knowledge of the X Window configuration file. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/X11/xorg.conf&lt;br /&gt;
* xhost&lt;br /&gt;
* DISPLAY&lt;br /&gt;
* xwininfo&lt;br /&gt;
* xdpyinfo&lt;br /&gt;
* X &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;106.2 Setup a display manager&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to describe the basic features and configuration of the LightDM display manager. This objective covers awareness of the display managers XDM (X Display Manager), GDM (Gnome Display Manager) and KDM (KDE Display Manager).&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Basic configuration of LightDM.&lt;br /&gt;
* Turn the display manager on or off.&lt;br /&gt;
* Change the display manager greeting.&lt;br /&gt;
* Awareness of XDM, KDM and GDM.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* lightdm&lt;br /&gt;
* /etc/lightdm/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;106.3 Accessibility&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Demonstrate knowledge and awareness of accessibility technologies. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of keyboard accessibility settings (AccessX).&lt;br /&gt;
* Basic knowledge of visual settings and themes.&lt;br /&gt;
* Basic knowledge of assistive technology (ATs).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Sticky/Repeat Keys.&lt;br /&gt;
* Slow/Bounce/Toggle Keys.&lt;br /&gt;
* Mouse Keys.&lt;br /&gt;
* High Contrast/Large Print Desktop Themes.&lt;br /&gt;
* Screen Reader.&lt;br /&gt;
* Braille Display.&lt;br /&gt;
* Screen Magnifier.&lt;br /&gt;
* On-Screen Keyboard.&lt;br /&gt;
* Gestures (used at login, for example GDM).&lt;br /&gt;
* Orca.&lt;br /&gt;
* GOK.&lt;br /&gt;
* emacspeak.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 107: Administrative Tasks&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;107.1 Manage user and group accounts and related system files&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to add, remove, suspend and change user accounts. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Add, modify and remove users and groups.&lt;br /&gt;
* Manage user/group info in password/group databases.&lt;br /&gt;
* Create and manage special purpose and limited accounts. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/shadow&lt;br /&gt;
* /etc/group&lt;br /&gt;
* /etc/skel/&lt;br /&gt;
* chage&lt;br /&gt;
* getent&lt;br /&gt;
* groupadd&lt;br /&gt;
* groupdel&lt;br /&gt;
* groupmod&lt;br /&gt;
* passwd&lt;br /&gt;
* useradd&lt;br /&gt;
* userdel&lt;br /&gt;
* usermod &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;107.2 Automate system administration tasks by scheduling jobs&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to use cron or anacron to run jobs at regular intervals and to use at to run jobs at a specific time. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Manage cron and at jobs.&lt;br /&gt;
* Configure user access to cron and at services. &lt;br /&gt;
* Configure anacron.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/cron.{d,daily,hourly,monthly,weekly}/&lt;br /&gt;
* /etc/at.deny&lt;br /&gt;
* /etc/at.allow&lt;br /&gt;
* /etc/crontab&lt;br /&gt;
* /etc/cron.allow&lt;br /&gt;
* /etc/cron.deny&lt;br /&gt;
* /var/spool/cron/&lt;br /&gt;
* crontab&lt;br /&gt;
* at&lt;br /&gt;
* atq&lt;br /&gt;
* atrm&lt;br /&gt;
* anacron&lt;br /&gt;
* /etc/anacrontab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;107.3 Localisation and internationalisation&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to localize a system in a different language than English. As well, an understanding of why LANG=C is useful when scripting.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure locale settings and environment variables.&lt;br /&gt;
* Configure timezone settings and environment variables.&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/timezone&lt;br /&gt;
* /etc/localtime&lt;br /&gt;
* /usr/share/zoneinfo/&lt;br /&gt;
* LC_*&lt;br /&gt;
* LC_ALL&lt;br /&gt;
* LANG&lt;br /&gt;
* TZ&lt;br /&gt;
* /usr/bin/locale&lt;br /&gt;
* tzselect&lt;br /&gt;
* tzconfig&lt;br /&gt;
* date&lt;br /&gt;
* iconv&lt;br /&gt;
* UTF-8&lt;br /&gt;
* ISO-8859&lt;br /&gt;
* ASCII&lt;br /&gt;
* Unicode &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 108: Essential System Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;108.1 Maintain system time&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to properly maintain the system time and synchronize the clock via NTP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set the system date and time.&lt;br /&gt;
* Set the hardware clock to the correct time in UTC.&lt;br /&gt;
* Configure the correct timezone.&lt;br /&gt;
* Basic NTP configuration.&lt;br /&gt;
* Knowledge of using the pool.ntp.org service.&lt;br /&gt;
* Awareness of the ntpq command.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/share/zoneinfo/&lt;br /&gt;
* /etc/timezone&lt;br /&gt;
* /etc/localtime&lt;br /&gt;
* /etc/ntp.conf&lt;br /&gt;
* date&lt;br /&gt;
* hwclock&lt;br /&gt;
* ntpd&lt;br /&gt;
* ntpdate&lt;br /&gt;
* pool.ntp.org &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;108.2 System logging&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure the syslog daemon. This objective also includes configuring the logging daemon to send log output to a central log server or accept log output as a central log server.  Use of the systemd journal subsystem is covered.  Also, awareness of rsyslog and syslog-ng as alternative logging systems is included.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration of the syslog daemon.&lt;br /&gt;
* Understanding of standard facilities, priorities and actions.&lt;br /&gt;
* Configuration of logrotate.&lt;br /&gt;
* Awareness of rsyslog and syslog-ng.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslog.conf&lt;br /&gt;
* syslogd&lt;br /&gt;
* klogd&lt;br /&gt;
* /var/log/&lt;br /&gt;
* logger &lt;br /&gt;
* logrotate&lt;br /&gt;
* /etc/logrotate.conf&lt;br /&gt;
* /etc/logrotate.d/&lt;br /&gt;
* journalctl&lt;br /&gt;
* /etc/systemd/journald.conf&lt;br /&gt;
* /var/log/journal/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;108.3 Mail Transfer Agent (MTA) basics&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be aware of the commonly available MTA programs and be able to perform basic forward and alias configuration on a client host. Other configuration files are not covered.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create e-mail aliases.&lt;br /&gt;
* Configure e-mail forwarding.&lt;br /&gt;
* Knowledge of commonly available MTA programs (postfix, sendmail, qmail, exim) (no configuration) &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ~/.forward&lt;br /&gt;
* sendmail emulation layer commands&lt;br /&gt;
* newaliases&lt;br /&gt;
* mail&lt;br /&gt;
* mailq&lt;br /&gt;
* postfix&lt;br /&gt;
* sendmail&lt;br /&gt;
* exim&lt;br /&gt;
* qmail &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;108.4 Manage printers and printing&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to manage print queues and user print jobs using CUPS and the LPD compatibility interface. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Basic CUPS configuration (for local and remote printers).&lt;br /&gt;
* Manage user print queues.&lt;br /&gt;
* Troubleshoot general printing problems.&lt;br /&gt;
* Add and remove jobs from configured printer queues. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* CUPS configuration files, tools and utilities&lt;br /&gt;
* /etc/cups/&lt;br /&gt;
* lpd legacy interface (lpr, lprm, lpq) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 109: Networking Fundamentals&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;109.1 Fundamentals of internet protocols&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should demonstrate a proper understanding of TCP/IP network fundamentals. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Demonstrate an understanding of network masks and CIDR notation.&lt;br /&gt;
* Knowledge of the differences between private and public &amp;quot;dotted quad&amp;quot; IP addresses.&lt;br /&gt;
* Knowledge about common TCP and UDP ports and services (20, 21, 22, 23, 25, 53, 80, 110, 123, 139, 143, 161, 162, 389, 443, 465, 514, 636, 993, 995).&lt;br /&gt;
* Knowledge about the differences and major features of UDP, TCP and ICMP.&lt;br /&gt;
* Knowledge of the major differences between IPv4 and IPv6. &lt;br /&gt;
* Knowledge of the basic features of IPv6.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
* Subnetting&lt;br /&gt;
* TCP, UDP, ICMP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;109.2 Basic network configuration&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to view, change and verify configuration settings on client hosts. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Manually and automatically configure network interfaces.&lt;br /&gt;
* Basic TCP/IP host configuration.&lt;br /&gt;
* Setting a default route. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
* /etc/nsswitch.conf&lt;br /&gt;
* ifconfig&lt;br /&gt;
* ifup&lt;br /&gt;
* ifdown&lt;br /&gt;
* ip&lt;br /&gt;
* route&lt;br /&gt;
* ping &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;109.3 Basic network troubleshooting&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to troubleshoot networking issues on client hosts. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Manually and automatically configure network interfaces and routing tables to include adding, starting, stopping, restarting, deleting or reconfiguring network interfaces.&lt;br /&gt;
* Change, view, or configure the routing table and correct an improperly set default route manually.&lt;br /&gt;
* Debug problems associated with the network configuration. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ifconfig&lt;br /&gt;
* ip&lt;br /&gt;
* ifup&lt;br /&gt;
* ifdown&lt;br /&gt;
* route&lt;br /&gt;
* host&lt;br /&gt;
* hostname&lt;br /&gt;
* dig&lt;br /&gt;
* netstat&lt;br /&gt;
* ping&lt;br /&gt;
* ping6&lt;br /&gt;
* traceroute&lt;br /&gt;
* traceroute6 &lt;br /&gt;
* tracepath&lt;br /&gt;
* tracepath6&lt;br /&gt;
* netcat&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;109.4 Configure client side DNS&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure DNS on a client host. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query remote DNS servers.&lt;br /&gt;
* Configure local name resolution and use remote DNS servers.&lt;br /&gt;
* Modify the order in which name resolution is done. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
* /etc/nsswitch.conf &lt;br /&gt;
* host&lt;br /&gt;
* dig&lt;br /&gt;
* getent&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 110: Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;110.1 Perform security administration tasks&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should know how to review system configuration to ensure host security in accordance with local security policies. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Audit a system to find files with the suid/sgid bit set.&lt;br /&gt;
* Set or change user passwords and password aging information.&lt;br /&gt;
* Being able to use nmap and netstat to discover open ports on a system.&lt;br /&gt;
* Set up limits on user logins, processes and memory usage.&lt;br /&gt;
* Determine which users have logged in to the system or are currently logged in.&lt;br /&gt;
* Basic sudo configuration and usage. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* find&lt;br /&gt;
* passwd&lt;br /&gt;
* fuser&lt;br /&gt;
* lsof&lt;br /&gt;
* nmap&lt;br /&gt;
* chage&lt;br /&gt;
* netstat&lt;br /&gt;
* sudo&lt;br /&gt;
* /etc/sudoers&lt;br /&gt;
* su&lt;br /&gt;
* usermod&lt;br /&gt;
* ulimit&lt;br /&gt;
* who, w, last&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;110.2 Setup host security&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should know how to set up a basic level of host security. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Awareness of shadow passwords and how they work.&lt;br /&gt;
* Turn off network services not in use.&lt;br /&gt;
* Understand the role of TCP wrappers. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/nologin&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/shadow&lt;br /&gt;
* /etc/xinetd.d/&lt;br /&gt;
* /etc/xinetd.conf&lt;br /&gt;
* /etc/inetd.d/&lt;br /&gt;
* /etc/inetd.conf&lt;br /&gt;
* /etc/inittab&lt;br /&gt;
* /etc/init.d/&lt;br /&gt;
* /etc/hosts.allow&lt;br /&gt;
* /etc/hosts.deny &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;110.3 Securing data with encryption&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
The candidate should be able to use public key techniques to secure data and communication.&lt;br /&gt;
 &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Perform basic OpenSSH 2 client configuration and usage.&lt;br /&gt;
* Understand the role of OpenSSH 2 server host keys.&lt;br /&gt;
* Perform basic GnuPG configuration, usage and revocation.&lt;br /&gt;
* Understand SSH port tunnels (including X11 tunnels).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-add&lt;br /&gt;
* ~/.ssh/id_rsa and id_rsa.pub&lt;br /&gt;
* ~/.ssh/id_dsa and id_dsa.pub&lt;br /&gt;
* /etc/ssh/ssh_host_rsa_key and ssh_host_rsa_key.pub&lt;br /&gt;
* /etc/ssh/ssh_host_dsa_key and ssh_host_dsa_key.pub&lt;br /&gt;
* ~/.ssh/authorized_keys&lt;br /&gt;
* /etc/ssh_known_hosts&lt;br /&gt;
* gpg&lt;br /&gt;
* ~/.gnupg/&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* include another monitoring command : watch&lt;br /&gt;
* cover UEFI in LPIC-1 instead of LPIC-2&lt;br /&gt;
* explicitly mention GUIDs&lt;br /&gt;
* add declare to Bash coverage&lt;br /&gt;
* dump older syslog implementations&lt;br /&gt;
* cover compgen&lt;br /&gt;
* bring back awk coverage (maybe LPIC-2)&lt;/div&gt;</summary>
		<author><name>Babafou</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303_Objectives_V1&amp;diff=3254</id>
		<title>LPIC-303 Objectives V1</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303_Objectives_V1&amp;diff=3254"/>
		<updated>2015-01-26T18:33:36Z</updated>

		<summary type="html">&lt;p&gt;Babafou: /* 320.2 Advanced GPG */ fix a few typos&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
The description of the entire [[LPIC-3]] programme is listed [[LPIC-3|here]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
These objectives are version 1.0.0. &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
* [[LPIC-303|English]]&lt;br /&gt;
* [[LPIC-303(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
===&#039;&#039;Topic 320: Cryptography&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.1 OpenSSL&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to configure and use OpenSSL. This includes creating your own Certificate Authority and issues SSL certificates for various applications.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* certificate generation&lt;br /&gt;
* key generation&lt;br /&gt;
* SSL/TLS client and server tests &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* openssl&lt;br /&gt;
* RSA, DH and DSA&lt;br /&gt;
* SSL&lt;br /&gt;
* X.509&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.2 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to key servers. Managing multiple private keys and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* GPG encryption and signing&lt;br /&gt;
* private/public key management&lt;br /&gt;
* GPG key servers&lt;br /&gt;
* GPG configuration &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/ &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Encrypted Filesystems&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to setup and configure encrypted filesystems. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* LUKS&lt;br /&gt;
* dm-crypt and awareness of CBC, ESSIV, LRW and XTS modes &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* dm-crypt&lt;br /&gt;
* cryptmount&lt;br /&gt;
* cryptsetup &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 321: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;321.1 Host Based Access Control&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with basic host based access control such as nsswitch configuration, PAM and password cracking. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* PAM and PAM configuration files&lt;br /&gt;
* password cracking&lt;br /&gt;
* nsswitch &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* john &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;321.2 Extended Attributes and ACLs&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are required to understand and know how to use Extended Attributes and Access Control Lists. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* ACLs&lt;br /&gt;
* EAs and attribute classes &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;321.3 SELinux&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have a thorough knowledge of SELinux. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* SELinux configuration and command line tools&lt;br /&gt;
* TE, RBAC, MAC and DAC concepts and use &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* fixfiles/setfiles&lt;br /&gt;
* newrole&lt;br /&gt;
* setenforce/getenforce&lt;br /&gt;
* selinuxenabled&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus&lt;br /&gt;
* /etc/selinux/&lt;br /&gt;
* /etc/selinux.d/ &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;321.4 Other Mandatory Access Control Systems&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* SMACK&lt;br /&gt;
* AppArmor &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* SMACK&lt;br /&gt;
* AppArmor &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 322: Application Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.1 BIND/DNS&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of BIND DNS services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* BIND v9&lt;br /&gt;
* BIND vulnerabilities&lt;br /&gt;
* chroot environments &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* TSIG&lt;br /&gt;
* BIND ACLs&lt;br /&gt;
* named-checkconf &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.2 Mail Services&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of Postfix mail services. Awareness of security issues in Sendmail is also required but not configuration.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Postfix security centric configuration&lt;br /&gt;
* securing Sendmail&lt;br /&gt;
* chroot environments &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
* TLS &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.3 Apache/HTTP/HTTPS&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of Apache web services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Apache v1 and v2 security centric configuration &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* SSL&lt;br /&gt;
* .htaccess&lt;br /&gt;
* Basic Authentication&lt;br /&gt;
* htpasswd&lt;br /&gt;
* AllowOverride &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.4 FTP&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of Pure-FTPd and vsftpd FTP services.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Pure-FTPd configuration and important command line options&lt;br /&gt;
* vsftpd configuration&lt;br /&gt;
* chroot environments &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* SSL/TLS&lt;br /&gt;
* vsftpd.conf &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.5 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* OpenSSH configuration and command line tools&lt;br /&gt;
* OpenSSH key management and access control&lt;br /&gt;
* Awareness of SSH protocol v1 and v2 security issues &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
* ~/.ssh/&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.6 NFSv4&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 NFS services. Earlier versions of NFS are not required knowledge.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* NFSv4 security improvements, issues and use&lt;br /&gt;
* NFSv4 pseudo file system&lt;br /&gt;
* NFSv4 security mechanisms (LIPKEY, SPKM, Kerberos) &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* NFSv4 ACLs&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* RPCSEC_GSS&lt;br /&gt;
* /etc/exports &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.7 Syslog&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of syslog services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* syslog security issues&lt;br /&gt;
* chroot environments &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* remote syslog servers &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 323: Operations Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;323.1 Host Configuration Management&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of RCS and Puppet for host configuration management. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* RCS&lt;br /&gt;
* Puppet &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* RCS&lt;br /&gt;
* ci/co&lt;br /&gt;
* rcsdiff&lt;br /&gt;
* puppet&lt;br /&gt;
* puppetd&lt;br /&gt;
* puppetmasterd&lt;br /&gt;
* /etc/puppet/ &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 324: Network Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;324.1 Intrusion Detection&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of intrusion detection software. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Snort configuration, rules and use&lt;br /&gt;
* Tripwire configuration, policies and use &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/&lt;br /&gt;
* tripwire&lt;br /&gt;
* twadmin&lt;br /&gt;
* /etc/tripwire/ &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;324.2 Network Security Scanning&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network security scanning tools. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Nessus configuration, NASL and use&lt;br /&gt;
* Wireshark filters and use &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* nessus&lt;br /&gt;
* nessus-adduser/nessus-rmuser&lt;br /&gt;
* nessusd&lt;br /&gt;
* nessus-mkcert&lt;br /&gt;
* /etc/nessus &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;324.3 Network Monitoring&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network monitoring tools. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Nagios configuration and use&lt;br /&gt;
* ntop &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* nagios&lt;br /&gt;
* nagiostats&lt;br /&gt;
* nagios.cfg and other configuration files &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;324.4 netfilter/iptables&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of iptables. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Iptables packet filtering and network address translation &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* iptables-save/iptables-restore &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;324.5 OpenVPN&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of OpenVPN.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* OpenVPN configuration and use &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future consideration not part of current exam==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: FreeIPA and Kerberos&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Deploying Kerberos (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with deploying a Kerberos on a single domain.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Key Distribution Centre&lt;br /&gt;
* Principals&lt;br /&gt;
* Tickets&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* kinit&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* krb5kdc/kdc.conf&lt;br /&gt;
* kdb5_util&lt;br /&gt;
* rb5kdc/kadm5.acl &lt;br /&gt;
* klist&lt;br /&gt;
* kadmin, kadmin.local&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.2 FreeIPA Installation (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with FreeIPA v3.x installation process of creating a server instance.  Knowledge of the components used by FreeIPA.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* System and configuration prerequisites for installing FreeIPA&lt;br /&gt;
* FreeIPA Components: LDAP, Kerberos, PKI, DNS, Certmonger&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ipa-server-install and options&lt;br /&gt;
* ipa&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.3 Integrating FreeIPA with Samba (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to integrate with Samba for group management, Kerberized CIFS and as an AD DC with FreeIPA.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cross-realm trusts&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ipa trust-add-ad&lt;br /&gt;
* ipa config-mod&lt;br /&gt;
* net&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.4 System Security Services Daemon (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure and use SSSD manage access to remote directories and authentication mechanisms&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSSD daemon and command line tools&lt;br /&gt;
* Configuring NSS and PAM for use with SSSD&lt;br /&gt;
* Authenticate against a local, LDAP and Kerberos domain&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSSD&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Other Comments for consideration==&lt;br /&gt;
&lt;br /&gt;
Secure development, hardening&lt;br /&gt;
&lt;br /&gt;
As examples, following items are not in the current objectives:&lt;br /&gt;
&lt;br /&gt;
1) Related to Wireless LAN:&lt;br /&gt;
&lt;br /&gt;
(Note: It’s not only for Linux though, it is necessary to consider because &lt;br /&gt;
&lt;br /&gt;
there are many points to be taken care for configuration in terms of security &lt;br /&gt;
&lt;br /&gt;
measure.)&lt;br /&gt;
&lt;br /&gt;
2) Related to IPv6:&lt;br /&gt;
&lt;br /&gt;
Not only IPv4, but also IPv6 should be considered.&lt;br /&gt;
&lt;br /&gt;
3) Security features in Linux:&lt;br /&gt;
&lt;br /&gt;
For example, ASLR and Exec-Shield (ASCII Armor) should be considered, &lt;br /&gt;
&lt;br /&gt;
because it causes security level lower if those are disabled.&lt;br /&gt;
&lt;br /&gt;
4) Related to Forensics:&lt;br /&gt;
&lt;br /&gt;
In the survey of malware’s behavior, Sleuth Kit would be used to analyze &lt;br /&gt;
&lt;br /&gt;
the hard disk on Linux machine. Also in some cases, LVM commands would be &lt;br /&gt;
&lt;br /&gt;
used to restore the disk which became un-mountable.&lt;br /&gt;
&lt;br /&gt;
So that this area should be learned.&lt;br /&gt;
&lt;br /&gt;
5) Database (RDB, NoSQL) security:&lt;br /&gt;
&lt;br /&gt;
Because Application Security (bind, apache, etc.) is covered now, this item &lt;br /&gt;
&lt;br /&gt;
would be nice to cover. And this item is listed in the CIF, security contest &lt;br /&gt;
&lt;br /&gt;
almost every time.&lt;br /&gt;
&lt;br /&gt;
Also the counter-measure in server side is necessary.&lt;br /&gt;
&lt;br /&gt;
6) Related to OpenFlow:&lt;br /&gt;
&lt;br /&gt;
There are several points to be considered in terms of security measure about &lt;br /&gt;
&lt;br /&gt;
the configuration of OpenFlow.&lt;br /&gt;
&lt;br /&gt;
7) RADIUS&lt;br /&gt;
&lt;br /&gt;
This was covered in 301 though, this is not covered now.&lt;br /&gt;
&lt;br /&gt;
This should be covered.&lt;br /&gt;
&lt;br /&gt;
8) DNS&lt;br /&gt;
&lt;br /&gt;
More DNSSEC and DANE.&lt;/div&gt;</summary>
		<author><name>Babafou</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303_Objectives_V1&amp;diff=2788</id>
		<title>LPIC-303 Objectives V1</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303_Objectives_V1&amp;diff=2788"/>
		<updated>2013-11-25T17:13:27Z</updated>

		<summary type="html">&lt;p&gt;Babafou: /* 322.4 FTP */ changed vsftp.conf to vsftpd.conf (missing d)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
The description of the entire [[LPIC-3]] programme is listed [[LPIC-3|here]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
These objectives are version 1.0.0. &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
* [[LPIC-303|English]]&lt;br /&gt;
* [[LPIC-303(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
===&#039;&#039;Topic 320: Cryptography&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.1 OpenSSL&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to configure and use OpenSSL. This includes creating your own Certificate Authority and issues SSL certificates for various applications.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* certificate generation&lt;br /&gt;
* key generation&lt;br /&gt;
* SSL/TLS client and server tests &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* openssl&lt;br /&gt;
* RSA, DH and DSA&lt;br /&gt;
* SSL&lt;br /&gt;
* X.509&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.2 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to keyservers. Managing multiple private key and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* GPG encyption and signing&lt;br /&gt;
* private/public key management&lt;br /&gt;
* GPG key servers&lt;br /&gt;
* GPG configuration &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/ &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Encrypted Filesystems&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to setup and configure encrypted filesystems. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* LUKS&lt;br /&gt;
* dm-crypt and awareness of CBC, ESSIV, LRW and XTS modes &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* dm-crypt&lt;br /&gt;
* cryptmount&lt;br /&gt;
* cryptsetup &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 321: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;321.1 Host Based Access Control&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with basic host based access control such as nsswitch configuration, PAM and password cracking. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* PAM and PAM configuration files&lt;br /&gt;
* password cracking&lt;br /&gt;
* nsswitch &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* john &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;321.2 Extended Attributes and ACLs&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are required to understand and know how to use Extended Attributes and Access Control Lists. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* ACLs&lt;br /&gt;
* EAs and attribute classes &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;321.3 SELinux&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have a thorough knowledge of SELinux. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* SELinux configuration and command line tools&lt;br /&gt;
* TE, RBAC, MAC and DAC concepts and use &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* fixfiles/setfiles&lt;br /&gt;
* newrole&lt;br /&gt;
* setenforce/getenforce&lt;br /&gt;
* selinuxenabled&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus&lt;br /&gt;
* /etc/selinux/&lt;br /&gt;
* /etc/selinux.d/ &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;321.4 Other Mandatory Access Control Systems&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* SMACK&lt;br /&gt;
* AppArmor &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* SMACK&lt;br /&gt;
* AppArmor &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 322: Application Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.1 BIND/DNS&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of BIND DNS services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* BIND v9&lt;br /&gt;
* BIND vulnerabilities&lt;br /&gt;
* chroot environments &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* TSIG&lt;br /&gt;
* BIND ACLs&lt;br /&gt;
* named-checkconf &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.2 Mail Services&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of Postfix mail services. Awareness of security issues in Sendmail is also required but not configuration.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Postfix security centric configuration&lt;br /&gt;
* securing Sendmail&lt;br /&gt;
* chroot environments &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
* TLS &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.3 Apache/HTTP/HTTPS&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of Apache web services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Apache v1 and v2 security centric configuration &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* SSL&lt;br /&gt;
* .htaccess&lt;br /&gt;
* Basic Authentication&lt;br /&gt;
* htpasswd&lt;br /&gt;
* AllowOverride &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.4 FTP&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of Pure-FTPd and vsftpd FTP services.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Pure-FTPd configuration and important command line options&lt;br /&gt;
* vsftpd configuration&lt;br /&gt;
* chroot environments &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* SSL/TLS&lt;br /&gt;
* vsftpd.conf &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.5 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* OpenSSH configuration and command line tools&lt;br /&gt;
* OpenSSH key management and access control&lt;br /&gt;
* Awareness of SSH protocol v1 and v2 security issues &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
* ~/.ssh/&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.6 NFSv4&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 NFS services. Earlier versions of NFS are not required knowledge.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* NFSv4 security improvements, issues and use&lt;br /&gt;
* NFSv4 pseudo file system&lt;br /&gt;
* NFSv4 security mechanisms (LIPKEY, SPKM, Kerberos) &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* NFSv4 ACLs&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* RPCSEC_GSS&lt;br /&gt;
* /etc/exports &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;322.7 Syslog&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of syslog services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* syslog security issues&lt;br /&gt;
* chroot environments &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* remote syslog servers &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 323: Operations Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;323.1 Host Configuration Management&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of RCS and Puppet for host configuration management. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* RCS&lt;br /&gt;
* Puppet &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* RCS&lt;br /&gt;
* ci/co&lt;br /&gt;
* rcsdiff&lt;br /&gt;
* puppet&lt;br /&gt;
* puppetd&lt;br /&gt;
* puppetmasterd&lt;br /&gt;
* /etc/puppet/ &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 324: Network Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;324.1 Intrusion Detection&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of intrusion detection software. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Snort configuration, rules and use&lt;br /&gt;
* Tripwire configuration, policies and use &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/&lt;br /&gt;
* tripwire&lt;br /&gt;
* twadmin&lt;br /&gt;
* /etc/tripwire/ &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;324.2 Network Security Scanning&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network security scanning tools. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Nessus configuration, NASL and use&lt;br /&gt;
* Wireshark filters and use &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* nessus&lt;br /&gt;
* nessus-adduser/nessus-rmuser&lt;br /&gt;
* nessusd&lt;br /&gt;
* nessus-mkcert&lt;br /&gt;
* /etc/nessus &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;324.3 Network Monitoring&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network monitoring tools. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Nagios configuration and use&lt;br /&gt;
* ntop &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* nagios&lt;br /&gt;
* nagiostats&lt;br /&gt;
* nagios.cfg and other configuration files &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;324.4 netfilter/iptables&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of iptables. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Iptables packet filtering and network address translation &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* iptables-save/iptables-restore &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;324.5 OpenVPN&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of OpenVPN.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* OpenVPN configuration and use &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future consideration not part of current exam==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: FreeIPA and Kerberos&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Deploying Kerberos (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with deploying a Kerberos on a single domain.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Key Distribution Centre&lt;br /&gt;
* Principals&lt;br /&gt;
* Tickets&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* kinit&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* krb5kdc/kdc.conf&lt;br /&gt;
* kdb5_util&lt;br /&gt;
* rb5kdc/kadm5.acl &lt;br /&gt;
* klist&lt;br /&gt;
* kadmin, kadmin.local&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.2 FreeIPA Installation (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with FreeIPA v3.x installation process of creating a server instance.  Knowledge of the components used by FreeIPA.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* System and configuration prerequisites for installing FreeIPA&lt;br /&gt;
* FreeIPA Components: LDAP, Kerberos, PKI, DNS, Certmonger&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ipa-server-install and options&lt;br /&gt;
* ipa&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.3 Integrating FreeIPA with Samba (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to integrate with Samba for group management, Kerberized CIFS and as an AD DC with FreeIPA.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cross-realm trusts&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ipa trust-add-ad&lt;br /&gt;
* ipa config-mod&lt;br /&gt;
* net&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.4 System Security Services Daemon (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure and use SSSD manage access to remote directories and authentication mechanisms&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSSD daemon and command line tools&lt;br /&gt;
* Configuring NSS and PAM for use with SSSD&lt;br /&gt;
* Authenticate against a local, LDAP and Kerberos domain&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSSD&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Babafou</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC2AndLPIC3SummaryVersion3To4&amp;diff=2699</id>
		<title>LPIC2AndLPIC3SummaryVersion3To4</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC2AndLPIC3SummaryVersion3To4&amp;diff=2699"/>
		<updated>2013-07-16T14:21:13Z</updated>

		<summary type="html">&lt;p&gt;Babafou: added 203.1 changelist (blkid)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
=1.0 Purpose=&lt;br /&gt;
&lt;br /&gt;
This document is meant to provide a higher level overview into what&lt;br /&gt;
has changed with the objectives update for LPIC-2 and LPIC-3 exams.&lt;br /&gt;
&lt;br /&gt;
As well, this document serves to describe the fundamental change in&lt;br /&gt;
how a candidate obtains the LPIC-3 certification level.&lt;br /&gt;
&lt;br /&gt;
The exams that are affect by this update are LPIC-2 (201 and 202) as well&lt;br /&gt;
as the creation of a new LPIC-3 exam, 300, and the retirement of the &lt;br /&gt;
301 (Core) and 302 (Mixed Environment) exams.&lt;br /&gt;
&lt;br /&gt;
==1.1 Changes to the LPIC-2/LPIC-3 Programs==&lt;br /&gt;
&lt;br /&gt;
The major change to the LPIC-3 program with this release of the LPIC-2 objectives and the new 300 objectives is to allow for the certification of LPIC-3 candidates without the need for them to take the enterprise level 301 (Core) exam.&lt;br /&gt;
&lt;br /&gt;
With the creation of the new 300 exam, also called Mixed Environment, any LPIC-3 level exam will grant the candidate an LPIC-3 certification specialty.&lt;br /&gt;
&lt;br /&gt;
The only exception to this policy change is that the 302 exam will still require the 301 exam in order to obtain the LPIC-3 302 Mixed Environment certification. However, the 301 and 302 exams are to be retired making this a temporary situation.&lt;br /&gt;
&lt;br /&gt;
==1.2 Purpose for the Change to the LPIC-3 Program==&lt;br /&gt;
&lt;br /&gt;
Over the years since the LPIC-3 stream of exams has been released, it was envisioned&lt;br /&gt;
that OpenLDAP (or LDAP server knowledge, in general) and Capacity Planning topics&lt;br /&gt;
would be central knowledge required for all of the LPIC-3 level exams.  This has &lt;br /&gt;
proven not to be the case for the 303 (Security) and 304 (Virtualization and High Availability) exams.&lt;br /&gt;
&lt;br /&gt;
In addition, the expectation that an LPIC-2 holder would have some knowledge of LDAP&lt;br /&gt;
at the services level and some degree of capacity planning expertise has risen.&lt;br /&gt;
&lt;br /&gt;
==1.2  Benefits of the Change to the LPIC-3 Program==&lt;br /&gt;
&lt;br /&gt;
The main benefit to the holder of the LPIC-2 certification is that they will now be able to achieve&lt;br /&gt;
LPIC-3 status by taking any one of the available LPIC-3 exams.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=2.0 Major Universal Changes to LPIC-2 and LPIC-3=&lt;br /&gt;
&lt;br /&gt;
==2.1 Versions of Objectives==&lt;br /&gt;
&lt;br /&gt;
The new version of the objectives for the LPIC-2 exams will be 4.0.&lt;br /&gt;
&lt;br /&gt;
The version for the LPIC-3 300 exam will be 1.0 to reflect that this is a new exam and separate from the LPIC-3 301 (Core) and 302 (Mixed Environment) exams which are to be retired.&lt;br /&gt;
&lt;br /&gt;
==2.2 Weighting of Objectives==&lt;br /&gt;
&lt;br /&gt;
The weighting on the 300 exam has been normalised to 60. This means that each exam will be 60 questions long. This also means that a weighting of 3 on an objective indicates that there will be exactly 3 questions on the exam pertaining to that objective. &lt;br /&gt;
&lt;br /&gt;
==2.3 Objective Numbering==&lt;br /&gt;
&lt;br /&gt;
For the LPIC-2 exams, every attempt to maintain the objective number from the 3.5 version of the objectives has been taken.&lt;br /&gt;
&lt;br /&gt;
For the LPIC-3 300 exam, the objective numbering starts at 390.  Starting at 300 would have caused conflict with the 301 exam objective numbers which start at 300.&lt;br /&gt;
&lt;br /&gt;
==2.4 Troubleshooting Content==&lt;br /&gt;
&lt;br /&gt;
In previous releases of the objectives, troubleshooting was a large component of the exam and discrete from the subject matter.  Sometimes, the troubleshooting is in an exam different that the one with the original subject matter.&lt;br /&gt;
&lt;br /&gt;
In this release, an attempt has been made to remove the discrete troubleshooting objectives and to include them directly in the objective.  This makes it easier to track what is being tested as well as to aid in courseware and book development.&lt;br /&gt;
&lt;br /&gt;
==2.5 Minimized Content Duplication==&lt;br /&gt;
&lt;br /&gt;
Since there is some basic Samba and OpenLDAP content in the 202 exam, an effort was made to avoid duplicating that material in the 300 exam.  As such, a 300 exam candidate is expected to know the basics of OpenLDAP configuration.&lt;br /&gt;
&lt;br /&gt;
=3.0 Major Changes in LPIC-2=&lt;br /&gt;
&lt;br /&gt;
==3.1 Re-focus/Consistent Focus==&lt;br /&gt;
&lt;br /&gt;
With this release of the LPIC-2 objectives, the 201 exam now focuses on the scaling, maintenance and troubleshooting of the server.  The 202 exam now is primarily focused on core network services as well as system and some network security content.&lt;br /&gt;
&lt;br /&gt;
==3.2 New/Changed/Dropped Content==&lt;br /&gt;
&lt;br /&gt;
===3.2.1 Capacity Planning===&lt;br /&gt;
&lt;br /&gt;
The main focus of the capacity planning objectives is measuring and troubleshooting resource use on a troubled system as well as monitoring and trending the resource usage in order to avoid such situations.&lt;br /&gt;
&lt;br /&gt;
===3.2.2 Focus on the Kernel===&lt;br /&gt;
&lt;br /&gt;
With the maturity and modularity of the Linux kernel, the need to compile and, in particular, patch the kernel has decreased while the run time management requirements of the kernel and its components, such as udev, has increased.&lt;br /&gt;
&lt;br /&gt;
===3.2.3 Alternate Bootloaders===&lt;br /&gt;
&lt;br /&gt;
The notable change is that LILO has lost status as a first class bootloader and has been grouped in with other alternate loaders such as ISOLINUX and PXELINUX.&lt;br /&gt;
&lt;br /&gt;
===3.2.4 Hardware Technologies===&lt;br /&gt;
&lt;br /&gt;
The iSCSI and SMART disk monitoring has been added.&lt;br /&gt;
&lt;br /&gt;
===3.2.5 OpenLDAP Server Basics===&lt;br /&gt;
&lt;br /&gt;
A number of objectives from the 301 exam on basic OpenLDAP server setup and use has been added to the 202 exam.&lt;br /&gt;
&lt;br /&gt;
===3.2.6 Web Services===&lt;br /&gt;
&lt;br /&gt;
The Apache coverage has been logically split between configuration of Apache, in general, and configuring HTTPS.  With the explosive growth in popularity of Nginx as both a web server and&lt;br /&gt;
a reverse proxy, it has been included in the 202 exam.&lt;br /&gt;
&lt;br /&gt;
===3.2.7 MTA Changes===&lt;br /&gt;
&lt;br /&gt;
Sendmail has been dropped to the awareness level in favour of Postfix.  With the presence of Sendmail dropping to under 13% of publicly accessible mail servers, while Postfix accounts for approximately 23% of the publicly accessible mail servers, only Postfix configuration will be covered.&lt;br /&gt;
&lt;br /&gt;
===3.2.8 OpenVPN Changes===&lt;br /&gt;
&lt;br /&gt;
OpenVPN has been broken out of the 201 objective of Advanced Networking into its own objective under System Security in the 202 exam.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=3.0 Major Changes in LPIC-3=&lt;br /&gt;
&lt;br /&gt;
==3.1 Re-focus/Consistent Focus==&lt;br /&gt;
&lt;br /&gt;
With this release of the 300 Mixed Environment exam, the entire exam focuses on the essential services needed across a hetergenous network of MS and Linux system.  It is heavily based on the existing 302 Mixed Environment exam with the inclusion of advanced OpenLDAP topics.&lt;br /&gt;
&lt;br /&gt;
This exam covers all aspects of Samba, including the domain functionality and tools of both Samba 3.6 and Samba 4.  With the way that Samba 4 has been developed and released, there is still a large need to understand Samba 3.6 configuration.  The essential addition that Samba 4 gives is that it can be an Active Directory Domain Controller.&lt;br /&gt;
&lt;br /&gt;
==3.2 New/Changed/Dropped Content==&lt;br /&gt;
&lt;br /&gt;
===3.2.1 Samba 4 Content===&lt;br /&gt;
&lt;br /&gt;
Samba 4 content has been added.  In particular, in setting it up as a Active Directory Domain Controller as well as maintaining its naming service (aka DNS) and managing users and groups.&lt;br /&gt;
&lt;br /&gt;
When a question on the exam is Samba 3 or 4 specific, it will be stated.  Otherwise, the question would be valid for both versions of Samba.&lt;br /&gt;
&lt;br /&gt;
===3.2.2 OpenLDAP content===&lt;br /&gt;
&lt;br /&gt;
OpenLDAP content has been limited to the advanced topics from the 301 exam.  This includes Replication, Security and Performance tuning.&lt;br /&gt;
&lt;br /&gt;
As well, a lot of the integration of LDAP has been excluded in favour of PAM, NSS, AD and Kerberos integration.  Integration with a myiad of Unix services and NIS to LDAP migration has been dropped.&lt;br /&gt;
&lt;br /&gt;
=201 Change Summary=&lt;br /&gt;
&lt;br /&gt;
  Note: DNS services have been moved to the 202 exam to fit with the change in focus.&lt;br /&gt;
&lt;br /&gt;
Topic 200: Capacity Planning&lt;br /&gt;
&lt;br /&gt;
200.1 Measure and Troubleshoot Resource Usage (weight: 6)&lt;br /&gt;
&lt;br /&gt;
This is a combination of the 306.1 Measure Resource Usage and 306.2 Troubleshoot Resource Problems objectives in the 301 exam.&lt;br /&gt;
&lt;br /&gt;
This is a new objective.&lt;br /&gt;
&lt;br /&gt;
The original weight on the combined objectives was 8.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
200.2 Predict Future Resource Needs (weight: 2)&lt;br /&gt;
&lt;br /&gt;
This is partially based on the 306.4 Predict Future Resource Needs objective from the 301 exam with the focused changed more to monitoring and trending to predict needs.  The more mathematically rigourous analysis of needs involving queueing theory from 306.3 hasn&#039;t been included.&lt;br /&gt;
&lt;br /&gt;
This is a new objective.&lt;br /&gt;
&lt;br /&gt;
The original weight on the objective was 1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 201: Linux Kernel&lt;br /&gt;
&lt;br /&gt;
201.2 Compiling a Linux kernel (weight: 3)&lt;br /&gt;
&lt;br /&gt;
This has become and amalgamation of the 201.2 Compiling a kernel a the 201.4 Customise, build and install a custom kernel and kernel modules objectives.  The patching of kernels has been dropped.&lt;br /&gt;
&lt;br /&gt;
The combined weight of the 3 original objectives was 5.&lt;br /&gt;
&lt;br /&gt;
201.3 Kernel runtime management and troubleshooting (weight: 4)&lt;br /&gt;
&lt;br /&gt;
  Renamed from 201.5 Manage/Query kernel and kernel modules at runtime.&lt;br /&gt;
&lt;br /&gt;
This objective has also absorbed the 203.4 udev Device Management objective (weight: 1)&lt;br /&gt;
&lt;br /&gt;
The combined weight of the two original objectives was 4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 202: System Startup&lt;br /&gt;
&lt;br /&gt;
202.1 Customising SysV-init system startup (weight: 3)&lt;br /&gt;
&lt;br /&gt;
  Renamed from 202.1 Customising system startup and boot processes&lt;br /&gt;
&lt;br /&gt;
The renaming is meant to reflect its focus.  With the advent of systemd, it was necessary to indicate.&lt;br /&gt;
&lt;br /&gt;
The original weight was 4.&lt;br /&gt;
&lt;br /&gt;
202.2 System recovery (weight: 4)&lt;br /&gt;
&lt;br /&gt;
A lot more detail was included in this objective.  Both GRUB2 and GRUB Legac are covered.  Also, an awareness of UEFI is expected.&lt;br /&gt;
&lt;br /&gt;
202.3 Alternate Bootloaders (weight: 2)&lt;br /&gt;
&lt;br /&gt;
This is a combination of moving the LILO component of 213.1 Identifying boot stages and troubleshooting bootloaders to an objective to denote its lessening in importance in daily administrative tasks.  &lt;br /&gt;
&lt;br /&gt;
Additional bootloaders have also been included.&lt;br /&gt;
&lt;br /&gt;
This is a new objective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 203: Filesystem and Devices&lt;br /&gt;
&lt;br /&gt;
203.1 Operating the Linux filesystem (weight: 4)&lt;br /&gt;
&lt;br /&gt;
Added blkid.&lt;br /&gt;
&lt;br /&gt;
203.2 Maintaining a Linux filesystem (weight: 3)&lt;br /&gt;
&lt;br /&gt;
The major change has been in dropping ReiserFS in favour of Btrfs and badblocks for SMART Disk monitoring.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 204: Advanced Storage Device Administration&lt;br /&gt;
&lt;br /&gt;
204.1 Configuring RAID (weight: 3)&lt;br /&gt;
&lt;br /&gt;
The original weight was 2.&lt;br /&gt;
&lt;br /&gt;
204.2 Adjusting Storage Device Access (weight: 2)&lt;br /&gt;
&lt;br /&gt;
The inclusion of iSCSI has been made to this objective.&lt;br /&gt;
&lt;br /&gt;
The original weight was 1.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 205: Networking Configuration&lt;br /&gt;
&lt;br /&gt;
205.2 Advanced Network Configuration (weight: 4)&lt;br /&gt;
&lt;br /&gt;
OpenVPN was moved to its own objective in the 202 exam under System Security.  wireshark was just removed.&lt;br /&gt;
&lt;br /&gt;
205.3 Troubleshooting network issues (weight: 4)&lt;br /&gt;
&lt;br /&gt;
The original weight was 5.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 206: System Maintenance&lt;br /&gt;
&lt;br /&gt;
206.1 Make and install programs from source (weight: 2)&lt;br /&gt;
&lt;br /&gt;
Moved the use of patch to here from 201.3 Patching a kernel.  Lesser emphasis on compiling software, in general.&lt;br /&gt;
&lt;br /&gt;
The original weight was 4.&lt;br /&gt;
&lt;br /&gt;
206.2 Backup operations (weight: 3)&lt;br /&gt;
&lt;br /&gt;
cpio was removed from the list of backup tools.&lt;br /&gt;
&lt;br /&gt;
206.3 Notify users on system-related issues (weight: 1)&lt;br /&gt;
&lt;br /&gt;
The was renamed/renumbered from 205.4 Notify users on system-related issues for better organisation.&lt;br /&gt;
&lt;br /&gt;
=202 Change Summary=&lt;br /&gt;
&lt;br /&gt;
Topic 207: Domain Name Server&lt;br /&gt;
&lt;br /&gt;
  This entire objective has been moved from the 201 exam to help with consistency in the theme of the two exams.&lt;br /&gt;
&lt;br /&gt;
207.1 Basic DNS server configuration (weight: 3)&lt;br /&gt;
&lt;br /&gt;
The original weight of this exam was 2.&lt;br /&gt;
&lt;br /&gt;
207.2 Create and maintain DNS zones (weight: 3)&lt;br /&gt;
&lt;br /&gt;
The original weight of this exam was 2.&lt;br /&gt;
&lt;br /&gt;
207.3 Securing a DNS server (weight: 2)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 208: Web Services&lt;br /&gt;
&lt;br /&gt;
208.1 Basic Apache configuration (weight: 4)&lt;br /&gt;
&lt;br /&gt;
Renamed from 208.1 Implementing a web server to be more explicit.&lt;br /&gt;
Added vhost configuration and Redirect statements from 208.2.&lt;br /&gt;
&lt;br /&gt;
208.2 Apache configuration for HTTPS (weight: 3)&lt;br /&gt;
&lt;br /&gt;
Renamed from 208.2 Maintaining a web server to focus on its core content.&lt;br /&gt;
&lt;br /&gt;
208.3 Implementing Squid as a caching proxy (weight: 2)&lt;br /&gt;
&lt;br /&gt;
Renamed from 208.3 Implementing a proxy server.&lt;br /&gt;
Updated to Squid v3.&lt;br /&gt;
&lt;br /&gt;
The original weight was 1.&lt;br /&gt;
&lt;br /&gt;
208.4 Implementing Nginx as a web server and a reverse proxy (weight: 2)&lt;br /&gt;
&lt;br /&gt;
This is a new objective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 209: File Sharing&lt;br /&gt;
&lt;br /&gt;
209.1 Samba Server Configuration (weight: 5)&lt;br /&gt;
&lt;br /&gt;
The focus remains on Samba 3.6.&lt;br /&gt;
&lt;br /&gt;
The original weight was 4.&lt;br /&gt;
&lt;br /&gt;
209.2 NFS Server Configuration (weight: 3)&lt;br /&gt;
&lt;br /&gt;
The focus remains on NFSv3.  Awareness of NFSv4 has been added.&lt;br /&gt;
&lt;br /&gt;
The original weight was 4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 210: Network Client Management&lt;br /&gt;
&lt;br /&gt;
210.4 Configuring an OpenLDAP server (weight: 4)&lt;br /&gt;
&lt;br /&gt;
A combination of Topic 301: Concepts, Architecture and Design, 303.2 Access Control Lists in LDAP, 303.6 OpenLDAP Daemon Configuration, and  304.3 Whitepages.&lt;br /&gt;
&lt;br /&gt;
Awareness of System Security Services Daemon (SSSD) is also introduced.&lt;br /&gt;
&lt;br /&gt;
This is a new objective.&lt;br /&gt;
&lt;br /&gt;
The original combined objectives were 13.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 211: E-Mail Services&lt;br /&gt;
&lt;br /&gt;
211.1 Using e-mail servers (weight: 4)&lt;br /&gt;
&lt;br /&gt;
Dropped Sendmail to awareness level.&lt;br /&gt;
&lt;br /&gt;
The original weight was 3.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 212: System Security&lt;br /&gt;
&lt;br /&gt;
212.1 Configuring a router (weight: 3)&lt;br /&gt;
&lt;br /&gt;
Added awareness of IPv6.&lt;br /&gt;
&lt;br /&gt;
212.2 Managing FTP servers (weight: 2)&lt;br /&gt;
&lt;br /&gt;
Renamed from 212.2 Securing FTP servers.&lt;br /&gt;
&lt;br /&gt;
212.3 Secure shell (SSH) (weight: 4)&lt;br /&gt;
&lt;br /&gt;
Much of the ssh client side was dropped to avoid duplication from LPIC-1.&lt;br /&gt;
&lt;br /&gt;
212.4 Security tasks (weight: 3)&lt;br /&gt;
&lt;br /&gt;
Dropped TCP Wrappers as they are covered in LPIC-1&lt;br /&gt;
Renumbered from 212.5 (due to loss of TCP Wrapper objective).&lt;br /&gt;
&lt;br /&gt;
212.5 OpenVPN (weight: 2)&lt;br /&gt;
&lt;br /&gt;
This is a new objective.  Broken out from 205.2 Advanced Network Configuration and Troubleshooting&lt;br /&gt;
&lt;br /&gt;
  NOTE: on the old 213 Troubleshooting Topic&lt;br /&gt;
        213.1 merged into 202.2&lt;br /&gt;
        init.d dropped/redundant with 213.3&lt;br /&gt;
        213.2 merged into 201.5&lt;br /&gt;
        strings dropped&lt;br /&gt;
        ltrace to be merged with 102.3 to avoid redundancy&lt;br /&gt;
        strace to be merged with 102.3 to avoid redundancy&lt;br /&gt;
        dropped as redundant various system and daemon log files&lt;br /&gt;
        dropped Kernel syslog entries in system logs (if entry is able to be gained)&lt;br /&gt;
        213.3 dropped/overlap with LPIC-1&lt;br /&gt;
        213.4 dropped/overlap with LPIC-1&lt;br /&gt;
&lt;br /&gt;
        sysctl, /etc/sysctl.conf, /etc/sysctl.d/ moved to 201.3 Kernel runtime management and troubleshooting&lt;br /&gt;
&lt;br /&gt;
=300 Change Summary=&lt;br /&gt;
&lt;br /&gt;
  NOTE: Many of these changes occurred due to the merging of the 302 exam with parts of the 301 exam.&lt;br /&gt;
        306 (entire Topic) was merged into LPIC-2 201 exam (renumbered to 200)&lt;br /&gt;
        306.2 merged with 306.2; numbered 200.1&lt;br /&gt;
        306.3 dropped.&lt;br /&gt;
        306.4 added collectd and awareness of other monitoring solutions. renumbered to 200.2&lt;br /&gt;
&lt;br /&gt;
  NOTE: Dropped from the 302 Samba objectives are:&lt;br /&gt;
        Topic 311: Compile and Install Samba&lt;br /&gt;
        312.5 SWAT Configuration&lt;br /&gt;
        315.2 Samba Security (overlaps with other objectives)&lt;br /&gt;
        315.3 Performance Tuning&lt;br /&gt;
&lt;br /&gt;
The Samba portion of this exam was restructured into Basics, Shares, User/Group Management, Domain Integration, Name Services and Working with Linux/Windows Clients.&lt;br /&gt;
&lt;br /&gt;
390.1 OpenLDAP Replication (weight: 3)&lt;br /&gt;
&lt;br /&gt;
Renumbered from 303.3 LDAP Replication&lt;br /&gt;
&lt;br /&gt;
The original weight was 5.&lt;br /&gt;
&lt;br /&gt;
390.2 Securing the Directory (weight: 3)&lt;br /&gt;
&lt;br /&gt;
Renumbered from 303.4 Securing the Directory&lt;br /&gt;
&lt;br /&gt;
The original weight was 4.&lt;br /&gt;
&lt;br /&gt;
390.3 OpenLDAP Server Performance Tuning (weight: 2)&lt;br /&gt;
&lt;br /&gt;
Renumbered from 303.5 LDAP Server Performance Tuning&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 391: OpenLDAP as an Authentication Backend&lt;br /&gt;
&lt;br /&gt;
391.1 LDAP Integration with PAM and NSS (weight: 2)&lt;br /&gt;
&lt;br /&gt;
Renumbered from 305.1 LDAP Integration with PAM and NSS&lt;br /&gt;
&lt;br /&gt;
391.2 Integrating LDAP with Active Directory and Kerberos (weight: 2)&lt;br /&gt;
&lt;br /&gt;
Renamed/Renumbered from 305.5 Integrating LDAP with Active Directory&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 392: Samba Basics&lt;br /&gt;
&lt;br /&gt;
392.1 Samba Concepts and Architecture (weight: 2)&lt;br /&gt;
&lt;br /&gt;
This is a new objective based on component of 302 exam objectives.  Parts come from 312.1 Configure Samba &lt;br /&gt;
&lt;br /&gt;
392.2 Configure Samba (weight: 4)&lt;br /&gt;
&lt;br /&gt;
Renumbered from 312.1 Configure Samba&lt;br /&gt;
&lt;br /&gt;
The original weight was 6.&lt;br /&gt;
&lt;br /&gt;
392.3 Regular Samba Maintenance (weight: 2)&lt;br /&gt;
&lt;br /&gt;
This is a new objective.&lt;br /&gt;
&lt;br /&gt;
392.4 Troubleshooting Samba (weight: 2)&lt;br /&gt;
&lt;br /&gt;
Partially based on 310.3 Trivial Database Files and parts of 312.1 Configure Samba&lt;br /&gt;
&lt;br /&gt;
This is a new objective.&lt;br /&gt;
&lt;br /&gt;
392.5 Internationalization (weight: 1)&lt;br /&gt;
&lt;br /&gt;
Renumbered from 312.6 Internationalization&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 393: Samba Share Configuration&lt;br /&gt;
&lt;br /&gt;
393.1 File Services (weight: 4)&lt;br /&gt;
&lt;br /&gt;
Based on 312.2 File Services&lt;br /&gt;
&lt;br /&gt;
393.2 Linux File System and Share/Service Permissions (weight: 3)&lt;br /&gt;
&lt;br /&gt;
Based on 315.1 Linux File System and Share/Service Permissions&lt;br /&gt;
Added more details and VFS to store Windows ACLs&lt;br /&gt;
&lt;br /&gt;
393.3 Print Services (weight: 2)&lt;br /&gt;
&lt;br /&gt;
Renumbered from 312.3 Print Services&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 394: Samba User and Group Management&lt;br /&gt;
&lt;br /&gt;
394.1 Managing User Accounts and Groups (weight: 4)&lt;br /&gt;
&lt;br /&gt;
Renumbered from 313.1 Managing User Accounts and Groups&lt;br /&gt;
 &lt;br /&gt;
394.2 Authentication, Authorization and Winbind (weight: 5)&lt;br /&gt;
&lt;br /&gt;
Renumbered from 313.2 Authentication and Authorization&lt;br /&gt;
&lt;br /&gt;
Merged in 313.3 Winbind&lt;br /&gt;
&lt;br /&gt;
The original weight combined weight was 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 395: Samba Domain Integration&lt;br /&gt;
&lt;br /&gt;
395.1 Samba as a PDC and BDC (weight: 3)&lt;br /&gt;
&lt;br /&gt;
Renumbered from 312.4 Domain Controller&lt;br /&gt;
&lt;br /&gt;
The original weight was 4&lt;br /&gt;
&lt;br /&gt;
395.2 Samba4 as an AD compatible Domain Controller (weight: 3)&lt;br /&gt;
&lt;br /&gt;
This is a new objective.&lt;br /&gt;
&lt;br /&gt;
395.3 Configure Samba as a Domain Member Server (weight: 3)&lt;br /&gt;
&lt;br /&gt;
This is a new objective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 396: Samba Name Services&lt;br /&gt;
&lt;br /&gt;
396.1 NetBIOS and WINS (weight: 3)&lt;br /&gt;
&lt;br /&gt;
Renumbered from 314.2 NetBIOS and WINS&lt;br /&gt;
&lt;br /&gt;
Original weight was 7.&lt;br /&gt;
&lt;br /&gt;
396.2 Active Directory Name Resolution (weight: 2)&lt;br /&gt;
&lt;br /&gt;
This is a new objective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topic 397: Working with Linux and Windows Clients&lt;br /&gt;
&lt;br /&gt;
397.1 CIFS Integration (weight: 3)&lt;br /&gt;
&lt;br /&gt;
Renumbered from 314.1 CIFS Integration&lt;br /&gt;
&lt;br /&gt;
397.2 Working with Windows Clients (weight: 2)&lt;br /&gt;
&lt;br /&gt;
Renumbered from 314.4 Working with Windows Clients&lt;br /&gt;
&lt;br /&gt;
The original weight was 4.&lt;/div&gt;</summary>
		<author><name>Babafou</name></author>
	</entry>
</feed>