<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.lpi.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=GMatthewRice</id>
	<title>LPI Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.lpi.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=GMatthewRice"/>
	<link rel="alternate" type="text/html" href="https://wiki.lpi.org/wiki/Special:Contributions/GMatthewRice"/>
	<updated>2026-05-14T00:29:39Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.3</generator>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5781</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5781"/>
		<updated>2023-10-23T15:57:01Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 201.1 Linux Kernel (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
The [[LPIC-2_Objectives_V4|version 4.5 of the LPIC-2 Objectives]] are still online.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux startup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialization and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;202.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;202.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Make and Install Programs from Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Backup Operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 206: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;206.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;206.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;206.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and Maintain DNS Zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS Server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP Configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP Client Usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a Router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure Shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security Tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5779</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5779"/>
		<updated>2023-10-23T15:50:45Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* Version Information */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
The [[LPIC-2_Objectives_V4|version 4.5 of the LPIC-2 Objectives]] are still online.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialization and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and Install Programs from Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup Operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and Maintain DNS Zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS Server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP Configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP Client Usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a Router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure Shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security Tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5778</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5778"/>
		<updated>2023-10-23T15:50:28Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* Version Information */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The [[LPIC-2_Objectives_V4|version 4.5 of the LPIC-2 Objectives]] are still online.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialization and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and Install Programs from Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup Operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and Maintain DNS Zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS Server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP Configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP Client Usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a Router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure Shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security Tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5777</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5777"/>
		<updated>2023-10-23T15:49:25Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 200.3 Bootloaders and System Recovery (weight: 4) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialization and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and Install Programs from Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup Operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and Maintain DNS Zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS Server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP Configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP Client Usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a Router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure Shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security Tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5776</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5776"/>
		<updated>2023-10-23T15:48:56Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 212.4 Security tasks (weight: 4) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and Install Programs from Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup Operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and Maintain DNS Zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS Server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP Configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP Client Usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a Router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure Shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security Tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5775</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5775"/>
		<updated>2023-10-23T15:48:42Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 212.3 Advanced Secure shell (SSH) (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and Install Programs from Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup Operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and Maintain DNS Zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS Server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP Configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP Client Usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a Router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure Shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5774</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5774"/>
		<updated>2023-10-23T15:48:28Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 212.1 Configuring a router (weight: 4) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and Install Programs from Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup Operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and Maintain DNS Zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS Server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP Configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP Client Usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a Router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5773</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5773"/>
		<updated>2023-10-23T15:48:08Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 210.3 LDAP client usage (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and Install Programs from Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup Operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and Maintain DNS Zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS Server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP Configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP Client Usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5772</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5772"/>
		<updated>2023-10-23T15:47:53Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 210.2 PAM authentication (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and Install Programs from Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup Operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and Maintain DNS Zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS Server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP Configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP client usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5771</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5771"/>
		<updated>2023-10-23T15:47:40Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 210.1 DHCP configuration (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and Install Programs from Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup Operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and Maintain DNS Zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS Server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP Configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP client usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5770</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5770"/>
		<updated>2023-10-23T15:47:18Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 207.3 Securing a DNS server (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and Install Programs from Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup Operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and Maintain DNS Zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS Server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP client usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5769</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5769"/>
		<updated>2023-10-23T15:47:04Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 207.2 Create and maintain DNS zones (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and Install Programs from Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup Operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and Maintain DNS Zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP client usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5768</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5768"/>
		<updated>2023-10-23T15:46:37Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 207.1 Basic DNS server configuration (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and Install Programs from Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup Operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and maintain DNS zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP client usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5767</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5767"/>
		<updated>2023-10-23T15:46:10Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 204.2 Backup operations (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and Install Programs from Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup Operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS server configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and maintain DNS zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP client usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5766</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5766"/>
		<updated>2023-10-23T15:45:45Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 204.1 Make and install programs from source (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and Install Programs from Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS server configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and maintain DNS zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP client usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5765</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5765"/>
		<updated>2023-10-23T15:45:14Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 205.1 Runtime networking configuration (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime Networking Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and install programs from source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS server configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and maintain DNS zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP client usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5764</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5764"/>
		<updated>2023-10-23T15:44:39Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 203.1 Operating the Linux filesystem (weight: 4) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux Filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime networking configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and install programs from source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS server configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and maintain DNS zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP client usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5763</id>
		<title>LPIC-2 Objectives V5.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V5.0&amp;diff=5763"/>
		<updated>2023-10-23T15:44:09Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 200.3 Bootloaders and System recovery (weight: 4) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are A DRAFT version 5.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives== &lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V5.0|English]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Linux Kernel (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the startup of a Linux system, including all relevant components. Candidates should understand the architecture of the Linux kernel and how it allows device access. Furthermore, candidates should be able to manage Linux kernel modules, updates of the Linux kernel and use DKMS to install kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux starup process&lt;br /&gt;
&lt;br /&gt;
* Understanding the Linux kernel architecture, including kernel modules&lt;br /&gt;
&lt;br /&gt;
* Linux kernel release and versioning scheme&lt;br /&gt;
&lt;br /&gt;
* Linux kernel modules&lt;br /&gt;
&lt;br /&gt;
* DKMS&lt;br /&gt;
&lt;br /&gt;
* udev&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Bootloader&lt;br /&gt;
&lt;br /&gt;
* Kernel&lt;br /&gt;
&lt;br /&gt;
* Initramfs&lt;br /&gt;
&lt;br /&gt;
* Init&lt;br /&gt;
&lt;br /&gt;
* Udev&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* Module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* modules.dep&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* modinfo&lt;br /&gt;
&lt;br /&gt;
* modprobe&lt;br /&gt;
&lt;br /&gt;
* insmod&lt;br /&gt;
&lt;br /&gt;
* lsmod&lt;br /&gt;
&lt;br /&gt;
* rmmod&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* lshw&lt;br /&gt;
&lt;br /&gt;
* lspci&lt;br /&gt;
&lt;br /&gt;
* lsusb&lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev&lt;br /&gt;
&lt;br /&gt;
* /proc&lt;br /&gt;
&lt;br /&gt;
* /proc/sys&lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.conf.d/&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Sytemd Startup Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure the startup of a Linux system using system. This includes understanding the most important systemd concepts, including various unit types used to manage the system startup, as well as tools to configure the system startup.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd concepts&lt;br /&gt;
&lt;br /&gt;
* Systemd unit types (Service, Socket, Target, Slice)&lt;br /&gt;
&lt;br /&gt;
* Systemd System and User Slices&lt;br /&gt;
&lt;br /&gt;
* Systemd Override and Drop-In Units&lt;br /&gt;
&lt;br /&gt;
* Awareness of SystemV init and OpenRC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.3 Bootloaders and System Recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2&lt;br /&gt;
&lt;br /&gt;
* GRUB shell&lt;br /&gt;
&lt;br /&gt;
* GRUB configuration&lt;br /&gt;
&lt;br /&gt;
* GRUB password security&lt;br /&gt;
&lt;br /&gt;
* systemd-boot installation&lt;br /&gt;
&lt;br /&gt;
* systemd-boot configuration&lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialization and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* bootctl&lt;br /&gt;
&lt;br /&gt;
* loader.conf&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* efivar&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.4 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE and iPXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types as well as using systemd mount, swap and automount units.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* The concept of systemd mount and swap units&lt;br /&gt;
&lt;br /&gt;
* Configuring systemd automount units&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Storage Device Integrity and Encryption (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to maintain the integrity of storage device and encrypt the information stored on a storage device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Query, understand and monitor SMART values&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts and disk and file system encryption&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of dm-crypt and LUKS&lt;br /&gt;
&lt;br /&gt;
* Use LUKS to encrypt storage devices&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (iSCSI, AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
* Awareness of WWID, WWN, LUN numbers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smartd&lt;br /&gt;
&lt;br /&gt;
* smartctl&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities&lt;br /&gt;
&lt;br /&gt;
* Understanding the RAID levels 0, 1, 5 and 10&lt;br /&gt;
&lt;br /&gt;
* Awareness of the RAID levels 6, 7 and 50&lt;br /&gt;
&lt;br /&gt;
* Recovery of a failed RAID device&lt;br /&gt;
&lt;br /&gt;
* Replacement of a failed disk within a RAID device&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Logical Volume Manager (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/&lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Basic ZFS Operations (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and managa a ZFS file system. This includes managing subvolumes and awareness of ZFS raid features. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of ZFS&lt;br /&gt;
* Create and use a ZFS file system&lt;br /&gt;
* Create and manage ZFS subvolumes, including quota&lt;br /&gt;
* Awareness of ZFS RAID features&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VDEV&lt;br /&gt;
* Zpool&lt;br /&gt;
* zfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Advanced Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Runtime networking configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using iproute2. This includes managing links, addresses and routes for IPv4 and IPv6.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand IPv4 and IPv6 addressing and routing&lt;br /&gt;
&lt;br /&gt;
* Manage wireless network interfaces&lt;br /&gt;
&lt;br /&gt;
* Manage links, addresses and routes using iproute2&lt;br /&gt;
&lt;br /&gt;
* Awareness of VLANs, bridges and bonds&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
* wpa_supplicant&lt;br /&gt;
&lt;br /&gt;
* iwd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Persistent Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure wired and wireless network device using NetworkMananger as well as systemd-networkd. This includes managing links, addresses and routes for IPv4 and IPv6. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of NetworkMananger&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and configuration of systemd-networkd and systemd-resolved&lt;br /&gt;
&lt;br /&gt;
* Configure manual IPv4 and IPv6 addresses and routes&lt;br /&gt;
&lt;br /&gt;
* Configure automatic IPv4 and IPv6 configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nmcli&lt;br /&gt;
&lt;br /&gt;
* nmtui&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* networkctl&lt;br /&gt;
&lt;br /&gt;
* resolvectl&lt;br /&gt;
&lt;br /&gt;
* hostnamectl&lt;br /&gt;
&lt;br /&gt;
* Systemd network units&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Network Troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Determine what network configuration framework a system use&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Identify common issues in network configuration and relate symptoms to configuration issues&lt;br /&gt;
&lt;br /&gt;
* Awareness of ifupdown, Wicked and netplan&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ping&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* /etc/network/interfaces, /etc/sysconfig/network-scripts&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Make and install programs from source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Backup operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the conepts of backups, including common backup strategies&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Understand application aspects of backup consistency&lt;br /&gt;
&lt;br /&gt;
* Understand how to leverage file system or block device snapshots for backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of borg, including features and use cases&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, disks or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups using Linux standard tools&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Resource Management (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource consumption. This includes identifying and troubleshooting resource problems. Furthermore, candidates should be able to restrict the consumption of hardware resources using systemd resource management features.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU, memory, disk and I/O usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
* Manage resource consumption of systemd slices, scopes and services&lt;br /&gt;
&lt;br /&gt;
* Awareness of Cgroups&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar&lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-cgls&lt;br /&gt;
&lt;br /&gt;
* CPUWeight, CPUQuota, CPUQuotaPeriodSec, AllowedCPUs&lt;br /&gt;
&lt;br /&gt;
* MemoryMin, MemoryLow, MemoryHigh, MemoryMax&lt;br /&gt;
&lt;br /&gt;
* IOWeight, IODeviceWeight, IOReadBandwidthMax, IOReadIOPSMax, IODeviceLatencyTargetSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Ansible Basics (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use Asible to perform basic system configuration management and administration.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Understand the requirements of Ansible on a target node&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of cloud-init&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Ansible Modules (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use important and commonly used Ansible modules to automate basic Linux system administration tasks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* file&lt;br /&gt;
&lt;br /&gt;
* copy&lt;br /&gt;
&lt;br /&gt;
* template&lt;br /&gt;
&lt;br /&gt;
* ini_file&lt;br /&gt;
&lt;br /&gt;
* lineinfile&lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
* replace&lt;br /&gt;
&lt;br /&gt;
* user&lt;br /&gt;
&lt;br /&gt;
* group&lt;br /&gt;
&lt;br /&gt;
* command&lt;br /&gt;
&lt;br /&gt;
* shell&lt;br /&gt;
&lt;br /&gt;
* service&lt;br /&gt;
&lt;br /&gt;
* systemd&lt;br /&gt;
&lt;br /&gt;
* cron&lt;br /&gt;
&lt;br /&gt;
* apt&lt;br /&gt;
&lt;br /&gt;
* debconf&lt;br /&gt;
&lt;br /&gt;
* yum&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* debug&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Ansible Templates and Variables (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to understand variables and facts and Ansible and write simple Jinja2 templates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Set and use variables and facts&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Jinja2 syntax&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS server configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* named.conf&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and maintain DNS zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure a BIND DNS server. This objective includes secure exchange of data between DNS servers. Furthermore, this topic includes awareness of DNSSEC and DANE.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 HTTP Protocol (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the basics of the HTTP procotol. This includes major differences of HTTP versions, important headers as well as how HTTP is used in various other standards. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of HTTP version 1.1 and HTTP version 2.0&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Application Server Integration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTP methods and status codes&lt;br /&gt;
&lt;br /&gt;
* HTTP headers&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies&lt;br /&gt;
&lt;br /&gt;
* CGI, FastCGI, WSGI, AJP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 HTTPS, PKI and TLS (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand how X.509 Public Key Infrastructures work. This includes procuring X.509 certifications from an existing certificate authority, as well as understanding the cryptographic basics involved in PKI. Furthermore candidates should understand the principles of TLS, in order to be able to configure various services to use TLS for connection encryption. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Cyptographic concenpts&lt;br /&gt;
&lt;br /&gt;
* TLS and SNI&lt;br /&gt;
&lt;br /&gt;
* X.509 certificates, including important fields for HTTPS&lt;br /&gt;
&lt;br /&gt;
* PKI&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certificate procurement&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, awareness of insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Symetric and asymetric cryptography&lt;br /&gt;
&lt;br /&gt;
* Hash functions&lt;br /&gt;
&lt;br /&gt;
* Key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Perfect forward secrecy&lt;br /&gt;
&lt;br /&gt;
* Certification Authorities&lt;br /&gt;
&lt;br /&gt;
* ACME, including challenges&lt;br /&gt;
&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
* certbot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Apache HTTPD Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using Apache HTTPD. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD 2.4 architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache HTTPD Virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* mod_php and PHP FPM&lt;br /&gt;
&lt;br /&gt;
* mod_python and Python WSGI&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Awareness of mod_security and mod_evasive&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 NGINX Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server using NGINX. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NGINX architecture, configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* NGINX virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* HTTPS configuration for IP and name-based virtual hosts&lt;br /&gt;
&lt;br /&gt;
* NGINX log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configure redirects&lt;br /&gt;
&lt;br /&gt;
* Configure reverse proxies for HTTP, FastCGI, WSGI and AJP&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba File Server Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS file and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-level security&lt;br /&gt;
&lt;br /&gt;
* Active Directory membership&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba, smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 and 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to specific hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv4&lt;br /&gt;
&lt;br /&gt;
* ISC DHCP configuration files, terms and utilities for DHCPv6&lt;br /&gt;
&lt;br /&gt;
* radvd configuration files, terms and utilities for IPv6 SLAAC&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* Subnet and host-specific DHCP range setup &lt;br /&gt;
&lt;br /&gt;
* DHCPv4 and DHCPv6 options for PXE boot&lt;br /&gt;
&lt;br /&gt;
* Awareness of KEA&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* dhcpd6.leases&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_pwquality, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP client usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand key concepts of LDAP&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Authentication Mechanisms and Standards (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should bei understand the main principles of various authentication mechanisms and standards, including their use in Linux and Linux-based services.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Directory service and authentication standards&lt;br /&gt;
&lt;br /&gt;
* Domains and authentication management systems&lt;br /&gt;
&lt;br /&gt;
* Web-based authentication standards&lt;br /&gt;
&lt;br /&gt;
* Multi-factor authentication and one-time passwords (OTP)&lt;br /&gt;
&lt;br /&gt;
* Understanding the most important properties and use cases of relevant procotols and standards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP&lt;br /&gt;
&lt;br /&gt;
* Kerberos 5&lt;br /&gt;
&lt;br /&gt;
* Active Directory&lt;br /&gt;
&lt;br /&gt;
* FreeIPA&lt;br /&gt;
&lt;br /&gt;
* Oauth2&lt;br /&gt;
&lt;br /&gt;
* OpenID Connect&lt;br /&gt;
&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
* pam_oath and pam_otp&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: Email Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using Email Servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an email server, including the configuration of email aliases, email quotas and virtual email domains. This objective includes configuring internal email relays and monitoring email servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Configure Postfix for SASL authentication using cyrus-sasl&lt;br /&gt;
&lt;br /&gt;
* Configure nullmailer for email relay&lt;br /&gt;
&lt;br /&gt;
* Awareness of exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
* /etc/sasl2/smtpd.conf&lt;br /&gt;
&lt;br /&gt;
* testsaslauthd&lt;br /&gt;
&lt;br /&gt;
* nullmailer/me&lt;br /&gt;
&lt;br /&gt;
* nullmailer/remotes&lt;br /&gt;
&lt;br /&gt;
* nullmailer/defaultdomain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing Email Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client email management software to filter, sort and monitor incoming user email. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a router (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
* Understand the main concepts of firewalld&lt;br /&gt;
&lt;br /&gt;
* Use firewalld to implement a simple edge node and router firewall&lt;br /&gt;
&lt;br /&gt;
* Awareness of ufw and firewalld&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
* firewall-cmd&lt;br /&gt;
&lt;br /&gt;
* /etc/firewalld/firewalld.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Advanced Secure shell (SSH) (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys using an SSH CA. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Using SSH to forward local and remote ports&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of an SSH CA&lt;br /&gt;
&lt;br /&gt;
* Use an SSH CA to manage SSH keys&lt;br /&gt;
&lt;br /&gt;
* Awareness of SSH Banners&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication&lt;br /&gt;
&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
&lt;br /&gt;
* AuthorizedPrincipalsFile&lt;br /&gt;
&lt;br /&gt;
* TrustedUserCAKeys&lt;br /&gt;
&lt;br /&gt;
* Banner&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security tasks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure the services running on a Linux server. This includes leveraging various systemd settings to manage the runtime configuration of services. Furthermore, the candidate is expected to scan systems for open ports and implement fail2ban.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Understand and configure fail2ban&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units to run with specific privileges&lt;br /&gt;
&lt;br /&gt;
* Configure systemd units with a private /tmp directory&lt;br /&gt;
&lt;br /&gt;
* Use systemd to restrict device access of services&lt;br /&gt;
&lt;br /&gt;
* Use systemd to manage network accessiability of services&lt;br /&gt;
&lt;br /&gt;
* Awareness of capabilitites and Cgroups&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* User&lt;br /&gt;
&lt;br /&gt;
* Group&lt;br /&gt;
&lt;br /&gt;
* SupplementaryGroups&lt;br /&gt;
&lt;br /&gt;
* PrivateTmp&lt;br /&gt;
&lt;br /&gt;
* DeviceAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressAllow&lt;br /&gt;
&lt;br /&gt;
* IPAddressDeny&lt;br /&gt;
&lt;br /&gt;
* RestrictNetworkInterfaces&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 Virtual Private Networks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of a virtual private network&lt;br /&gt;
&lt;br /&gt;
* Understand the different requirements of a site-to-site and an end user VPN&lt;br /&gt;
&lt;br /&gt;
* Wireguard&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVPN&lt;br /&gt;
&lt;br /&gt;
* Awareness of the main differences between OpenVPN and Wireguard&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/wireguard/&lt;br /&gt;
&lt;br /&gt;
* wg&lt;br /&gt;
&lt;br /&gt;
* wg-quick&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=DevOps_Tools_Engineer_Objectives_V2.0&amp;diff=5744</id>
		<title>DevOps Tools Engineer Objectives V2.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=DevOps_Tools_Engineer_Objectives_V2.0&amp;diff=5744"/>
		<updated>2023-06-22T12:23:27Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 705.2 Prometheus Monitoring (weight: 6) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This is a required exam for the Linux Professional Institute DevOps Tools Engineer certification. It covers basic skills in using tools commonly used to implement DevOps.&lt;br /&gt;
&lt;br /&gt;
This page covers the currently released objective for the Linux Professional Institute DevOps Tools Engineer certification. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
The certification holder is either a professional software developer or a professional system administrator who is involved in the production of IT solutions which require a robust and efficient process to get from original source materials to a final deployed or distributable product or service with a particular focus on using Open Source technology. The certification holder has the ability to create, deliver and operate software using collaborative methods which address aspects of software development as well as system administration. In particular, the certification holder is adept at bridging the gap between the development and operations of a solution or product. The certification holder understands how these tools facilitate development and operational tasks in the delivery of stable, scalable and up to date services to users and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 2.0.0. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[DevOps_Tools_Engineer_Objectives_V2.0|English]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams and Requirements==&lt;br /&gt;
&lt;br /&gt;
The Linux Professional Institute DevOps Tools Engineer certification is awarded after passing this exam. There is no requirement to possess any other certifications. However, LPI recommends that all Linux Professional Institute DevOps Tools Engineers maintain at least one active certification in either system administration or software development. This certification should be at a level equivalent to LPIC-1.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;701 Software Engineering&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.1 Modern Software Development (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to design software solutions suitable for modern runtime environments. Candidates should understand how services handle data persistence, sessions, status information, transactions, concurrency, security, performance, availability, scaling, load balancing, messaging, monitoring and APIs. Furthermore, candidates should understand the implications of agile and DevOps on software development.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and design service based applications&lt;br /&gt;
&lt;br /&gt;
* Understand common API concepts and standards&lt;br /&gt;
&lt;br /&gt;
* Understand aspects of data storage, service status and session handling&lt;br /&gt;
&lt;br /&gt;
* Design software to be run in containers&lt;br /&gt;
&lt;br /&gt;
* Design software to be deployed to cloud services&lt;br /&gt;
&lt;br /&gt;
* Awareness of risks in the migration and integration of monolithic legacy software&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of agile software development&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of DevOps and its implications to software developers and operators&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* REST, JSON&lt;br /&gt;
&lt;br /&gt;
* Service Oriented Architectures (SOA)&lt;br /&gt;
&lt;br /&gt;
* Microservices&lt;br /&gt;
&lt;br /&gt;
* Immutable servers&lt;br /&gt;
&lt;br /&gt;
* Loose coupling&lt;br /&gt;
&lt;br /&gt;
* Cross site scripting, SQL injections, verbose error reports, API authentication, consistent enforcement of transport encryption&lt;br /&gt;
&lt;br /&gt;
* CORS headers and CSRF tokens&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.2 Standard Components and Platforms for Software (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand services offered by common cloud platforms. They should be able to include these services in their application architectures and deployment toolchains and understand the required service configurations. Furthermore, the candidate should be aware of the commonly used open source implementations of the various services.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of object storage&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of relational and NoSQL databases&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of message brokers and message queues&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of big data services&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of application runtimes / PaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of hosted applications / SaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of function applications / FaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of content delivery networks&lt;br /&gt;
&lt;br /&gt;
* Awareness of identity and access management in cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Objects, Buckets, ACLs, S3&lt;br /&gt;
&lt;br /&gt;
* MariaDB, MySQL, PostgreSQL,&lt;br /&gt;
&lt;br /&gt;
* Redis, MongoDB, InfluxDB&lt;br /&gt;
&lt;br /&gt;
* Elasticsearch and OpenSearch&lt;br /&gt;
&lt;br /&gt;
* Kafka, MQTT&lt;br /&gt;
&lt;br /&gt;
* IAM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.3 Source Code Management (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to use Git to manage and share source code. This includes creating and contributing to a repository as well as the usage of tags, branches and remote repositories. Furthermore, the candidate should be able to merge files and resolve merging conflicts. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand Git concepts and repository structure&lt;br /&gt;
&lt;br /&gt;
* Manage files within a Git repository&lt;br /&gt;
&lt;br /&gt;
* Manage branches and tags&lt;br /&gt;
&lt;br /&gt;
* Work with remote repositories and branches as well as submodules&lt;br /&gt;
&lt;br /&gt;
* Merge files and branches&lt;br /&gt;
&lt;br /&gt;
* Awareness of SVN and CVS, including concepts of centralized and distributed SCM solutions&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* .gitignore&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.4 Continuous Integration and Continuous Delivery (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the principles and components of a continuous integration and continuous delivery pipeline. Candidates should understand how CI/CD pipelines support the development and release of software and how they integrate with source code repositories and the target runtime environment. Furthermore, candidates should be aware of commonly used CI/CD platforms.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Continuous Integration and Continuous Delivery&lt;br /&gt;
&lt;br /&gt;
* Understand the components of a CI/CD pipeline, including builds, unit, integration and acceptance tests, artifact management, delivery and deployment&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of GitOps&lt;br /&gt;
&lt;br /&gt;
* Understand the role of build artifacts and caches&lt;br /&gt;
&lt;br /&gt;
* Understand deployment best practices&lt;br /&gt;
&lt;br /&gt;
* Awareness of Jenkins and Gitlab CI&lt;br /&gt;
&lt;br /&gt;
* Awareness of Artifactory and Nexus&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Declarative Pipeline&lt;br /&gt;
&lt;br /&gt;
* Production, Staging and Development Environments&lt;br /&gt;
&lt;br /&gt;
* Feature toggles&lt;br /&gt;
&lt;br /&gt;
* Preview releases&lt;br /&gt;
&lt;br /&gt;
* Reconciliation loops&lt;br /&gt;
&lt;br /&gt;
* A/B testing&lt;br /&gt;
&lt;br /&gt;
* Blue-green and canary deployment&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.5 Software Composition, Licensing and Open Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the principles of software licenses. This includes how software from multiple authors and sources are combined to implement a specific service and how licensing affects such compositions. Furthermore, the candidate should understand the concepts of open source software, including the most important aspects of common open source licenses.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand how an application is build out of multiple software components&lt;br /&gt;
&lt;br /&gt;
* Awareness of dependency managers like NPM, gradle or composer&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts proprietary and open source software&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of open source software licenses&lt;br /&gt;
&lt;br /&gt;
* Awareness of commonly used open source licenses (GPL, LGPL, AGPL, BSD, MIT and Apache License)&lt;br /&gt;
&lt;br /&gt;
* Awareness of license compatibility and multi licensing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software libraries&lt;br /&gt;
&lt;br /&gt;
* Software Bill Of Materials&lt;br /&gt;
&lt;br /&gt;
* Proprietary software&lt;br /&gt;
&lt;br /&gt;
* Open Source Software and Free Software&lt;br /&gt;
&lt;br /&gt;
* Copyleft open source software licenses&lt;br /&gt;
&lt;br /&gt;
* Permissive open source software licenses&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;702 Application Container&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.1 Application Container Management (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to operate Docker and Podman containers. This includes creating and interacting with containers as well as connecting containers to networks and storage volumes.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the Docker and Podman architecture&lt;br /&gt;
&lt;br /&gt;
* Use existing images from an OCI registry&lt;br /&gt;
&lt;br /&gt;
* Operate and access containers&lt;br /&gt;
&lt;br /&gt;
* Understand Docker networking concepts, including overlay networks&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of DNS service discovery&lt;br /&gt;
&lt;br /&gt;
* Connect container to container networks and use DNS for service discovery&lt;br /&gt;
&lt;br /&gt;
* Understand Docker storage concepts&lt;br /&gt;
&lt;br /&gt;
* Use Docker volumes for shared and persistent container storage&lt;br /&gt;
&lt;br /&gt;
* Awareness of rootless containers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker container *&lt;br /&gt;
&lt;br /&gt;
* docker network *&lt;br /&gt;
&lt;br /&gt;
* docker image *&lt;br /&gt;
&lt;br /&gt;
* docker volume *&lt;br /&gt;
&lt;br /&gt;
* podman container *&lt;br /&gt;
&lt;br /&gt;
* podman network *&lt;br /&gt;
&lt;br /&gt;
* podman image *&lt;br /&gt;
&lt;br /&gt;
* podman volume *&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.2 Container Orchestration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to run and manage multiple containers that work together to provide a service. This includes the orchestration of Docker containers using Docker Compose.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the application model of Docker Compose and Podman Compose&lt;br /&gt;
&lt;br /&gt;
* Create and run Docker Compose Files (version 3 or later)&lt;br /&gt;
&lt;br /&gt;
* Define services, networks and volumes, along with their commonly used properties, in Docker Compose files&lt;br /&gt;
&lt;br /&gt;
* Use Docker Compose to update running containers to newer images&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker compose&lt;br /&gt;
&lt;br /&gt;
* podman-compose&lt;br /&gt;
&lt;br /&gt;
* docker-compose.yml&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.3 Container Image Building (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to set up a runtime environment for containers. This includes running containers on a local workstation as well as setting up a dedicated container host. Furthermore, candidates should be aware of other container infrastructures, storage, networking and container specific security aspects. This objective covers the feature set of Docker version 17.06 or later and Docker Machine 0.12 or later.&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to build OCI container images. This includes creating Dockerfiles or Containerfiles, building containers and publishing container images on an existing OCI registry.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create Dockerfiles and build images from Dockerfiles&lt;br /&gt;
&lt;br /&gt;
* Understand OCI image names&lt;br /&gt;
&lt;br /&gt;
* Upload images to a Docker registry&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of image scanners&lt;br /&gt;
&lt;br /&gt;
* Understand security risks of container virtualization and container images and how to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Awareness Docker buildx, Docker Buildkit, Podman build and Buildah&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker image *&lt;br /&gt;
&lt;br /&gt;
* docker login&lt;br /&gt;
&lt;br /&gt;
* Dockerfile&lt;br /&gt;
&lt;br /&gt;
* Containerfile&lt;br /&gt;
&lt;br /&gt;
* .dockerignore&lt;br /&gt;
&lt;br /&gt;
* FROM&lt;br /&gt;
&lt;br /&gt;
* COPY&lt;br /&gt;
&lt;br /&gt;
* ADD&lt;br /&gt;
&lt;br /&gt;
* RUN&lt;br /&gt;
&lt;br /&gt;
* VOLUME&lt;br /&gt;
&lt;br /&gt;
* EXPOSE&lt;br /&gt;
&lt;br /&gt;
* USER&lt;br /&gt;
&lt;br /&gt;
* WORKDIR&lt;br /&gt;
&lt;br /&gt;
* ENV&lt;br /&gt;
&lt;br /&gt;
* ARG&lt;br /&gt;
&lt;br /&gt;
* CMD&lt;br /&gt;
&lt;br /&gt;
* ENTRYPOINT&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;703 Kubernetes&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.1 Kubernetes Architecture and Usage (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the major components of Kubernetes. Furthermore, candidates should be able to interact with an existing Kubernetes platform to retrieve information about the current Kubernetes state, and create, modify and delete resources.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the major components and services in a Kubernetes cluster&lt;br /&gt;
&lt;br /&gt;
* Configure kubectl to use an existing Kubernetes cluster&lt;br /&gt;
&lt;br /&gt;
* Use kubectl to get information about Kubernetes resources&lt;br /&gt;
&lt;br /&gt;
* Use kubectl to create, modify and delete resources&lt;br /&gt;
&lt;br /&gt;
* Awareness of Kubernetes Operators&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* API-Server, etcd, Controller Manager, Scheduler&lt;br /&gt;
&lt;br /&gt;
* ~/.kube/config&lt;br /&gt;
&lt;br /&gt;
* kubectl get&lt;br /&gt;
&lt;br /&gt;
* kubectl describe&lt;br /&gt;
&lt;br /&gt;
* kubectl apply&lt;br /&gt;
&lt;br /&gt;
* kubectl create&lt;br /&gt;
&lt;br /&gt;
* kubectl run&lt;br /&gt;
&lt;br /&gt;
* kubectl expose &lt;br /&gt;
&lt;br /&gt;
* kubectl scale&lt;br /&gt;
&lt;br /&gt;
* kubectl set&lt;br /&gt;
&lt;br /&gt;
* kubectl edit&lt;br /&gt;
&lt;br /&gt;
* kubectl explain&lt;br /&gt;
&lt;br /&gt;
* kubectl config&lt;br /&gt;
&lt;br /&gt;
* kubectl logs&lt;br /&gt;
&lt;br /&gt;
* kubectl exec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.2 Basic Kubernetes Operations (weight: 7)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 7&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to set up applications running on Kubernetes. This includes understanding the most important kinds of Kubernetes resources, including their most important properties.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the use of YAML files to declare Kubernetes resources&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of a Pod&lt;br /&gt;
&lt;br /&gt;
* Understanding how to use Deployments, including scaling and rolling updates&lt;br /&gt;
&lt;br /&gt;
* Understanding how to make services accessible using Services and Ingress&lt;br /&gt;
&lt;br /&gt;
* Understanding how to use storage using PersistentVolumeClaims&lt;br /&gt;
&lt;br /&gt;
* Awareness of other Kubernetes orchestration resources, i.e. DaemonSets, StatefulSets, Jobs and CronJobs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Pods&lt;br /&gt;
&lt;br /&gt;
* ReplicaSets&lt;br /&gt;
&lt;br /&gt;
* Deployments&lt;br /&gt;
&lt;br /&gt;
* Services&lt;br /&gt;
&lt;br /&gt;
* Ingress&lt;br /&gt;
&lt;br /&gt;
* PersistentVolumeClaims&lt;br /&gt;
&lt;br /&gt;
* ConfigMaps&lt;br /&gt;
&lt;br /&gt;
* Secrets&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.3 Kubernetes Package Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to use Helm to install software on Kubernetes.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of Charts, Releases and Values&lt;br /&gt;
&lt;br /&gt;
* Installation, upgrading and uninstalling software using Helm&lt;br /&gt;
&lt;br /&gt;
* Specify custom values to configure software installed using Helm&lt;br /&gt;
&lt;br /&gt;
* Awareness of Kustomize&lt;br /&gt;
&lt;br /&gt;
* Awareness of Flux CD and Argo CD&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* helm install&lt;br /&gt;
&lt;br /&gt;
* helm upgrade&lt;br /&gt;
&lt;br /&gt;
* helm list&lt;br /&gt;
&lt;br /&gt;
* helm uninstall&lt;br /&gt;
&lt;br /&gt;
* values.yaml&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;705 Security and Observability&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.1 Cloud Native Security (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the major kinds of IT threats against cloud native infrastructure, as well as common approaches to prevent such attacks and mitigate their risk. This includes handling security aspects of foreign software as well as common standards for authentication and authorization.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand core IT infrastructure components and their role in deployment &lt;br /&gt;
&lt;br /&gt;
* Understand common IT infrastructure security risks and ways to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Understand supply chain security and dependencies on foreign code&lt;br /&gt;
&lt;br /&gt;
* Understand common application security risks and ways to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of asymmetric cryptography and digital certificates&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of common standard for authentication and authorization&lt;br /&gt;
&lt;br /&gt;
* Understand how to manage user credentials and how to use advanced authentication technologies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Service exploits, brute force attacks, and denial of service attacks&lt;br /&gt;
&lt;br /&gt;
* Security updates, packet filtering and application gateways&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
* API access, permissions, verbosity and rate limits&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE IDs and CVE scores&lt;br /&gt;
&lt;br /&gt;
* Public key, private key, X.509 certificate, certificate authority&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* OAuth2, OpenID Connect and SAML&lt;br /&gt;
&lt;br /&gt;
* Two-factor authentication (2FA) and multi-factor authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
* One-time passwords (OTP), time-based one-time passwords (TOTP)&lt;br /&gt;
&lt;br /&gt;
* Authenticator applications&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.2 Prometheus Monitoring (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the role of monitoring for application and IT infrastructures. They should be familiar with the architecture and components of Prometheus. The candidate should be able to set up Prometheus and use PromQL to query monitoring data.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand goals of IT operations and service provisioning, including nonfunctional properties such as availability, latency, responsiveness&lt;br /&gt;
&lt;br /&gt;
* Understand and identify metrics and indicators to monitor and measure the technical functionality of a service&lt;br /&gt;
&lt;br /&gt;
* Understand and identify metrics and indicators to monitor and measure the logical functionality of a service&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Prometheus, including Exporters, Pushgateway, Alertmanager and Grafana&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture of Prometheus&lt;br /&gt;
&lt;br /&gt;
* Set up Prometheus and configure file based service discovery&lt;br /&gt;
&lt;br /&gt;
* Monitor containers and microservices using Prometheus&lt;br /&gt;
&lt;br /&gt;
* Use PromQL to retrieve log data&lt;br /&gt;
&lt;br /&gt;
* Aggregate metrics for specific labels&lt;br /&gt;
&lt;br /&gt;
* Aggregate metrics over time&lt;br /&gt;
&lt;br /&gt;
* Awareness of common exporters&lt;br /&gt;
&lt;br /&gt;
* Awareness of application instrumentation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Prometheus, Exporters, AlertManager, Grafana&lt;br /&gt;
&lt;br /&gt;
* Label selectors&lt;br /&gt;
&lt;br /&gt;
* Instant vectors and aggregate functions&lt;br /&gt;
&lt;br /&gt;
* Range vectors and aggregate functions&lt;br /&gt;
&lt;br /&gt;
* Node Exporter and Blackbox Exporter&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.3 Log Management and Analysis (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the role of log files in operations and troubleshooting. They should be understand the major properties and features of commonly used Open Source logging stacks.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand how application and system logging works&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and features of commonly used open source logging stacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Elasticsearch and OpenSearch&lt;br /&gt;
&lt;br /&gt;
* Logstash and filebeat&lt;br /&gt;
&lt;br /&gt;
* Fluentd and FluentBit&lt;br /&gt;
&lt;br /&gt;
* Kibana&lt;br /&gt;
&lt;br /&gt;
* Loki and promtail&lt;br /&gt;
&lt;br /&gt;
* Grafana&lt;br /&gt;
&lt;br /&gt;
* Greylog2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.4 Tracing (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the concepts and importance of tracing and be familiar with the architecture of OpenTelemetry.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of tracing&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of OpenTelemetry&lt;br /&gt;
&lt;br /&gt;
* Awareness of commonly used open source telemetry analysis tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of application instrumentation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenTelemetry&lt;br /&gt;
&lt;br /&gt;
* Spans and Distributed Traces&lt;br /&gt;
&lt;br /&gt;
* Contexts, Span and Trace IDs&lt;br /&gt;
&lt;br /&gt;
* Span attributes, events, links, status and kind&lt;br /&gt;
&lt;br /&gt;
* Grafana Tempo&lt;br /&gt;
&lt;br /&gt;
* Jaeger&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=DevOps_Tools_Engineer_Objectives_V2.0&amp;diff=5743</id>
		<title>DevOps Tools Engineer Objectives V2.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=DevOps_Tools_Engineer_Objectives_V2.0&amp;diff=5743"/>
		<updated>2023-06-22T12:15:39Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This is a required exam for the Linux Professional Institute DevOps Tools Engineer certification. It covers basic skills in using tools commonly used to implement DevOps.&lt;br /&gt;
&lt;br /&gt;
This page covers the currently released objective for the Linux Professional Institute DevOps Tools Engineer certification. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
The certification holder is either a professional software developer or a professional system administrator who is involved in the production of IT solutions which require a robust and efficient process to get from original source materials to a final deployed or distributable product or service with a particular focus on using Open Source technology. The certification holder has the ability to create, deliver and operate software using collaborative methods which address aspects of software development as well as system administration. In particular, the certification holder is adept at bridging the gap between the development and operations of a solution or product. The certification holder understands how these tools facilitate development and operational tasks in the delivery of stable, scalable and up to date services to users and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 2.0.0. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[DevOps_Tools_Engineer_Objectives_V2.0|English]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams and Requirements==&lt;br /&gt;
&lt;br /&gt;
The Linux Professional Institute DevOps Tools Engineer certification is awarded after passing this exam. There is no requirement to possess any other certifications. However, LPI recommends that all Linux Professional Institute DevOps Tools Engineers maintain at least one active certification in either system administration or software development. This certification should be at a level equivalent to LPIC-1.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;701 Software Engineering&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.1 Modern Software Development (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to design software solutions suitable for modern runtime environments. Candidates should understand how services handle data persistence, sessions, status information, transactions, concurrency, security, performance, availability, scaling, load balancing, messaging, monitoring and APIs. Furthermore, candidates should understand the implications of agile and DevOps on software development.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and design service based applications&lt;br /&gt;
&lt;br /&gt;
* Understand common API concepts and standards&lt;br /&gt;
&lt;br /&gt;
* Understand aspects of data storage, service status and session handling&lt;br /&gt;
&lt;br /&gt;
* Design software to be run in containers&lt;br /&gt;
&lt;br /&gt;
* Design software to be deployed to cloud services&lt;br /&gt;
&lt;br /&gt;
* Awareness of risks in the migration and integration of monolithic legacy software&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of agile software development&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of DevOps and its implications to software developers and operators&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* REST, JSON&lt;br /&gt;
&lt;br /&gt;
* Service Oriented Architectures (SOA)&lt;br /&gt;
&lt;br /&gt;
* Microservices&lt;br /&gt;
&lt;br /&gt;
* Immutable servers&lt;br /&gt;
&lt;br /&gt;
* Loose coupling&lt;br /&gt;
&lt;br /&gt;
* Cross site scripting, SQL injections, verbose error reports, API authentication, consistent enforcement of transport encryption&lt;br /&gt;
&lt;br /&gt;
* CORS headers and CSRF tokens&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.2 Standard Components and Platforms for Software (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand services offered by common cloud platforms. They should be able to include these services in their application architectures and deployment toolchains and understand the required service configurations. Furthermore, the candidate should be aware of the commonly used open source implementations of the various services.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of object storage&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of relational and NoSQL databases&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of message brokers and message queues&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of big data services&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of application runtimes / PaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of hosted applications / SaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of function applications / FaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of content delivery networks&lt;br /&gt;
&lt;br /&gt;
* Awareness of identity and access management in cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Objects, Buckets, ACLs, S3&lt;br /&gt;
&lt;br /&gt;
* MariaDB, MySQL, PostgreSQL,&lt;br /&gt;
&lt;br /&gt;
* Redis, MongoDB, InfluxDB&lt;br /&gt;
&lt;br /&gt;
* Elasticsearch and OpenSearch&lt;br /&gt;
&lt;br /&gt;
* Kafka, MQTT&lt;br /&gt;
&lt;br /&gt;
* IAM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.3 Source Code Management (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to use Git to manage and share source code. This includes creating and contributing to a repository as well as the usage of tags, branches and remote repositories. Furthermore, the candidate should be able to merge files and resolve merging conflicts. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand Git concepts and repository structure&lt;br /&gt;
&lt;br /&gt;
* Manage files within a Git repository&lt;br /&gt;
&lt;br /&gt;
* Manage branches and tags&lt;br /&gt;
&lt;br /&gt;
* Work with remote repositories and branches as well as submodules&lt;br /&gt;
&lt;br /&gt;
* Merge files and branches&lt;br /&gt;
&lt;br /&gt;
* Awareness of SVN and CVS, including concepts of centralized and distributed SCM solutions&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* .gitignore&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.4 Continuous Integration and Continuous Delivery (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the principles and components of a continuous integration and continuous delivery pipeline. Candidates should understand how CI/CD pipelines support the development and release of software and how they integrate with source code repositories and the target runtime environment. Furthermore, candidates should be aware of commonly used CI/CD platforms.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Continuous Integration and Continuous Delivery&lt;br /&gt;
&lt;br /&gt;
* Understand the components of a CI/CD pipeline, including builds, unit, integration and acceptance tests, artifact management, delivery and deployment&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of GitOps&lt;br /&gt;
&lt;br /&gt;
* Understand the role of build artifacts and caches&lt;br /&gt;
&lt;br /&gt;
* Understand deployment best practices&lt;br /&gt;
&lt;br /&gt;
* Awareness of Jenkins and Gitlab CI&lt;br /&gt;
&lt;br /&gt;
* Awareness of Artifactory and Nexus&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Declarative Pipeline&lt;br /&gt;
&lt;br /&gt;
* Production, Staging and Development Environments&lt;br /&gt;
&lt;br /&gt;
* Feature toggles&lt;br /&gt;
&lt;br /&gt;
* Preview releases&lt;br /&gt;
&lt;br /&gt;
* Reconciliation loops&lt;br /&gt;
&lt;br /&gt;
* A/B testing&lt;br /&gt;
&lt;br /&gt;
* Blue-green and canary deployment&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.5 Software Composition, Licensing and Open Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the principles of software licenses. This includes how software from multiple authors and sources are combined to implement a specific service and how licensing affects such compositions. Furthermore, the candidate should understand the concepts of open source software, including the most important aspects of common open source licenses.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand how an application is build out of multiple software components&lt;br /&gt;
&lt;br /&gt;
* Awareness of dependency managers like NPM, gradle or composer&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts proprietary and open source software&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of open source software licenses&lt;br /&gt;
&lt;br /&gt;
* Awareness of commonly used open source licenses (GPL, LGPL, AGPL, BSD, MIT and Apache License)&lt;br /&gt;
&lt;br /&gt;
* Awareness of license compatibility and multi licensing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software libraries&lt;br /&gt;
&lt;br /&gt;
* Software Bill Of Materials&lt;br /&gt;
&lt;br /&gt;
* Proprietary software&lt;br /&gt;
&lt;br /&gt;
* Open Source Software and Free Software&lt;br /&gt;
&lt;br /&gt;
* Copyleft open source software licenses&lt;br /&gt;
&lt;br /&gt;
* Permissive open source software licenses&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;702 Application Container&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.1 Application Container Management (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to operate Docker and Podman containers. This includes creating and interacting with containers as well as connecting containers to networks and storage volumes.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the Docker and Podman architecture&lt;br /&gt;
&lt;br /&gt;
* Use existing images from an OCI registry&lt;br /&gt;
&lt;br /&gt;
* Operate and access containers&lt;br /&gt;
&lt;br /&gt;
* Understand Docker networking concepts, including overlay networks&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of DNS service discovery&lt;br /&gt;
&lt;br /&gt;
* Connect container to container networks and use DNS for service discovery&lt;br /&gt;
&lt;br /&gt;
* Understand Docker storage concepts&lt;br /&gt;
&lt;br /&gt;
* Use Docker volumes for shared and persistent container storage&lt;br /&gt;
&lt;br /&gt;
* Awareness of rootless containers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker container *&lt;br /&gt;
&lt;br /&gt;
* docker network *&lt;br /&gt;
&lt;br /&gt;
* docker image *&lt;br /&gt;
&lt;br /&gt;
* docker volume *&lt;br /&gt;
&lt;br /&gt;
* podman container *&lt;br /&gt;
&lt;br /&gt;
* podman network *&lt;br /&gt;
&lt;br /&gt;
* podman image *&lt;br /&gt;
&lt;br /&gt;
* podman volume *&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.2 Container Orchestration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to run and manage multiple containers that work together to provide a service. This includes the orchestration of Docker containers using Docker Compose.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the application model of Docker Compose and Podman Compose&lt;br /&gt;
&lt;br /&gt;
* Create and run Docker Compose Files (version 3 or later)&lt;br /&gt;
&lt;br /&gt;
* Define services, networks and volumes, along with their commonly used properties, in Docker Compose files&lt;br /&gt;
&lt;br /&gt;
* Use Docker Compose to update running containers to newer images&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker compose&lt;br /&gt;
&lt;br /&gt;
* podman-compose&lt;br /&gt;
&lt;br /&gt;
* docker-compose.yml&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.3 Container Image Building (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to set up a runtime environment for containers. This includes running containers on a local workstation as well as setting up a dedicated container host. Furthermore, candidates should be aware of other container infrastructures, storage, networking and container specific security aspects. This objective covers the feature set of Docker version 17.06 or later and Docker Machine 0.12 or later.&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to build OCI container images. This includes creating Dockerfiles or Containerfiles, building containers and publishing container images on an existing OCI registry.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create Dockerfiles and build images from Dockerfiles&lt;br /&gt;
&lt;br /&gt;
* Understand OCI image names&lt;br /&gt;
&lt;br /&gt;
* Upload images to a Docker registry&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of image scanners&lt;br /&gt;
&lt;br /&gt;
* Understand security risks of container virtualization and container images and how to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Awareness Docker buildx, Docker Buildkit, Podman build and Buildah&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker image *&lt;br /&gt;
&lt;br /&gt;
* docker login&lt;br /&gt;
&lt;br /&gt;
* Dockerfile&lt;br /&gt;
&lt;br /&gt;
* Containerfile&lt;br /&gt;
&lt;br /&gt;
* .dockerignore&lt;br /&gt;
&lt;br /&gt;
* FROM&lt;br /&gt;
&lt;br /&gt;
* COPY&lt;br /&gt;
&lt;br /&gt;
* ADD&lt;br /&gt;
&lt;br /&gt;
* RUN&lt;br /&gt;
&lt;br /&gt;
* VOLUME&lt;br /&gt;
&lt;br /&gt;
* EXPOSE&lt;br /&gt;
&lt;br /&gt;
* USER&lt;br /&gt;
&lt;br /&gt;
* WORKDIR&lt;br /&gt;
&lt;br /&gt;
* ENV&lt;br /&gt;
&lt;br /&gt;
* ARG&lt;br /&gt;
&lt;br /&gt;
* CMD&lt;br /&gt;
&lt;br /&gt;
* ENTRYPOINT&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;703 Kubernetes&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.1 Kubernetes Architecture and Usage (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the major components of Kubernetes. Furthermore, candidates should be able to interact with an existing Kubernetes platform to retrieve information about the current Kubernetes state, and create, modify and delete resources.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the major components and services in a Kubernetes cluster&lt;br /&gt;
&lt;br /&gt;
* Configure kubectl to use an existing Kubernetes cluster&lt;br /&gt;
&lt;br /&gt;
* Use kubectl to get information about Kubernetes resources&lt;br /&gt;
&lt;br /&gt;
* Use kubectl to create, modify and delete resources&lt;br /&gt;
&lt;br /&gt;
* Awareness of Kubernetes Operators&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* API-Server, etcd, Controller Manager, Scheduler&lt;br /&gt;
&lt;br /&gt;
* ~/.kube/config&lt;br /&gt;
&lt;br /&gt;
* kubectl get&lt;br /&gt;
&lt;br /&gt;
* kubectl describe&lt;br /&gt;
&lt;br /&gt;
* kubectl apply&lt;br /&gt;
&lt;br /&gt;
* kubectl create&lt;br /&gt;
&lt;br /&gt;
* kubectl run&lt;br /&gt;
&lt;br /&gt;
* kubectl expose &lt;br /&gt;
&lt;br /&gt;
* kubectl scale&lt;br /&gt;
&lt;br /&gt;
* kubectl set&lt;br /&gt;
&lt;br /&gt;
* kubectl edit&lt;br /&gt;
&lt;br /&gt;
* kubectl explain&lt;br /&gt;
&lt;br /&gt;
* kubectl config&lt;br /&gt;
&lt;br /&gt;
* kubectl logs&lt;br /&gt;
&lt;br /&gt;
* kubectl exec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.2 Basic Kubernetes Operations (weight: 7)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 7&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to set up applications running on Kubernetes. This includes understanding the most important kinds of Kubernetes resources, including their most important properties.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the use of YAML files to declare Kubernetes resources&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of a Pod&lt;br /&gt;
&lt;br /&gt;
* Understanding how to use Deployments, including scaling and rolling updates&lt;br /&gt;
&lt;br /&gt;
* Understanding how to make services accessible using Services and Ingress&lt;br /&gt;
&lt;br /&gt;
* Understanding how to use storage using PersistentVolumeClaims&lt;br /&gt;
&lt;br /&gt;
* Awareness of other Kubernetes orchestration resources, i.e. DaemonSets, StatefulSets, Jobs and CronJobs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Pods&lt;br /&gt;
&lt;br /&gt;
* ReplicaSets&lt;br /&gt;
&lt;br /&gt;
* Deployments&lt;br /&gt;
&lt;br /&gt;
* Services&lt;br /&gt;
&lt;br /&gt;
* Ingress&lt;br /&gt;
&lt;br /&gt;
* PersistentVolumeClaims&lt;br /&gt;
&lt;br /&gt;
* ConfigMaps&lt;br /&gt;
&lt;br /&gt;
* Secrets&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.3 Kubernetes Package Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to use Helm to install software on Kubernetes.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of Charts, Releases and Values&lt;br /&gt;
&lt;br /&gt;
* Installation, upgrading and uninstalling software using Helm&lt;br /&gt;
&lt;br /&gt;
* Specify custom values to configure software installed using Helm&lt;br /&gt;
&lt;br /&gt;
* Awareness of Kustomize&lt;br /&gt;
&lt;br /&gt;
* Awareness of Flux CD and Argo CD&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* helm install&lt;br /&gt;
&lt;br /&gt;
* helm upgrade&lt;br /&gt;
&lt;br /&gt;
* helm list&lt;br /&gt;
&lt;br /&gt;
* helm uninstall&lt;br /&gt;
&lt;br /&gt;
* values.yaml&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;705 Security and Observability&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.1 Cloud Native Security (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the major kinds of IT threats against cloud native infrastructure, as well as common approaches to prevent such attacks and mitigate their risk. This includes handling security aspects of foreign software as well as common standards for authentication and authorization.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand core IT infrastructure components and their role in deployment &lt;br /&gt;
&lt;br /&gt;
* Understand common IT infrastructure security risks and ways to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Understand supply chain security and dependencies on foreign code&lt;br /&gt;
&lt;br /&gt;
* Understand common application security risks and ways to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of asymmetric cryptography and digital certificates&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of common standard for authentication and authorization&lt;br /&gt;
&lt;br /&gt;
* Understand how to manage user credentials and how to use advanced authentication technologies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Service exploits, brute force attacks, and denial of service attacks&lt;br /&gt;
&lt;br /&gt;
* Security updates, packet filtering and application gateways&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
* API access, permissions, verbosity and rate limits&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE IDs and CVE scores&lt;br /&gt;
&lt;br /&gt;
* Public key, private key, X.509 certificate, certificate authority&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* OAuth2, OpenID Connect and SAML&lt;br /&gt;
&lt;br /&gt;
* Two-factor authentication (2FA) and multi-factor authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
* One-time passwords (OTP), time-based one-time passwords (TOTP)&lt;br /&gt;
&lt;br /&gt;
* Authenticator applications&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.2 Prometheus Monitoring (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the role of monitoring for application and IT infrastructure. They should be familiar with the architecture and components of Prometheus. The candidate should be able to set up Prometheus and use PromQL to query monitoring data.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand goals of IT operations and service provisioning, including nonfunctional properties such as availability, latency, responsiveness&lt;br /&gt;
&lt;br /&gt;
* Understand and identify metrics and indicators to monitor and measure the technical functionality of a service&lt;br /&gt;
&lt;br /&gt;
* Understand and identify metrics and indicators to monitor and measure the logical functionality of a service&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Prometheus, including Exporters, Pushgateway, Alertmanager and Grafana&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture of Prometheus&lt;br /&gt;
&lt;br /&gt;
* Set up Prometheus and configure file based service discovery&lt;br /&gt;
&lt;br /&gt;
* Monitor containers and microservices using Prometheus&lt;br /&gt;
&lt;br /&gt;
* Use PromQL to retrieve log data&lt;br /&gt;
&lt;br /&gt;
* Aggregate metrics for specific labels&lt;br /&gt;
&lt;br /&gt;
* Aggregate metrics over time&lt;br /&gt;
&lt;br /&gt;
* Awareness of common exporters&lt;br /&gt;
&lt;br /&gt;
* Awareness of application instrumentation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Prometheus, Exporters, AlertManager, Grafana&lt;br /&gt;
&lt;br /&gt;
* Label selectors&lt;br /&gt;
&lt;br /&gt;
* Instant vectors and aggregate functions&lt;br /&gt;
&lt;br /&gt;
* Range vectors and aggregate functions&lt;br /&gt;
&lt;br /&gt;
* Node Exporter and Blackbox Exporter&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.3 Log Management and Analysis (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the role of log files in operations and troubleshooting. They should be understand the major properties and features of commonly used Open Source logging stacks.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand how application and system logging works&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and features of commonly used open source logging stacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Elasticsearch and OpenSearch&lt;br /&gt;
&lt;br /&gt;
* Logstash and filebeat&lt;br /&gt;
&lt;br /&gt;
* Fluentd and FluentBit&lt;br /&gt;
&lt;br /&gt;
* Kibana&lt;br /&gt;
&lt;br /&gt;
* Loki and promtail&lt;br /&gt;
&lt;br /&gt;
* Grafana&lt;br /&gt;
&lt;br /&gt;
* Greylog2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.4 Tracing (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the concepts and importance of tracing and be familiar with the architecture of OpenTelemetry.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of tracing&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of OpenTelemetry&lt;br /&gt;
&lt;br /&gt;
* Awareness of commonly used open source telemetry analysis tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of application instrumentation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenTelemetry&lt;br /&gt;
&lt;br /&gt;
* Spans and Distributed Traces&lt;br /&gt;
&lt;br /&gt;
* Contexts, Span and Trace IDs&lt;br /&gt;
&lt;br /&gt;
* Span attributes, events, links, status and kind&lt;br /&gt;
&lt;br /&gt;
* Grafana Tempo&lt;br /&gt;
&lt;br /&gt;
* Jaeger&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=DevOps_Tools_Engineer_Objectives_V2.0&amp;diff=5742</id>
		<title>DevOps Tools Engineer Objectives V2.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=DevOps_Tools_Engineer_Objectives_V2.0&amp;diff=5742"/>
		<updated>2023-06-22T12:14:01Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This is a required exam for the Linux Professional Institute DevOps Tools Engineer certification. It covers basic skills in using tools commonly used to implement DevOps.&lt;br /&gt;
&lt;br /&gt;
This page covers the currently released objective for the Linux Professional Institute DevOps Tools Engineer certification. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
The certification holder is either a professional software developer or a professional system administrator who is involved in the production of IT solutions which require a robust and efficient process to get from original source materials to a final deployed or distributable product or service with a particular focus on using Open Source technology. The certification holder has the ability to create, deliver and operate software using collaborative methods which address aspects of software development as well as system administration. In particular, the certification holder is adept at bridging the gap between the development and operations of a solution or product. The certification holder understands how these tools facilitate development and operational tasks in the delivery of stable, scalable and up to date services to users and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 2.0.0. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[DevOps_Tools_Engineer_Objectives_V2.0|English]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams and Requirements==&lt;br /&gt;
&lt;br /&gt;
The Linux Professional Institute DevOps Tools Engineer certification is awarded after passing this exam. There is no requirement to possess another certifications. LPI recommends all Linux Professional Institute DevOps Tools Engineers to maintain at least one active certification in either system administration or software development. This certification should be on a level equivalent to LPIC-1.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;701 Software Engineering&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.1 Modern Software Development (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to design software solutions suitable for modern runtime environments. Candidates should understand how services handle data persistence, sessions, status information, transactions, concurrency, security, performance, availability, scaling, load balancing, messaging, monitoring and APIs. Furthermore, candidates should understand the implications of agile and DevOps on software development.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and design service based applications&lt;br /&gt;
&lt;br /&gt;
* Understand common API concepts and standards&lt;br /&gt;
&lt;br /&gt;
* Understand aspects of data storage, service status and session handling&lt;br /&gt;
&lt;br /&gt;
* Design software to be run in containers&lt;br /&gt;
&lt;br /&gt;
* Design software to be deployed to cloud services&lt;br /&gt;
&lt;br /&gt;
* Awareness of risks in the migration and integration of monolithic legacy software&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of agile software development&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of DevOps and its implications to software developers and operators&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* REST, JSON&lt;br /&gt;
&lt;br /&gt;
* Service Oriented Architectures (SOA)&lt;br /&gt;
&lt;br /&gt;
* Microservices&lt;br /&gt;
&lt;br /&gt;
* Immutable servers&lt;br /&gt;
&lt;br /&gt;
* Loose coupling&lt;br /&gt;
&lt;br /&gt;
* Cross site scripting, SQL injections, verbose error reports, API authentication, consistent enforcement of transport encryption&lt;br /&gt;
&lt;br /&gt;
* CORS headers and CSRF tokens&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.2 Standard Components and Platforms for Software (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand services offered by common cloud platforms. They should be able to include these services in their application architectures and deployment toolchains and understand the required service configurations. Furthermore, the candidate should be aware of the commonly used open source implementations of the various services.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of object storage&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of relational and NoSQL databases&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of message brokers and message queues&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of big data services&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of application runtimes / PaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of hosted applications / SaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of function applications / FaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of content delivery networks&lt;br /&gt;
&lt;br /&gt;
* Awareness of identity and access management in cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Objects, Buckets, ACLs, S3&lt;br /&gt;
&lt;br /&gt;
* MariaDB, MySQL, PostgreSQL,&lt;br /&gt;
&lt;br /&gt;
* Redis, MongoDB, InfluxDB&lt;br /&gt;
&lt;br /&gt;
* Elasticsearch and OpenSearch&lt;br /&gt;
&lt;br /&gt;
* Kafka, MQTT&lt;br /&gt;
&lt;br /&gt;
* IAM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.3 Source Code Management (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to use Git to manage and share source code. This includes creating and contributing to a repository as well as the usage of tags, branches and remote repositories. Furthermore, the candidate should be able to merge files and resolve merging conflicts. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand Git concepts and repository structure&lt;br /&gt;
&lt;br /&gt;
* Manage files within a Git repository&lt;br /&gt;
&lt;br /&gt;
* Manage branches and tags&lt;br /&gt;
&lt;br /&gt;
* Work with remote repositories and branches as well as submodules&lt;br /&gt;
&lt;br /&gt;
* Merge files and branches&lt;br /&gt;
&lt;br /&gt;
* Awareness of SVN and CVS, including concepts of centralized and distributed SCM solutions&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* .gitignore&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.4 Continuous Integration and Continuous Delivery (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the principles and components of a continuous integration and continuous delivery pipeline. Candidates should understand how CI/CD pipelines support the development and release of software and how they integrate with source code repositories and the target runtime environment. Furthermore, candidates should be aware of commonly used CI/CD platforms.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Continuous Integration and Continuous Delivery&lt;br /&gt;
&lt;br /&gt;
* Understand the components of a CI/CD pipeline, including builds, unit, integration and acceptance tests, artifact management, delivery and deployment&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of GitOps&lt;br /&gt;
&lt;br /&gt;
* Understand the role of build artifacts and caches&lt;br /&gt;
&lt;br /&gt;
* Understand deployment best practices&lt;br /&gt;
&lt;br /&gt;
* Awareness of Jenkins and Gitlab CI&lt;br /&gt;
&lt;br /&gt;
* Awareness of Artifactory and Nexus&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Declarative Pipeline&lt;br /&gt;
&lt;br /&gt;
* Production, Staging and Development Environments&lt;br /&gt;
&lt;br /&gt;
* Feature toggles&lt;br /&gt;
&lt;br /&gt;
* Preview releases&lt;br /&gt;
&lt;br /&gt;
* Reconciliation loops&lt;br /&gt;
&lt;br /&gt;
* A/B testing&lt;br /&gt;
&lt;br /&gt;
* Blue-green and canary deployment&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.5 Software Composition, Licensing and Open Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the principles of software licenses. This includes how software from multiple authors and sources are combined to implement a specific service and how licensing affects such compositions. Furthermore, the candidate should understand the concepts of open source software, including the most important aspects of common open source licenses.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand how an application is build out of multiple software components&lt;br /&gt;
&lt;br /&gt;
* Awareness of dependency managers like NPM, gradle or composer&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts proprietary and open source software&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of open source software licenses&lt;br /&gt;
&lt;br /&gt;
* Awareness of commonly used open source licenses (GPL, LGPL, AGPL, BSD, MIT and Apache License)&lt;br /&gt;
&lt;br /&gt;
* Awareness of license compatibility and multi licensing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software libraries&lt;br /&gt;
&lt;br /&gt;
* Software Bill Of Materials&lt;br /&gt;
&lt;br /&gt;
* Proprietary software&lt;br /&gt;
&lt;br /&gt;
* Open Source Software and Free Software&lt;br /&gt;
&lt;br /&gt;
* Copyleft open source software licenses&lt;br /&gt;
&lt;br /&gt;
* Permissive open source software licenses&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;702 Application Container&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.1 Application Container Management (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to operate Docker and Podman containers. This includes creating and interacting with containers as well as connecting containers to networks and storage volumes.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the Docker and Podman architecture&lt;br /&gt;
&lt;br /&gt;
* Use existing images from an OCI registry&lt;br /&gt;
&lt;br /&gt;
* Operate and access containers&lt;br /&gt;
&lt;br /&gt;
* Understand Docker networking concepts, including overlay networks&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of DNS service discovery&lt;br /&gt;
&lt;br /&gt;
* Connect container to container networks and use DNS for service discovery&lt;br /&gt;
&lt;br /&gt;
* Understand Docker storage concepts&lt;br /&gt;
&lt;br /&gt;
* Use Docker volumes for shared and persistent container storage&lt;br /&gt;
&lt;br /&gt;
* Awareness of rootless containers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker container *&lt;br /&gt;
&lt;br /&gt;
* docker network *&lt;br /&gt;
&lt;br /&gt;
* docker image *&lt;br /&gt;
&lt;br /&gt;
* docker volume *&lt;br /&gt;
&lt;br /&gt;
* podman container *&lt;br /&gt;
&lt;br /&gt;
* podman network *&lt;br /&gt;
&lt;br /&gt;
* podman image *&lt;br /&gt;
&lt;br /&gt;
* podman volume *&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.2 Container Orchestration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to run and manage multiple containers that work together to provide a service. This includes the orchestration of Docker containers using Docker Compose.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the application model of Docker Compose and Podman Compose&lt;br /&gt;
&lt;br /&gt;
* Create and run Docker Compose Files (version 3 or later)&lt;br /&gt;
&lt;br /&gt;
* Define services, networks and volumes, along with their commonly used properties, in Docker Compose files&lt;br /&gt;
&lt;br /&gt;
* Use Docker Compose to update running containers to newer images&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker compose&lt;br /&gt;
&lt;br /&gt;
* podman-compose&lt;br /&gt;
&lt;br /&gt;
* docker-compose.yml&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.3 Container Image Building (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to set up a runtime environment for containers. This includes running containers on a local workstation as well as setting up a dedicated container host. Furthermore, candidates should be aware of other container infrastructures, storage, networking and container specific security aspects. This objective covers the feature set of Docker version 17.06 or later and Docker Machine 0.12 or later.&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to build OCI container images. This includes creating Dockerfiles or Containerfiles, building containers and publishing container images on an existing OCI registry.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create Dockerfiles and build images from Dockerfiles&lt;br /&gt;
&lt;br /&gt;
* Understand OCI image names&lt;br /&gt;
&lt;br /&gt;
* Upload images to a Docker registry&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of image scanners&lt;br /&gt;
&lt;br /&gt;
* Understand security risks of container virtualization and container images and how to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Awareness Docker buildx, Docker Buildkit, Podman build and Buildah&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker image *&lt;br /&gt;
&lt;br /&gt;
* docker login&lt;br /&gt;
&lt;br /&gt;
* Dockerfile&lt;br /&gt;
&lt;br /&gt;
* Containerfile&lt;br /&gt;
&lt;br /&gt;
* .dockerignore&lt;br /&gt;
&lt;br /&gt;
* FROM&lt;br /&gt;
&lt;br /&gt;
* COPY&lt;br /&gt;
&lt;br /&gt;
* ADD&lt;br /&gt;
&lt;br /&gt;
* RUN&lt;br /&gt;
&lt;br /&gt;
* VOLUME&lt;br /&gt;
&lt;br /&gt;
* EXPOSE&lt;br /&gt;
&lt;br /&gt;
* USER&lt;br /&gt;
&lt;br /&gt;
* WORKDIR&lt;br /&gt;
&lt;br /&gt;
* ENV&lt;br /&gt;
&lt;br /&gt;
* ARG&lt;br /&gt;
&lt;br /&gt;
* CMD&lt;br /&gt;
&lt;br /&gt;
* ENTRYPOINT&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;703 Kubernetes&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.1 Kubernetes Architecture and Usage (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the major components of Kubernetes. Furthermore, candidates should be able to interact with an existing Kubernetes platform to retrieve information about the current Kubernetes state, and create, modify and delete resources.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the major components and services in a Kubernetes cluster&lt;br /&gt;
&lt;br /&gt;
* Configure kubectl to use an existing Kubernetes cluster&lt;br /&gt;
&lt;br /&gt;
* Use kubectl to get information about Kubernetes resources&lt;br /&gt;
&lt;br /&gt;
* Use kubectl to create, modify and delete resources&lt;br /&gt;
&lt;br /&gt;
* Awareness of Kubernetes Operators&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* API-Server, etcd, Controller Manager, Scheduler&lt;br /&gt;
&lt;br /&gt;
* ~/.kube/config&lt;br /&gt;
&lt;br /&gt;
* kubectl get&lt;br /&gt;
&lt;br /&gt;
* kubectl describe&lt;br /&gt;
&lt;br /&gt;
* kubectl apply&lt;br /&gt;
&lt;br /&gt;
* kubectl create&lt;br /&gt;
&lt;br /&gt;
* kubectl run&lt;br /&gt;
&lt;br /&gt;
* kubectl expose &lt;br /&gt;
&lt;br /&gt;
* kubectl scale&lt;br /&gt;
&lt;br /&gt;
* kubectl set&lt;br /&gt;
&lt;br /&gt;
* kubectl edit&lt;br /&gt;
&lt;br /&gt;
* kubectl explain&lt;br /&gt;
&lt;br /&gt;
* kubectl config&lt;br /&gt;
&lt;br /&gt;
* kubectl logs&lt;br /&gt;
&lt;br /&gt;
* kubectl exec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.2 Basic Kubernetes Operations (weight: 7)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 7&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to set up applications running on Kubernetes. This includes understanding the most important kinds of Kubernetes resources, including their most important properties.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the use of YAML files to declare Kubernetes resources&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of a Pod&lt;br /&gt;
&lt;br /&gt;
* Understanding how to use Deployments, including scaling and rolling updates&lt;br /&gt;
&lt;br /&gt;
* Understanding how to make services accessible using Services and Ingress&lt;br /&gt;
&lt;br /&gt;
* Understanding how to use storage using PersistentVolumeClaims&lt;br /&gt;
&lt;br /&gt;
* Awareness of other Kubernetes orchestration resources, i.e. DaemonSets, StatefulSets, Jobs and CronJobs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Pods&lt;br /&gt;
&lt;br /&gt;
* ReplicaSets&lt;br /&gt;
&lt;br /&gt;
* Deployments&lt;br /&gt;
&lt;br /&gt;
* Services&lt;br /&gt;
&lt;br /&gt;
* Ingress&lt;br /&gt;
&lt;br /&gt;
* PersistentVolumeClaims&lt;br /&gt;
&lt;br /&gt;
* ConfigMaps&lt;br /&gt;
&lt;br /&gt;
* Secrets&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.3 Kubernetes Package Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to use Helm to install software on Kubernetes.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of Charts, Releases and Values&lt;br /&gt;
&lt;br /&gt;
* Installation, upgrading and uninstalling software using Helm&lt;br /&gt;
&lt;br /&gt;
* Specify custom values to configure software installed using Helm&lt;br /&gt;
&lt;br /&gt;
* Awareness of Kustomize&lt;br /&gt;
&lt;br /&gt;
* Awareness of Flux CD and Argo CD&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* helm install&lt;br /&gt;
&lt;br /&gt;
* helm upgrade&lt;br /&gt;
&lt;br /&gt;
* helm list&lt;br /&gt;
&lt;br /&gt;
* helm uninstall&lt;br /&gt;
&lt;br /&gt;
* values.yaml&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;705 Security and Observability&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.1 Cloud Native Security (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the major kinds of IT threats against cloud native infrastructure, as well as common approaches to prevent such attacks and mitigate their risk. This includes handling security aspects of foreign software as well as common standards for authentication and authorization.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand core IT infrastructure components and their role in deployment &lt;br /&gt;
&lt;br /&gt;
* Understand common IT infrastructure security risks and ways to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Understand supply chain security and dependencies on foreign code&lt;br /&gt;
&lt;br /&gt;
* Understand common application security risks and ways to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of asymmetric cryptography and digital certificates&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of common standard for authentication and authorization&lt;br /&gt;
&lt;br /&gt;
* Understand how to manage user credentials and how to use advanced authentication technologies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Service exploits, brute force attacks, and denial of service attacks&lt;br /&gt;
&lt;br /&gt;
* Security updates, packet filtering and application gateways&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
* API access, permissions, verbosity and rate limits&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE IDs and CVE scores&lt;br /&gt;
&lt;br /&gt;
* Public key, private key, X.509 certificate, certificate authority&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* OAuth2, OpenID Connect and SAML&lt;br /&gt;
&lt;br /&gt;
* Two-factor authentication (2FA) and multi-factor authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
* One-time passwords (OTP), time-based one-time passwords (TOTP)&lt;br /&gt;
&lt;br /&gt;
* Authenticator applications&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.2 Prometheus Monitoring (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the role of monitoring for application and IT infrastructure. They should be familiar with the architecture and components of Prometheus. The candidate should be able to set up Prometheus and use PromQL to query monitoring data.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand goals of IT operations and service provisioning, including nonfunctional properties such as availability, latency, responsiveness&lt;br /&gt;
&lt;br /&gt;
* Understand and identify metrics and indicators to monitor and measure the technical functionality of a service&lt;br /&gt;
&lt;br /&gt;
* Understand and identify metrics and indicators to monitor and measure the logical functionality of a service&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Prometheus, including Exporters, Pushgateway, Alertmanager and Grafana&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture of Prometheus&lt;br /&gt;
&lt;br /&gt;
* Set up Prometheus and configure file based service discovery&lt;br /&gt;
&lt;br /&gt;
* Monitor containers and microservices using Prometheus&lt;br /&gt;
&lt;br /&gt;
* Use PromQL to retrieve log data&lt;br /&gt;
&lt;br /&gt;
* Aggregate metrics for specific labels&lt;br /&gt;
&lt;br /&gt;
* Aggregate metrics over time&lt;br /&gt;
&lt;br /&gt;
* Awareness of common exporters&lt;br /&gt;
&lt;br /&gt;
* Awareness of application instrumentation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Prometheus, Exporters, AlertManager, Grafana&lt;br /&gt;
&lt;br /&gt;
* Label selectors&lt;br /&gt;
&lt;br /&gt;
* Instant vectors and aggregate functions&lt;br /&gt;
&lt;br /&gt;
* Range vectors and aggregate functions&lt;br /&gt;
&lt;br /&gt;
* Node Exporter and Blackbox Exporter&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.3 Log Management and Analysis (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the role of log files in operations and troubleshooting. They should be understand the major properties and features of commonly used Open Source logging stacks.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand how application and system logging works&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and features of commonly used open source logging stacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Elasticsearch and OpenSearch&lt;br /&gt;
&lt;br /&gt;
* Logstash and filebeat&lt;br /&gt;
&lt;br /&gt;
* Fluentd and FluentBit&lt;br /&gt;
&lt;br /&gt;
* Kibana&lt;br /&gt;
&lt;br /&gt;
* Loki and promtail&lt;br /&gt;
&lt;br /&gt;
* Grafana&lt;br /&gt;
&lt;br /&gt;
* Greylog2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.4 Tracing (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the concepts and importance of tracing and be familiar with the architecture of OpenTelemetry.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of tracing&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of OpenTelemetry&lt;br /&gt;
&lt;br /&gt;
* Awareness of commonly used open source telemetry analysis tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of application instrumentation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenTelemetry&lt;br /&gt;
&lt;br /&gt;
* Spans and Distributed Traces&lt;br /&gt;
&lt;br /&gt;
* Contexts, Span and Trace IDs&lt;br /&gt;
&lt;br /&gt;
* Span attributes, events, links, status and kind&lt;br /&gt;
&lt;br /&gt;
* Grafana Tempo&lt;br /&gt;
&lt;br /&gt;
* Jaeger&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=DevOps_Tools_Engineer_Objectives_V2.0&amp;diff=5741</id>
		<title>DevOps Tools Engineer Objectives V2.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=DevOps_Tools_Engineer_Objectives_V2.0&amp;diff=5741"/>
		<updated>2023-06-22T11:57:21Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This is a required exam for the Linux Professional Institute DevOps Tools Engineer certification. It covers basic skills in using tools commonly used to implement DevOps.&lt;br /&gt;
&lt;br /&gt;
This page covers the currently released objective for the Linux Professional Institute DevOps Tools Engineer certification. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
The certification holder is either a professional software developer or a professional system administrator who is involved in the production of IT solutions which require a robust and efficient process to get from original source materials to a final deployed or distributable product or service with a particular focus on using Open Source technology. The certification holder has the ability to create, deliver and operate software using collaborative methods which address aspects of software development as well as system administration. In particular, the certification holder is adept at bridging the gap between the development and operations of a solution or product. The certification holder understands how these tools facilitate development and operational tasks in the delivery of stable, scalable and up to date services to users and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 2.0.0. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[DevOps_Tools_Engineer_Objectives_V2.0|English]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams and Requirements==&lt;br /&gt;
&lt;br /&gt;
The Linux Professional Institute DevOps Tools Engineer certification is awarded after passing this exam. There is no requirement to possess another certifications. LPI recommends all Linux Professional Institute DevOps Tools Engineers to maintain at least one active certification in either system administration or software development. This certification should be on a level equivalent to LPIC-1.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;701 Software Engineering&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.1 Modern Software Development (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to design software solutions suitable for modern runtime environments. Candidates should understand how services handle data persistence, sessions, status information, transactions, concurrency, security, performance, availability, scaling, load balancing, messaging, monitoring and APIs. Furthermore, candidates should understand the implications of agile and DevOps on software development.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and design service based applications&lt;br /&gt;
&lt;br /&gt;
* Understand common API concepts and standards&lt;br /&gt;
&lt;br /&gt;
* Understand aspects of data storage, service status and session handling&lt;br /&gt;
&lt;br /&gt;
* Design software to be run in containers&lt;br /&gt;
&lt;br /&gt;
* Design software to be deployed to cloud services&lt;br /&gt;
&lt;br /&gt;
* Awareness of risks in the migration and integration of monolithic legacy software&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of agile software development&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of DevOps and its implications to software developers and operators&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* REST, JSON&lt;br /&gt;
&lt;br /&gt;
* Service Orientated Architectures (SOA)&lt;br /&gt;
&lt;br /&gt;
* Microservices&lt;br /&gt;
&lt;br /&gt;
* Immutable servers&lt;br /&gt;
&lt;br /&gt;
* Loose coupling&lt;br /&gt;
&lt;br /&gt;
* Cross site scripting, SQL injections, verbose error reports, API authentication, consistent enforcement of transport encryption&lt;br /&gt;
&lt;br /&gt;
* CORS headers and CSRF tokens&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.2 Standard Components and Platforms for Software (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand services offered by common cloud platforms. They should be able to include these services in their application architectures and deployment toolchains and understand the required service configurations. Futhermore, the candidate should be aware of the commonly used open source implementations of the various services.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of object storage&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of relational and NoSQL databases&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of message brokers and message queues&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of big data services&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of application runtimes / PaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of hosted applications / SaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of function applications / FaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of content delivery networks&lt;br /&gt;
&lt;br /&gt;
* Awareness of identity and access management in cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Objects, Buckets, ACLs, S3&lt;br /&gt;
&lt;br /&gt;
* MariaDB, MySQL, PostgreSQL,&lt;br /&gt;
&lt;br /&gt;
* Redis, MongoDB, InfluxDB&lt;br /&gt;
&lt;br /&gt;
* ElasticSearch and OpenSearch&lt;br /&gt;
&lt;br /&gt;
* Kafka, MQTT&lt;br /&gt;
&lt;br /&gt;
* IAM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.3 Source Code Management (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to use Git to manage and share source code. This includes creating and contributing to a repository as well as the usage of tags, branches and remote repositories. Furthermore, the candidate should be able to merge files and resolve merging conflicts. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand Git concepts and repository structure&lt;br /&gt;
&lt;br /&gt;
* Manage files within a Git repository&lt;br /&gt;
&lt;br /&gt;
* Manage branches and tags&lt;br /&gt;
&lt;br /&gt;
* Work with remote repositories and branches as well as submodules&lt;br /&gt;
&lt;br /&gt;
* Merge files and branches&lt;br /&gt;
&lt;br /&gt;
* Awareness of SVN and CVS, including concepts of centralized and distributed SCM solutions&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* .gitignore&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.4 Continuous Integration and Continuous Delivery (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the principles and components of a continuous integration and continuous delivery pipeline. Candidates should understand how CI/CD pipelines support the development and release of software and how they integrate with source code repositories and the target runtime environment. Furthermore, candidates should be aware of commonly used CI/CD platforms.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Continuous Integration and Continuous Delivery&lt;br /&gt;
&lt;br /&gt;
* Understand the components of a CI/CD pipeline, including builds, unit, integration and acceptance tests, artifact management, delivery and deployment&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of GitOps&lt;br /&gt;
&lt;br /&gt;
* Understand the role of build artifacts and caches&lt;br /&gt;
&lt;br /&gt;
* Understand deployment best practices&lt;br /&gt;
&lt;br /&gt;
* Awareness of Jenkins and Gitlab CI&lt;br /&gt;
&lt;br /&gt;
* Awareness of Artifactory and Nexus&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Declarative Pipeline&lt;br /&gt;
&lt;br /&gt;
* Production, Staging and Development Environments&lt;br /&gt;
&lt;br /&gt;
* Feature toggles&lt;br /&gt;
&lt;br /&gt;
* Preview releases&lt;br /&gt;
&lt;br /&gt;
* Reconciliation loops&lt;br /&gt;
&lt;br /&gt;
* A/B testing&lt;br /&gt;
&lt;br /&gt;
* Blue-green and canary deployment&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.5 Software Composition, Licensing and Open Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the principles of software licenses. This includes how software from multiple authors and sources are combined to implement a specific service and how licensing affects such compositions. Futhermore, the candidate should understand the concepts of open source software, including the most important aspects of common open source licenses.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand how an application is build out of multiple software components&lt;br /&gt;
&lt;br /&gt;
* Awareness of dependency managers like NPM, gradle or composer&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts proprietary and open source software&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of open source software licenses&lt;br /&gt;
&lt;br /&gt;
* Awareness of commonly used open source licenses (GPL, LGPL, AGPL, BSD, MIT and Apache License)&lt;br /&gt;
&lt;br /&gt;
* Awareness of license compatibility and multi licensing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software libraries&lt;br /&gt;
&lt;br /&gt;
* Software Bill Of Materials&lt;br /&gt;
&lt;br /&gt;
* Proprietary software&lt;br /&gt;
&lt;br /&gt;
* Open Source Software and Free Software&lt;br /&gt;
&lt;br /&gt;
* Copyleft open source sofware licenses&lt;br /&gt;
&lt;br /&gt;
* Permissive open source software licenses&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;702 Application Container&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.1 Application Container Management (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to operate Docker and Podman containers. This includes creating and interacting with containers as well as connecting containers to networks and storage volumes.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the Docker and Podman architecture&lt;br /&gt;
&lt;br /&gt;
* Use existing images from an OCI registry&lt;br /&gt;
&lt;br /&gt;
* Operate and access containers&lt;br /&gt;
&lt;br /&gt;
* Understand Docker networking concepts, including overlay networks&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of DNS service discovery&lt;br /&gt;
&lt;br /&gt;
* Connect container to container networks and use DNS for service discovery&lt;br /&gt;
&lt;br /&gt;
* Understand Docker storage concepts&lt;br /&gt;
&lt;br /&gt;
* Use Docker volumes for shared and persistent container storage&lt;br /&gt;
&lt;br /&gt;
* Awareness of rootless containers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker container *&lt;br /&gt;
&lt;br /&gt;
* docker network *&lt;br /&gt;
&lt;br /&gt;
* docker image *&lt;br /&gt;
&lt;br /&gt;
* docker volume *&lt;br /&gt;
&lt;br /&gt;
* podman container *&lt;br /&gt;
&lt;br /&gt;
* podman network *&lt;br /&gt;
&lt;br /&gt;
* podman image *&lt;br /&gt;
&lt;br /&gt;
* podman volume *&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.2 Container Orchestration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to run and manage multiple containers that work together to provide a service. This includes the orchestration of Docker containers using Docker Compose.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the application model of Docker Compose and Podman Compose&lt;br /&gt;
&lt;br /&gt;
* Create and run Docker Compose Files (version 3 or later)&lt;br /&gt;
&lt;br /&gt;
* Define services, networks and volumes, along with their commonly used properties, in Docker Compose files&lt;br /&gt;
&lt;br /&gt;
* Use Docker Compose to update running containers to newer images&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker compose&lt;br /&gt;
&lt;br /&gt;
* podman-compose&lt;br /&gt;
&lt;br /&gt;
* docker-compose.yml&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.3 Container Image Building (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to set up a runtime environment for containers. This includes running containers on a local workstation as well as setting up a dedicated container host. Furthermore, candidates should be aware of other container infrastructures, storage, networking and container specific security aspects. This objective covers the feature set of Docker version 17.06 or later and Docker Machine 0.12 or later.&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to build OCI container images. This includes creating Dockerfiles or Containerfiles, building containers and publishing containter images on an existing OCI registry.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create Dockerfiles and build images from Dockerfiles&lt;br /&gt;
&lt;br /&gt;
* Understand OCI image names&lt;br /&gt;
&lt;br /&gt;
* Upload images to a Docker registry&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of image scanners&lt;br /&gt;
&lt;br /&gt;
* Understand security risks of container virtualization and container images and how to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Awareness Docker buildx, Docker Buildkit, Podman build and Buildah&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker image *&lt;br /&gt;
&lt;br /&gt;
* docker login&lt;br /&gt;
&lt;br /&gt;
* Dockerfile&lt;br /&gt;
&lt;br /&gt;
* Containerfile&lt;br /&gt;
&lt;br /&gt;
* .dockerignore&lt;br /&gt;
&lt;br /&gt;
* FROM&lt;br /&gt;
&lt;br /&gt;
* COPY&lt;br /&gt;
&lt;br /&gt;
* ADD&lt;br /&gt;
&lt;br /&gt;
* RUN&lt;br /&gt;
&lt;br /&gt;
* VOLUME&lt;br /&gt;
&lt;br /&gt;
* EXPOSE&lt;br /&gt;
&lt;br /&gt;
* USER&lt;br /&gt;
&lt;br /&gt;
* WORKDIR&lt;br /&gt;
&lt;br /&gt;
* ENV&lt;br /&gt;
&lt;br /&gt;
* ARG&lt;br /&gt;
&lt;br /&gt;
* CMD&lt;br /&gt;
&lt;br /&gt;
* ENTRYPOINT&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;703 Kubernetes&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.1 Kubernetes Architecture and Usage (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the major components of Kubernetes. Futhermore, candidates should be able to interact with an existing Kubernetes platform to retrieve information about the current Kubernets state, and create, modify and delete resources.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the major components and services in a Kubernetes cluster&lt;br /&gt;
&lt;br /&gt;
* Configure kubectl to use an existing Kubernetes cluster&lt;br /&gt;
&lt;br /&gt;
* Use kubectl to get information about Kubernetes resources&lt;br /&gt;
&lt;br /&gt;
* Use kubectl to create, modify and delete resources&lt;br /&gt;
&lt;br /&gt;
* Awareness of Kubernetes Operators&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* API-Server, etcd, Controller Manager, Scheduler&lt;br /&gt;
&lt;br /&gt;
* ~/.kube/config&lt;br /&gt;
&lt;br /&gt;
* kubectl get&lt;br /&gt;
&lt;br /&gt;
* kubectl describe&lt;br /&gt;
&lt;br /&gt;
* kubectl apply&lt;br /&gt;
&lt;br /&gt;
* kubectl create&lt;br /&gt;
&lt;br /&gt;
* kubectl run&lt;br /&gt;
&lt;br /&gt;
* kubectl expose &lt;br /&gt;
&lt;br /&gt;
* kubectl scale&lt;br /&gt;
&lt;br /&gt;
* kubectl set&lt;br /&gt;
&lt;br /&gt;
* kubectl edit&lt;br /&gt;
&lt;br /&gt;
* kubectl explain&lt;br /&gt;
&lt;br /&gt;
* kubectl config&lt;br /&gt;
&lt;br /&gt;
* kubectl logs&lt;br /&gt;
&lt;br /&gt;
* kubectl exec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.2 Basic Kubernetes Operations (weight: 7)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 7&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Cadidates should be able to set up applications running on Kubernetes. This includes understanding the most important kinds of Kubernetes resources, including their most important properties.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the use of Yaml files to declare Kubernetes resources&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of a Pod&lt;br /&gt;
&lt;br /&gt;
* Understanding how to use Deployments, including scaling and rolling updates&lt;br /&gt;
&lt;br /&gt;
* Understanding how to make services accessible using Services and Ingress&lt;br /&gt;
&lt;br /&gt;
* Understanding how to use storage using PersistentVolumeClaims&lt;br /&gt;
&lt;br /&gt;
* Awareness of other Kubernetes orchestation resources, i.e. DaemonSets, StatefulSets, Jobs and CronJobs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Pods&lt;br /&gt;
&lt;br /&gt;
* ReplicaSets&lt;br /&gt;
&lt;br /&gt;
* Deployments&lt;br /&gt;
&lt;br /&gt;
* Services&lt;br /&gt;
&lt;br /&gt;
* Ingress&lt;br /&gt;
&lt;br /&gt;
* PersistentVolumeClaims&lt;br /&gt;
&lt;br /&gt;
* ConfigMaps&lt;br /&gt;
&lt;br /&gt;
* Secrets&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.3 Kubernetes Package Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to use Helm to install software on Kubernetes.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of Charts, Releases and Values&lt;br /&gt;
&lt;br /&gt;
* Installation, upgrading and uninstalling software using Helm&lt;br /&gt;
&lt;br /&gt;
* Specify custom values to configure software installed using Helm&lt;br /&gt;
&lt;br /&gt;
* Awareness of Kustomize&lt;br /&gt;
&lt;br /&gt;
* Awareness of Flux CD and Argo CD&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* helm install&lt;br /&gt;
&lt;br /&gt;
* helm upgrade&lt;br /&gt;
&lt;br /&gt;
* helm list&lt;br /&gt;
&lt;br /&gt;
* helm uninstall&lt;br /&gt;
&lt;br /&gt;
* values.yaml&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;705 Security and Observability&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.1 Cloud Native Security (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the major kinds of IT threats against cloud native infrastructure, as well as common approaches to prevent such attacks and mitigate their risk. This includes handling security aspects of foreign software as well as common standards for authentication and authorization.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand core IT infrastructure components and their role in deployment &lt;br /&gt;
&lt;br /&gt;
* Understand common IT infrastructure security risks and ways to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Understand supply chain security and dependencies on foreign code&lt;br /&gt;
&lt;br /&gt;
* Understand common application security risks and ways to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of asymmetric cryptography and digital certificates&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of common standard for authentication and authorization&lt;br /&gt;
&lt;br /&gt;
* Understand how to manage user credentials and how to use advanced authentication technologies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Service exploits, brute force attacks, and denial of service attacks&lt;br /&gt;
&lt;br /&gt;
* Security updates, packet filtering and application gateways&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
* API access, permissions, verbosity and rate limits&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE IDs and CVE scores&lt;br /&gt;
&lt;br /&gt;
* Public key, private key, X.509 certificate, certificate authority&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* OAuth2, OpenID Connect and SAML&lt;br /&gt;
&lt;br /&gt;
* Two-factor authentication (2FA) and multi-factor authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
* One-time passwords (OTP), time-based one-time passwords (TOTP)&lt;br /&gt;
&lt;br /&gt;
* Authenticator applications&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.2 Prometheus Monitoring (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the role of monitoring for application and IT infrastructure. They should be familiar with the architecture and components of Prometheus. The candidate should be able to set up Prometheus and use PromQL to query monitoring data.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand goals of IT operations and service provisioning, including nonfunctional properties such as availability, latency, responsiveness&lt;br /&gt;
&lt;br /&gt;
* Understand and identify metrics and indicators to monitor and measure the technical functionality of a service&lt;br /&gt;
&lt;br /&gt;
* Understand and identify metrics and indicators to monitor and measure the logical functionality of a service&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Prometheus, including Exporters, Pushgateway, Alertmanager and Grafana&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture of Prometheus&lt;br /&gt;
&lt;br /&gt;
* Set up prometheus and configure file based service discovery&lt;br /&gt;
&lt;br /&gt;
* Monitor containers and microservices using Prometheus&lt;br /&gt;
&lt;br /&gt;
* Use PromQL to retrieve log data&lt;br /&gt;
&lt;br /&gt;
* Aggregate metrics for specific labels&lt;br /&gt;
&lt;br /&gt;
* Aggregate metrics over time&lt;br /&gt;
&lt;br /&gt;
* Awareness of common exporters&lt;br /&gt;
&lt;br /&gt;
* Awareness of application instrumentation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Prometheus, Exporters, AlertManager, Grafana&lt;br /&gt;
&lt;br /&gt;
* Label selectors&lt;br /&gt;
&lt;br /&gt;
* Instant vectors and aggregate functions&lt;br /&gt;
&lt;br /&gt;
* Range vectors and aggregate functions&lt;br /&gt;
&lt;br /&gt;
* Node Exporter and Blackbox Exporter&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.3 Log Management and Analysis (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the role of log files in operations and troubleshooting. They should be understand the major properties and features of commonly used Open Source logging stacks.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand how application and system logging works&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and features of commonly used open source logging stacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ElasticSearch and OpenSearch&lt;br /&gt;
&lt;br /&gt;
* Logstash and filebeat&lt;br /&gt;
&lt;br /&gt;
* Fluentd and FluentBit&lt;br /&gt;
&lt;br /&gt;
* Kibana&lt;br /&gt;
&lt;br /&gt;
* Loki and promtail&lt;br /&gt;
&lt;br /&gt;
* Grafana&lt;br /&gt;
&lt;br /&gt;
* Greylog2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.4 Tracing (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the concepts and importance of tracing and be familiar with the architecture of OpenTelemetry.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of tracing&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of OpenTelemetry&lt;br /&gt;
&lt;br /&gt;
* Awareness of commonly used open source telemetry analysis tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of application instrumentation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenTelemetry&lt;br /&gt;
&lt;br /&gt;
* Spans and Distributed Traces&lt;br /&gt;
&lt;br /&gt;
* Contexts, Span and Trace IDs&lt;br /&gt;
&lt;br /&gt;
* Span attributes, events, links, status and kind&lt;br /&gt;
&lt;br /&gt;
* Grafana Tempo&lt;br /&gt;
&lt;br /&gt;
* Jaeger&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=DevOps_Tools_Engineer_Objectives_V2.0&amp;diff=5738</id>
		<title>DevOps Tools Engineer Objectives V2.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=DevOps_Tools_Engineer_Objectives_V2.0&amp;diff=5738"/>
		<updated>2023-06-19T16:06:06Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This is a required exam for the Linux Professional Institute DevOps Tools Engineer certification. It covers basic skills in using tools commonly used to implement DevOps.&lt;br /&gt;
&lt;br /&gt;
This page covers the currently released objective for the Linux Professional Institute DevOps Tools Engineer certification. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
The certification holder is either a professional software developer or a professional system administrator who is involved in the production of IT solutions which require a robust and efficient process to get from original source materials to a final deployed or distributable product or service with a particular focus on using Open Source technology. The certification holder has the ability to create, deliver and operate software using collaborative methods which address aspects of software development as well as system administration. In particular, the certification holder is adept at bridging the gap between the development and operations of a solution or product. The certification holder understands how these tools facilitate development and operational tasks in the delivery of stable, scalable and up to date services to users and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 2.0.0. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[DevOps_Tools_Engineer_Objectives_V2.0|English]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams and Requirements==&lt;br /&gt;
&lt;br /&gt;
The Linux Professional Institute DevOps Tools Engineer certification is awarded after passing this exam. There is no requirement to posses another certifications. LPI recommends all Linux Professional Institute DevOps Tools Engineers to maintain at least one active certification in either system administration or software development. This certification should be on a level equivalent to LPIC-1.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;701 Software Engineering&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.1 Modern Software Development (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to design software solutions suitable for modern runtime environments. Candidates should understand how services handle data persistence, sessions, status information, transactions, concurrency, security, performance, availability, scaling, load balancing, messaging, monitoring and APIs. Furthermore, candidates should understand the implications of agile and DevOps on software development.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and design service based applications&lt;br /&gt;
&lt;br /&gt;
* Understand common API concepts and standards&lt;br /&gt;
&lt;br /&gt;
* Understand aspects of data storage, service status and session handling&lt;br /&gt;
&lt;br /&gt;
* Design software to be run in containers&lt;br /&gt;
&lt;br /&gt;
* Design software to be deployed to cloud services&lt;br /&gt;
&lt;br /&gt;
* Awareness of risks in the migration and integration of monolithic legacy software&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of agile software development&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of DevOps and its implications to software developers and operators&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* REST, JSON&lt;br /&gt;
&lt;br /&gt;
* Service Orientated Architectures (SOA)&lt;br /&gt;
&lt;br /&gt;
* Microservices&lt;br /&gt;
&lt;br /&gt;
* Immutable servers&lt;br /&gt;
&lt;br /&gt;
* Loose coupling&lt;br /&gt;
&lt;br /&gt;
* Cross site scripting, SQL injections, verbose error reports, API authentication, consistent enforcement of transport encryption&lt;br /&gt;
&lt;br /&gt;
* CORS headers and CSRF tokens&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.2 Standard Components and Platforms for Software (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand services offered by common cloud platforms. They should be able to include these services in their application architectures and deployment toolchains and understand the required service configurations. Futhermore, the candidate should be aware of the commonly used open source implementations of the various services.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of object storage&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of relational and NoSQL databases&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of message brokers and message queues&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of big data services&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of application runtimes / PaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of hosted applications / SaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of function applications / FaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of content delivery networks&lt;br /&gt;
&lt;br /&gt;
* Awareness of identity and access management in cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Objects, Buckets, ACLs, S3&lt;br /&gt;
&lt;br /&gt;
* MariaDB, MySQL, PostgreSQL,&lt;br /&gt;
&lt;br /&gt;
* Redis, MongoDB, InfluxDB&lt;br /&gt;
&lt;br /&gt;
* ElasticSearch and OpenSearch&lt;br /&gt;
&lt;br /&gt;
* Kafka, MQTT&lt;br /&gt;
&lt;br /&gt;
* IAM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.3 Source Code Management (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to use Git to manage and share source code. This includes creating and contributing to a repository as well as the usage of tags, branches and remote repositories. Furthermore, the candidate should be able to merge files and resolve merging conflicts. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand Git concepts and repository structure&lt;br /&gt;
&lt;br /&gt;
* Manage files within a Git repository&lt;br /&gt;
&lt;br /&gt;
* Manage branches and tags&lt;br /&gt;
&lt;br /&gt;
* Work with remote repositories and branches as well as submodules&lt;br /&gt;
&lt;br /&gt;
* Merge files and branches&lt;br /&gt;
&lt;br /&gt;
* Awareness of SVN and CVS, including concepts of centralized and distributed SCM solutions&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* .gitignore&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.4 Continuous Integration and Continuous Delivery (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the principles and components of a continuous integration and continuous delivery pipeline. Candidates should understand how CI/CD pipelines support the development and release of software and how they integrate with source code repositories and the target runtime environment. Furthermore, candidates should be aware of commonly used CI/CD platforms.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Continuous Integration and Continuous Delivery&lt;br /&gt;
&lt;br /&gt;
* Understand the components of a CI/CD pipeline, including builds, unit, integration and acceptance tests, artifact management, delivery and deployment&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of GitOps&lt;br /&gt;
&lt;br /&gt;
* Understand the role of build artifacts and caches&lt;br /&gt;
&lt;br /&gt;
* Understand deployment best practices&lt;br /&gt;
&lt;br /&gt;
* Awareness of Jenkins and Gitlab CI&lt;br /&gt;
&lt;br /&gt;
* Awareness of Artifactory and Nexus&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Declarative Pipeline&lt;br /&gt;
&lt;br /&gt;
* Production, Staging and Development Environments&lt;br /&gt;
&lt;br /&gt;
* Feature toggles&lt;br /&gt;
&lt;br /&gt;
* Preview releases&lt;br /&gt;
&lt;br /&gt;
* Reconciliation loops&lt;br /&gt;
&lt;br /&gt;
* A/B testing&lt;br /&gt;
&lt;br /&gt;
* Blue-green and canary deployment&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.5 Software Composition, Licensing and Open Source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the principles of software licenses. This includes how software from multiple authors and sources are combined to implement a specific service and how licensing affects such compositions. Futhermore, the candidate should understand the concepts of open source software, including the most important aspects of common open source licenses.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand how an application is build out of multiple software components&lt;br /&gt;
&lt;br /&gt;
* Awareness of dependency managers like NPM, gradle or composer&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts proprietary and open source software&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of open source software licenses&lt;br /&gt;
&lt;br /&gt;
* Awareness of commonly used open source licenses (GPL, LGPL, AGPL, BSD, MIT and Apache License)&lt;br /&gt;
&lt;br /&gt;
* Awareness of license compatibility and multi licensing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software libraries&lt;br /&gt;
&lt;br /&gt;
* Software Bill Of Materials&lt;br /&gt;
&lt;br /&gt;
* Proprietary software&lt;br /&gt;
&lt;br /&gt;
* Open Source Software and Free Software&lt;br /&gt;
&lt;br /&gt;
* Copyleft open source sofware licenses&lt;br /&gt;
&lt;br /&gt;
* Permissive open source software licenses&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;702 Application Container&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.1 Application Container Management (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to operate Docker and Podman containers. This includes creating and interacting with containers as well as connecting containers to networks and storage volumes.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the Docker and Podman architecture&lt;br /&gt;
&lt;br /&gt;
* Use existing images from an OCI registry&lt;br /&gt;
&lt;br /&gt;
* Operate and access containers&lt;br /&gt;
&lt;br /&gt;
* Understand Docker networking concepts, including overlay networks&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of DNS service discovery&lt;br /&gt;
&lt;br /&gt;
* Connect container to container networks and use DNS for service discovery&lt;br /&gt;
&lt;br /&gt;
* Understand Docker storage concepts&lt;br /&gt;
&lt;br /&gt;
* Use Docker volumes for shared and persistent container storage&lt;br /&gt;
&lt;br /&gt;
* Awareness of rootless containers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker container *&lt;br /&gt;
&lt;br /&gt;
* docker network *&lt;br /&gt;
&lt;br /&gt;
* docker image *&lt;br /&gt;
&lt;br /&gt;
* docker volume *&lt;br /&gt;
&lt;br /&gt;
* podman container *&lt;br /&gt;
&lt;br /&gt;
* podman network *&lt;br /&gt;
&lt;br /&gt;
* podman image *&lt;br /&gt;
&lt;br /&gt;
* podman volume *&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.2 Container Orchestration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to run and manage multiple containers that work together to provide a service. This includes the orchestration of Docker containers using Docker Compose.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the application model of Docker Compose and Podman Compose&lt;br /&gt;
&lt;br /&gt;
* Create and run Docker Compose Files (version 3 or later)&lt;br /&gt;
&lt;br /&gt;
* Define services, networks and volumes, along with their commonly used properties, in Docker Compose files&lt;br /&gt;
&lt;br /&gt;
* Use Docker Compose to update running containers to newer images&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker compose&lt;br /&gt;
&lt;br /&gt;
* podman-compose&lt;br /&gt;
&lt;br /&gt;
* docker-compose.yml&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.3 Container Image Building (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to set up a runtime environment for containers. This includes running containers on a local workstation as well as setting up a dedicated container host. Furthermore, candidates should be aware of other container infrastructures, storage, networking and container specific security aspects. This objective covers the feature set of Docker version 17.06 or later and Docker Machine 0.12 or later.&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to build OCI container images. This includes creating Dockerfiles or Containerfiles, building containers and publishing containter images on an existing OCI registry.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create Dockerfiles and build images from Dockerfiles&lt;br /&gt;
&lt;br /&gt;
* Understand OCI image names&lt;br /&gt;
&lt;br /&gt;
* Upload images to a Docker registry&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of image scanners&lt;br /&gt;
&lt;br /&gt;
* Understand security risks of container virtualization and container images and how to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Awareness Docker buildx, Docker Buildkit, Podman build and Buildah&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker image *&lt;br /&gt;
&lt;br /&gt;
* docker login&lt;br /&gt;
&lt;br /&gt;
* Dockerfile&lt;br /&gt;
&lt;br /&gt;
* Containerfile&lt;br /&gt;
&lt;br /&gt;
* .dockerignore&lt;br /&gt;
&lt;br /&gt;
* FROM&lt;br /&gt;
&lt;br /&gt;
* COPY&lt;br /&gt;
&lt;br /&gt;
* ADD&lt;br /&gt;
&lt;br /&gt;
* RUN&lt;br /&gt;
&lt;br /&gt;
* VOLUME&lt;br /&gt;
&lt;br /&gt;
* EXPOSE&lt;br /&gt;
&lt;br /&gt;
* USER&lt;br /&gt;
&lt;br /&gt;
* WORKDIR&lt;br /&gt;
&lt;br /&gt;
* ENV&lt;br /&gt;
&lt;br /&gt;
* ARG&lt;br /&gt;
&lt;br /&gt;
* CMD&lt;br /&gt;
&lt;br /&gt;
* ENTRYPOINT&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;703 Kubernetes&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.1 Kubernetes Architecture and Usage (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the major components of Kubernetes. Futhermore, candidates should be able to interact with an existing Kubernetes platform to retrieve information about the current Kubernets state, and create, modify and delete resources.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the major components and services in a Kubernetes cluster&lt;br /&gt;
&lt;br /&gt;
* Configure kubectl to use an existing Kubernetes cluster&lt;br /&gt;
&lt;br /&gt;
* Use kubectl to get information about Kubernetes resources&lt;br /&gt;
&lt;br /&gt;
* Use kubectl to create, modify and delete resources&lt;br /&gt;
&lt;br /&gt;
* Awareness of Kubernetes Operators&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* API-Server, etcd, Controller Manager, Scheduler&lt;br /&gt;
&lt;br /&gt;
* ~/.kube/config&lt;br /&gt;
&lt;br /&gt;
* kubectl get&lt;br /&gt;
&lt;br /&gt;
* kubectl describe&lt;br /&gt;
&lt;br /&gt;
* kubectl apply&lt;br /&gt;
&lt;br /&gt;
* kubectl create&lt;br /&gt;
&lt;br /&gt;
* kubectl run&lt;br /&gt;
&lt;br /&gt;
* kubectl expose &lt;br /&gt;
&lt;br /&gt;
* kubectl scale&lt;br /&gt;
&lt;br /&gt;
* kubectl set&lt;br /&gt;
&lt;br /&gt;
* kubectl edit&lt;br /&gt;
&lt;br /&gt;
* kubectl explain&lt;br /&gt;
&lt;br /&gt;
* kubectl config&lt;br /&gt;
&lt;br /&gt;
* kubectl logs&lt;br /&gt;
&lt;br /&gt;
* kubectl exec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.2 Basic Kubernetes Operations (weight: 7)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 7&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Cadidates should be able to set up applications running on Kubernetes. This includes understanding the most important kinds of Kubernetes resources, including their most important properties.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the use of Yaml files to declare Kubernetes resources&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of a Pod&lt;br /&gt;
&lt;br /&gt;
* Understanding how to use Deployments, including scaling and rolling updates&lt;br /&gt;
&lt;br /&gt;
* Understanding how to make services accessible using Services and Ingress&lt;br /&gt;
&lt;br /&gt;
* Understanding how to use storage using PersistentVolumeClaims&lt;br /&gt;
&lt;br /&gt;
* Awareness of other Kubernetes orchestation resources, i.e. DaemonSets, StatefulSets, Jobs and CronJobs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Pods&lt;br /&gt;
&lt;br /&gt;
* ReplicaSets&lt;br /&gt;
&lt;br /&gt;
* Deployments&lt;br /&gt;
&lt;br /&gt;
* Services&lt;br /&gt;
&lt;br /&gt;
* Ingress&lt;br /&gt;
&lt;br /&gt;
* PersistentVolumeClaims&lt;br /&gt;
&lt;br /&gt;
* ConfigMaps&lt;br /&gt;
&lt;br /&gt;
* Secrets&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.3 Kubernetes Package Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to use Helm to install software on Kubernetes.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of Charts, Releases and Values&lt;br /&gt;
&lt;br /&gt;
* Installation, upgrading and uninstalling software using Helm&lt;br /&gt;
&lt;br /&gt;
* Specify custom values to configure software installed using Helm&lt;br /&gt;
&lt;br /&gt;
* Awareness of Kustomize&lt;br /&gt;
&lt;br /&gt;
* Awareness of Flux CD and Argo CD&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* helm install&lt;br /&gt;
&lt;br /&gt;
* helm upgrade&lt;br /&gt;
&lt;br /&gt;
* helm list&lt;br /&gt;
&lt;br /&gt;
* helm uninstall&lt;br /&gt;
&lt;br /&gt;
* values.yaml&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;705 Security and Observability&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.1 Cloud Native Security (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the major kinds of IT threats against cloud native infrastructure, as well as common approaches to prevent such attacks and mitigate their risk. This includes handling security aspects of foreign software as well as common standards for authentication and authorization.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand core IT infrastructure components and their role in deployment &lt;br /&gt;
&lt;br /&gt;
* Understand common IT infrastructure security risks and ways to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Understand supply chain security and dependencies on foreign code&lt;br /&gt;
&lt;br /&gt;
* Understand common application security risks and ways to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of asymmetric cryptography and digital certificates&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of common standard for authentication and authorization&lt;br /&gt;
&lt;br /&gt;
* Understand how to manage user credentials and how to use advanced authentication technologies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Service exploits, brute force attacks, and denial of service attacks&lt;br /&gt;
&lt;br /&gt;
* Security updates, packet filtering and application gateways&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
* API access, permissions, verbosity and rate limits&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE IDs and CVE scores&lt;br /&gt;
&lt;br /&gt;
* Public key, private key, X.509 certificate, certificate authority&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* OAuth2, OpenID Connect and SAML&lt;br /&gt;
&lt;br /&gt;
* Two-factor authentication (2FA) and multi-factor authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
* One-time passwords (OTP), time-based one-time passwords (TOTP)&lt;br /&gt;
&lt;br /&gt;
* Authenticator applications&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.2 Prometheus Monitoring (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the role of monitoring for application and IT infrastructure. They should be familiar with the architecture and components of Prometheus. The candidate should be able to set up Prometheus and use PromQL to query monitoring data.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand goals of IT operations and service provisioning, including nonfunctional properties such as availability, latency, responsiveness&lt;br /&gt;
&lt;br /&gt;
* Understand and identify metrics and indicators to monitor and measure the technical functionality of a service&lt;br /&gt;
&lt;br /&gt;
* Understand and identify metrics and indicators to monitor and measure the logical functionality of a service&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Prometheus, including Exporters, Pushgateway, Alertmanager and Grafana&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture of Prometheus&lt;br /&gt;
&lt;br /&gt;
* Set up prometheus and configure file based service discovery&lt;br /&gt;
&lt;br /&gt;
* Monitor containers and microservices using Prometheus&lt;br /&gt;
&lt;br /&gt;
* Use PromQL to retrieve log data&lt;br /&gt;
&lt;br /&gt;
* Aggregate metrics for specific labels&lt;br /&gt;
&lt;br /&gt;
* Aggregate metrics over time&lt;br /&gt;
&lt;br /&gt;
* Awareness of common exporters&lt;br /&gt;
&lt;br /&gt;
* Awareness of application instrumentation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Prometheus, Exporters, AlertManager, Grafana&lt;br /&gt;
&lt;br /&gt;
* Label selectors&lt;br /&gt;
&lt;br /&gt;
* Instant vectors and aggregate functions&lt;br /&gt;
&lt;br /&gt;
* Range vectors and aggregate functions&lt;br /&gt;
&lt;br /&gt;
* Node Exporter and Blackbox Exporter&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.3 Log Management and Analysis (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the role of log files in operations and troubleshooting. They should be understand the major properties and features of commonly used Open Source logging stacks.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand how application and system logging works&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and features of commonly used open source logging stacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ElasticSearch and OpenSearch&lt;br /&gt;
&lt;br /&gt;
* Logstash and filebeat&lt;br /&gt;
&lt;br /&gt;
* Fluentd and FluentBit&lt;br /&gt;
&lt;br /&gt;
* Kibana&lt;br /&gt;
&lt;br /&gt;
* Loki and promtail&lt;br /&gt;
&lt;br /&gt;
* Grafana&lt;br /&gt;
&lt;br /&gt;
* Greylog2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.4 Tracing (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the concepts and importance of tracing and be familiar with the architecture of OpenTelemetry.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of tracing&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of OpenTelemetry&lt;br /&gt;
&lt;br /&gt;
* Awareness of commonly used open source telemetry analysis tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of application instrumentation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenTelemetry&lt;br /&gt;
&lt;br /&gt;
* Spans and Distributed Traces&lt;br /&gt;
&lt;br /&gt;
* Contexts, Span and Trace IDs&lt;br /&gt;
&lt;br /&gt;
* Span attributes, events, links, status and kind&lt;br /&gt;
&lt;br /&gt;
* Grafana Tempo&lt;br /&gt;
&lt;br /&gt;
* Jaeger&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V4.5&amp;diff=5722</id>
		<title>LPIC-2 Objectives V4.5</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V4.5&amp;diff=5722"/>
		<updated>2023-03-28T17:34:17Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 208.1 Basic Apache configuration (weight: 4) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, web cache/proxy, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy, FTP server).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are version 4.5.0.  This version is to go live on February 13th, 2017.&lt;br /&gt;
&lt;br /&gt;
This is also a [[LPIC-2_Summary_Version_4.0_To_4.5|summary and detailed information]] on the changes from version 4.0.x to 4.5.0 of the objectives.&lt;br /&gt;
&lt;br /&gt;
The [[LPIC-2_Objectives_V4|version 4.0 of the LPIC-2 Objectives]] are still online.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version Update (February 13th, 2017)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* updated to version 4.5.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V4.5|English]]&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V4.5(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V4.5(FR)|French]]&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V4.5(DE)|German]]&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V4.5(PT-BR)|Portuguese]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: Capacity Planning&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Measure and Troubleshoot Resource Usage (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource and network bandwidth, identify and troubleshoot resource problems.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU usage.&lt;br /&gt;
&lt;br /&gt;
* Measure memory usage.&lt;br /&gt;
&lt;br /&gt;
* Measure disk I/O.&lt;br /&gt;
&lt;br /&gt;
* Measure network I/O.&lt;br /&gt;
&lt;br /&gt;
* Measure firewalling and routing throughput.&lt;br /&gt;
&lt;br /&gt;
* Map client bandwidth usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar &lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* processes blocked on I/O&lt;br /&gt;
&lt;br /&gt;
* blocks in&lt;br /&gt;
&lt;br /&gt;
* blocks out &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Predict Future Resource Needs (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to monitor resource usage to predict future resource needs.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use monitoring and measurement tools to monitor IT infrastructure usage.&lt;br /&gt;
&lt;br /&gt;
* Predict capacity break point of a configuration.&lt;br /&gt;
&lt;br /&gt;
* Observe growth rate of capacity usage.&lt;br /&gt;
&lt;br /&gt;
* Graph the trend of capacity usage.&lt;br /&gt;
&lt;br /&gt;
* Awareness of monitoring solutions such as Icinga2, Nagios, collectd, MRTG and Cacti&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* diagnose&lt;br /&gt;
&lt;br /&gt;
* predict growth&lt;br /&gt;
&lt;br /&gt;
* resource exhaustion&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Linux Kernel&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.1 Kernel components (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to utilise kernel components that are necessary to specific hardware, hardware drivers, system resources and requirements. This objective includes implementing different types of kernel images, understanding stable and longterm kernels and patches, as well as using kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kernel 2.6.x, 3.x and 4.x documentation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/linux/&lt;br /&gt;
&lt;br /&gt;
* /usr/src/linux/Documentation/&lt;br /&gt;
&lt;br /&gt;
* zImage&lt;br /&gt;
&lt;br /&gt;
* bzImage &lt;br /&gt;
&lt;br /&gt;
* xz compression&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.2 Compiling a Linux kernel (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure a kernel to include or disable specific features of the Linux kernel as necessary. This objective includes compiling and recompiling the Linux kernel as needed, updating and noting changes in a new kernel, creating an initrd image and installing new kernels.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/linux/&lt;br /&gt;
&lt;br /&gt;
* Kernel Makefiles&lt;br /&gt;
&lt;br /&gt;
* Kernel 2.6.x, 3.x and 4.x make targets &lt;br /&gt;
&lt;br /&gt;
* Customize the current kernel configuration.&lt;br /&gt;
&lt;br /&gt;
* Build a new kernel and appropriate kernel modules.&lt;br /&gt;
&lt;br /&gt;
* Install a new kernel and any modules.&lt;br /&gt;
&lt;br /&gt;
* Ensure that the boot manager can locate the new kernel and associated files.&lt;br /&gt;
&lt;br /&gt;
* Module configuration files&lt;br /&gt;
&lt;br /&gt;
* Use DKMS to compile kernel modules.&lt;br /&gt;
&lt;br /&gt;
* Awareness of dracut&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mkinitrd&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* make targets (all, config, xconfig, menuconfig, gconfig, oldconfig, mrproper, zImage, bzImage, modules, modules_install, rpm-pkg, binrpm-pkg, deb-pkg) &lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2 &lt;br /&gt;
&lt;br /&gt;
* module tools&lt;br /&gt;
&lt;br /&gt;
* /usr/src/linux/.config&lt;br /&gt;
&lt;br /&gt;
* /lib/modules/kernel-version/&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* dkms&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.3 Kernel runtime management and troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage and/or query a 2.6.x, 3.x or 4.x kernel and its loadable modules.  Candidates should be able to identify and correct common boot and run time issues. Candidates should understand device detection and management using udev. This objective includes troubleshooting udev rules. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use command-line utilities to get information about the currently running kernel and kernel modules.&lt;br /&gt;
&lt;br /&gt;
* Manually load and unload kernel modules.&lt;br /&gt;
&lt;br /&gt;
* Determine when modules can be unloaded.&lt;br /&gt;
&lt;br /&gt;
* Determine what parameters a module accepts.&lt;br /&gt;
&lt;br /&gt;
* Configure the system to load modules by names other than their file name. &lt;br /&gt;
&lt;br /&gt;
* /proc filesystem&lt;br /&gt;
&lt;br /&gt;
* Content of /, /boot/ , and /lib/modules/&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to analyse information about the available hardware&lt;br /&gt;
&lt;br /&gt;
* udev rules&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /lib/modules/kernel-version/modules.dep&lt;br /&gt;
&lt;br /&gt;
* module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/kernel/&lt;br /&gt;
&lt;br /&gt;
* /sbin/depmod&lt;br /&gt;
&lt;br /&gt;
* /sbin/rmmod&lt;br /&gt;
&lt;br /&gt;
* /sbin/modinfo&lt;br /&gt;
&lt;br /&gt;
* /bin/dmesg&lt;br /&gt;
&lt;br /&gt;
* /sbin/lspci&lt;br /&gt;
&lt;br /&gt;
* /usr/bin/lsdev&lt;br /&gt;
&lt;br /&gt;
* /sbin/lsmod&lt;br /&gt;
&lt;br /&gt;
* /sbin/modprobe&lt;br /&gt;
&lt;br /&gt;
* /sbin/insmod&lt;br /&gt;
&lt;br /&gt;
* /bin/uname&lt;br /&gt;
&lt;br /&gt;
* /usr/bin/lsusb &lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.d/&lt;br /&gt;
&lt;br /&gt;
* /sbin/sysctl &lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;202.1 Customizing system startup (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to query and modify the behaviour of system services at various targets / run levels. A thorough understanding of the systemd, SysV Init and the Linux boot process is required. This objective includes interacting with systemd targets and SysV init run levels.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd&lt;br /&gt;
&lt;br /&gt;
* SysV init&lt;br /&gt;
&lt;br /&gt;
* Linux Standard Base Specification (LSB) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
* /etc/inittab&lt;br /&gt;
&lt;br /&gt;
* /etc/init.d/&lt;br /&gt;
&lt;br /&gt;
* /etc/rc.d/&lt;br /&gt;
&lt;br /&gt;
* chkconfig&lt;br /&gt;
&lt;br /&gt;
* update-rc.d&lt;br /&gt;
&lt;br /&gt;
* init and telinit&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;202.2 System recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* NVMe booting&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2 and Legacy&lt;br /&gt;
&lt;br /&gt;
* grub shell &lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* inittab, telinit and init with SysV init&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;202.3 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* Awareness of systemd-boot and U-Boot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
* Understanding of systemd mount units&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Maintaining a Linux filesystem (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly maintain a Linux filesystem using system utilities. This objective includes manipulating standard filesystems and monitoring SMART devices.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to manipulate and ext2, ext3 and ext4&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to perform basic Btrfs operations, including subvolumes and snapshots&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to manipulate XFS &lt;br /&gt;
&lt;br /&gt;
* Awareness of ZFS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mkfs (mkfs.*)&lt;br /&gt;
&lt;br /&gt;
* mkswap&lt;br /&gt;
&lt;br /&gt;
* fsck (fsck.*)&lt;br /&gt;
&lt;br /&gt;
* tune2fs, dumpe2fs and debugfs&lt;br /&gt;
&lt;br /&gt;
* btrfs, btrfs-convert&lt;br /&gt;
&lt;br /&gt;
* xfs_info, xfs_check, xfs_repair, xfsdump and xfsrestore&lt;br /&gt;
&lt;br /&gt;
* smartd, smartctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.3 Creating and configuring filesystem options (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure automount filesystems using AutoFS. This objective includes configuring automount for network and device filesystems. Also included is creating filesystems for devices such as CD-ROMs and a basic feature knowledge of encrypted filesystems.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* autofs configuration files&lt;br /&gt;
&lt;br /&gt;
* Understanding of automount units&lt;br /&gt;
&lt;br /&gt;
* UDF and ISO9660 tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Awareness of other CD-ROM filesystems (HFS)&lt;br /&gt;
&lt;br /&gt;
* Awareness of CD-ROM filesystem extensions (Joliet, Rock Ridge, El Torito) &lt;br /&gt;
&lt;br /&gt;
* Basic feature knowledge of data encryption (dm-crypt / LUKS)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/auto.master&lt;br /&gt;
&lt;br /&gt;
* /etc/auto.[dir]&lt;br /&gt;
&lt;br /&gt;
* mkisofs&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Adjusting Storage Device Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure kernel options to support various drives. This objective includes software tools to view &amp;amp; modify hard disk settings including iSCSI devices.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to configure DMA for IDE devices including ATAPI and SATA&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to configure Solid State Drives including AHCI and NVMe &lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to manipulate or analyse system resources (e.g. interrupts)&lt;br /&gt;
&lt;br /&gt;
* Awareness of sdparm command and its uses &lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for iSCSI&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* hdparm, sdparm&lt;br /&gt;
&lt;br /&gt;
* nvme&lt;br /&gt;
&lt;br /&gt;
* tune2fs&lt;br /&gt;
&lt;br /&gt;
* fstrim&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
* /dev/hd*, /dev/sd*, /dev/nvme*&lt;br /&gt;
&lt;br /&gt;
* iscsiadm, scsi_id, iscsid and iscsid.conf&lt;br /&gt;
&lt;br /&gt;
* WWID, WWN, LUN numbers&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Logical Volume Manager (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/ &lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Basic networking configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a network device to be able to connect to a local, wired or wireless, and a wide-area network. This objective includes being able to communicate between various subnets within a single network including both IPv4 and IPv6 networks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Utilities to configure and manipulate ethernet network interfaces&lt;br /&gt;
&lt;br /&gt;
* Configuring basic access to wireless networks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ifconfig&lt;br /&gt;
&lt;br /&gt;
* route&lt;br /&gt;
&lt;br /&gt;
* arp&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Advanced Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a network device to implement various network authentication schemes. This objective includes configuring a multi-homed network device and resolving communication problems.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Utilities to manipulate routing tables&lt;br /&gt;
&lt;br /&gt;
* Utilities to configure and manipulate ethernet network interfaces&lt;br /&gt;
&lt;br /&gt;
* Utilities to analyse the status of the network devices&lt;br /&gt;
&lt;br /&gt;
* Utilities to monitor and analyse the TCP/IP traffic&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ifconfig&lt;br /&gt;
&lt;br /&gt;
* route&lt;br /&gt;
&lt;br /&gt;
* arp&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* ping, ping6&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* tcpdump&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Troubleshooting network issues (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues, to include knowledge of locations for basic configuration files and commands.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Location and content of access restriction files&lt;br /&gt;
&lt;br /&gt;
* Utilities to configure and manipulate ethernet network interfaces&lt;br /&gt;
&lt;br /&gt;
* Utilities to manage routing tables&lt;br /&gt;
&lt;br /&gt;
* Utilities to list network states.&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Methods of information about the recognised and used hardware devices&lt;br /&gt;
&lt;br /&gt;
* System initialisation files and their contents (Systemd and SysV init)&lt;br /&gt;
&lt;br /&gt;
* Awareness of NetworkManager and its impact on network configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ifconfig&lt;br /&gt;
&lt;br /&gt;
* route&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* /etc/network/, /etc/sysconfig/network-scripts/&lt;br /&gt;
&lt;br /&gt;
* ping, ping6&lt;br /&gt;
&lt;br /&gt;
* traceroute, traceroute6&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* System log files such as /var/log/syslog, /var/log/messages and the systemd journal&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts.allow, /etc/hosts.deny&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 206: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;206.1 Make and install programs from source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install &lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;206.2 Backup operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Amanda, Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, CDR, disk or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups.&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files.&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /bin/sh&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;206.3 Notify users on system-related issues (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to notify the users about current issues related to the system. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Automate communication with users through logon messages.&lt;br /&gt;
&lt;br /&gt;
* Inform active users of system maintenance &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/issue&lt;br /&gt;
&lt;br /&gt;
* /etc/issue.net&lt;br /&gt;
&lt;br /&gt;
* /etc/motd&lt;br /&gt;
&lt;br /&gt;
* wall&lt;br /&gt;
&lt;br /&gt;
* shutdown &lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS server configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq, djbdns and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and maintain DNS zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone and hints for root level servers. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* nslookup&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DNS server to run as a non-root user and run in a chroot jail. This objective includes secure exchange of data between DNS servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Configuring BIND to run in a chroot jail&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 Basic Apache configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache 2.4 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* mod_perl and PHP configuration&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Apache 2.4 virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customize file access &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 Apache configuration for HTTPS (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a web server to provide HTTPS. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Configure Virtual Hosting using SNI&lt;br /&gt;
&lt;br /&gt;
* Awareness of the issues with Virtual Hosting and use of SSL&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, disable insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache2 configuration files&lt;br /&gt;
&lt;br /&gt;
* /etc/ssl/, /etc/pki/&lt;br /&gt;
&lt;br /&gt;
* openssl, CA.pl&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLCACertificateFile, SSLCACertificatePath&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Implementing Squid as a caching proxy (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a proxy server, including access policies, authentication and resource usage.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Squid 3.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods&lt;br /&gt;
&lt;br /&gt;
* Client user authentication methods&lt;br /&gt;
&lt;br /&gt;
* Layout and content of ACL in the Squid configuration files &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* squid.conf&lt;br /&gt;
&lt;br /&gt;
* acl&lt;br /&gt;
&lt;br /&gt;
* http_access &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 Implementing Nginx as a web server and a reverse proxy (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a reverse proxy server, Nginx.  Basic configuration of Nginx as a HTTP server is included. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Nginx&lt;br /&gt;
&lt;br /&gt;
* Reverse Proxy&lt;br /&gt;
&lt;br /&gt;
* Basic Web Server&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/nginx/&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba Server Configuration (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 documentation&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-Level, Share-Level and AD security &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd, nmblookup&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
* /var/log/samba/ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to certain hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
* TCP Wrappers &lt;br /&gt;
&lt;br /&gt;
* Awareness of NFSv4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* DHCP configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated range setup &lt;br /&gt;
&lt;br /&gt;
* Awareness of DHCPv6 and IPv6 Router Advertisements&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
* arp&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_cracklib, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP client usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Configuring an OpenLDAP server (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a basic OpenLDAP server including knowledge of LDIF format and essential access controls.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenLDAP&lt;br /&gt;
&lt;br /&gt;
* Directory based configuration&lt;br /&gt;
&lt;br /&gt;
* Access Control&lt;br /&gt;
&lt;br /&gt;
* Distinguished Names&lt;br /&gt;
&lt;br /&gt;
* Changetype Operations&lt;br /&gt;
&lt;br /&gt;
* Schemas and Whitepages&lt;br /&gt;
&lt;br /&gt;
* Directories&lt;br /&gt;
&lt;br /&gt;
* Object IDs, Attributes and Classes&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* slapd&lt;br /&gt;
&lt;br /&gt;
* slapd-config&lt;br /&gt;
&lt;br /&gt;
* LDIF&lt;br /&gt;
&lt;br /&gt;
* slapadd&lt;br /&gt;
&lt;br /&gt;
* slapcat&lt;br /&gt;
&lt;br /&gt;
* slapindex&lt;br /&gt;
&lt;br /&gt;
* /var/lib/ldap/&lt;br /&gt;
&lt;br /&gt;
* loglevel&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: E-Mail Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using e-mail servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an e-mail server, including the configuration of e-mail aliases, e-mail quotas and virtual e-mail domains. This objective includes configuring internal e-mail relays and monitoring e-mail servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Awareness of sendmail and exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* sendmail emulation layer commands&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing E-Mail Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client e-mail management software to filter, sort and monitor incoming user e-mail. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
* Awareness of procmail&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure POP and IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP and POP3 configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
* Awareness of Courier&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a router (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.2 Managing FTP servers (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure an FTP server for anonymous downloads and uploads. This objective includes precautions to be taken if anonymous uploads are permitted and configuring user access.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files, tools and utilities for Pure-FTPd and vsftpd&lt;br /&gt;
&lt;br /&gt;
* Awareness of ProFTPd&lt;br /&gt;
&lt;br /&gt;
* Understanding of passive vs. active FTP connections &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* vsftpd.conf&lt;br /&gt;
&lt;br /&gt;
* important Pure-FTPd command line options &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Secure shell (SSH) (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys and configuring SSH for users. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Managing and using server and client keys to login with and without password&lt;br /&gt;
&lt;br /&gt;
* Usage of multiple connections from multiple hosts to guard against loss of connection to remote host following configuration changes &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* Private and public key files&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication, Protocol &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security tasks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to receive security alerts from various sources, install, configure and run intrusion detection systems and apply security patches and bugfixes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Locations and organisations that report security alerts as Bugtraq, CERT or other sources&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to implement an intrusion detection system (IDS)&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 OpenVPN (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenVPN &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/openvpn/&lt;br /&gt;
&lt;br /&gt;
* openvpn&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Extend the amount of NetworkManager covered, i.e. including the CLI&lt;br /&gt;
&lt;br /&gt;
* lighttpd would have been too much coverage of web services.  Perhaps reduce Apache next revision to make room.&lt;br /&gt;
&lt;br /&gt;
* host level IDS (tripwire, AIDE, etc) to be covered in future LPIC-1.&lt;br /&gt;
&lt;br /&gt;
* introduction (or more) to FreeIPA&lt;br /&gt;
&lt;br /&gt;
* add coverage of mod_security and mod_evasive to Apache HTTP (maybe as a separate topic: Web Application Firewall)&lt;br /&gt;
&lt;br /&gt;
* add coverage of a higher-level firewall package like firewalld or ufw&lt;br /&gt;
&lt;br /&gt;
* Reconsider mod_perl&lt;br /&gt;
&lt;br /&gt;
* Add firewall-cmd and /etc/firewalld/firewalld.conf related to firewalld to LPIC-2&lt;br /&gt;
&lt;br /&gt;
* Awareness of firewalld&lt;br /&gt;
&lt;br /&gt;
* Add nmcli and nmtui to LPIC-2&lt;br /&gt;
&lt;br /&gt;
* Full coverage of IPv6 auto configuration&lt;br /&gt;
&lt;br /&gt;
* Remove djbdns&lt;br /&gt;
&lt;br /&gt;
* Advanced shell scripting (sed -e, set -x, set -o, pipefail, PIPESTATUS, declare)&lt;br /&gt;
&lt;br /&gt;
* Filesystem quota (similar to the topic removed from LPIC-1)&lt;br /&gt;
&lt;br /&gt;
* Understanding of consistency in backups, e.g. for databases&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certification procurement&lt;br /&gt;
&lt;br /&gt;
* 202.2: Reconsider NVMe booting&lt;br /&gt;
&lt;br /&gt;
* 207.1: Consider dropping djbdns and consider unbound&lt;br /&gt;
&lt;br /&gt;
* 207.1: /var/named/ is distro-specific&lt;br /&gt;
&lt;br /&gt;
* 207.2: Remove creation of root.hints&lt;br /&gt;
&lt;br /&gt;
* 207.2: Reconsider nslookup&lt;br /&gt;
&lt;br /&gt;
* 207.3: Reconsider chroot&lt;br /&gt;
&lt;br /&gt;
* 208.2: Remove CA.pl&lt;br /&gt;
&lt;br /&gt;
* 208.2: Remove SNI specialties&lt;br /&gt;
&lt;br /&gt;
* 208.2: Remove client certificate options&lt;br /&gt;
&lt;br /&gt;
* 208.3: Reconsider the relevance of Squid&lt;br /&gt;
&lt;br /&gt;
* 209.1: Remove Samba Share-Level security&lt;br /&gt;
&lt;br /&gt;
* 209.1: Remove nmblookup&lt;br /&gt;
&lt;br /&gt;
* 210.1: Remove arp&lt;br /&gt;
&lt;br /&gt;
* 210.4: Aggregate Whitepages, schemas, classes etc.&lt;br /&gt;
&lt;br /&gt;
* 212.2: Remove FTP&lt;br /&gt;
&lt;br /&gt;
* 212.3: Remove Protocol&lt;br /&gt;
&lt;br /&gt;
* 212.4: Remove bugtraq etc.&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V4.5&amp;diff=5721</id>
		<title>LPIC-2 Objectives V4.5</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V4.5&amp;diff=5721"/>
		<updated>2023-03-28T17:33:58Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 208.1 Basic Apache configuration (weight: 4) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, web cache/proxy, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy, FTP server).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are version 4.5.0.  This version is to go live on February 13th, 2017.&lt;br /&gt;
&lt;br /&gt;
This is also a [[LPIC-2_Summary_Version_4.0_To_4.5|summary and detailed information]] on the changes from version 4.0.x to 4.5.0 of the objectives.&lt;br /&gt;
&lt;br /&gt;
The [[LPIC-2_Objectives_V4|version 4.0 of the LPIC-2 Objectives]] are still online.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version Update (February 13th, 2017)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* updated to version 4.5.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V4.5|English]]&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V4.5(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V4.5(FR)|French]]&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V4.5(DE)|German]]&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V4.5(PT-BR)|Portuguese]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: Capacity Planning&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Measure and Troubleshoot Resource Usage (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource and network bandwidth, identify and troubleshoot resource problems.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU usage.&lt;br /&gt;
&lt;br /&gt;
* Measure memory usage.&lt;br /&gt;
&lt;br /&gt;
* Measure disk I/O.&lt;br /&gt;
&lt;br /&gt;
* Measure network I/O.&lt;br /&gt;
&lt;br /&gt;
* Measure firewalling and routing throughput.&lt;br /&gt;
&lt;br /&gt;
* Map client bandwidth usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar &lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* processes blocked on I/O&lt;br /&gt;
&lt;br /&gt;
* blocks in&lt;br /&gt;
&lt;br /&gt;
* blocks out &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Predict Future Resource Needs (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to monitor resource usage to predict future resource needs.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use monitoring and measurement tools to monitor IT infrastructure usage.&lt;br /&gt;
&lt;br /&gt;
* Predict capacity break point of a configuration.&lt;br /&gt;
&lt;br /&gt;
* Observe growth rate of capacity usage.&lt;br /&gt;
&lt;br /&gt;
* Graph the trend of capacity usage.&lt;br /&gt;
&lt;br /&gt;
* Awareness of monitoring solutions such as Icinga2, Nagios, collectd, MRTG and Cacti&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* diagnose&lt;br /&gt;
&lt;br /&gt;
* predict growth&lt;br /&gt;
&lt;br /&gt;
* resource exhaustion&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Linux Kernel&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.1 Kernel components (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to utilise kernel components that are necessary to specific hardware, hardware drivers, system resources and requirements. This objective includes implementing different types of kernel images, understanding stable and longterm kernels and patches, as well as using kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kernel 2.6.x, 3.x and 4.x documentation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/linux/&lt;br /&gt;
&lt;br /&gt;
* /usr/src/linux/Documentation/&lt;br /&gt;
&lt;br /&gt;
* zImage&lt;br /&gt;
&lt;br /&gt;
* bzImage &lt;br /&gt;
&lt;br /&gt;
* xz compression&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.2 Compiling a Linux kernel (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure a kernel to include or disable specific features of the Linux kernel as necessary. This objective includes compiling and recompiling the Linux kernel as needed, updating and noting changes in a new kernel, creating an initrd image and installing new kernels.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/linux/&lt;br /&gt;
&lt;br /&gt;
* Kernel Makefiles&lt;br /&gt;
&lt;br /&gt;
* Kernel 2.6.x, 3.x and 4.x make targets &lt;br /&gt;
&lt;br /&gt;
* Customize the current kernel configuration.&lt;br /&gt;
&lt;br /&gt;
* Build a new kernel and appropriate kernel modules.&lt;br /&gt;
&lt;br /&gt;
* Install a new kernel and any modules.&lt;br /&gt;
&lt;br /&gt;
* Ensure that the boot manager can locate the new kernel and associated files.&lt;br /&gt;
&lt;br /&gt;
* Module configuration files&lt;br /&gt;
&lt;br /&gt;
* Use DKMS to compile kernel modules.&lt;br /&gt;
&lt;br /&gt;
* Awareness of dracut&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mkinitrd&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* make targets (all, config, xconfig, menuconfig, gconfig, oldconfig, mrproper, zImage, bzImage, modules, modules_install, rpm-pkg, binrpm-pkg, deb-pkg) &lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2 &lt;br /&gt;
&lt;br /&gt;
* module tools&lt;br /&gt;
&lt;br /&gt;
* /usr/src/linux/.config&lt;br /&gt;
&lt;br /&gt;
* /lib/modules/kernel-version/&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* dkms&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.3 Kernel runtime management and troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage and/or query a 2.6.x, 3.x or 4.x kernel and its loadable modules.  Candidates should be able to identify and correct common boot and run time issues. Candidates should understand device detection and management using udev. This objective includes troubleshooting udev rules. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use command-line utilities to get information about the currently running kernel and kernel modules.&lt;br /&gt;
&lt;br /&gt;
* Manually load and unload kernel modules.&lt;br /&gt;
&lt;br /&gt;
* Determine when modules can be unloaded.&lt;br /&gt;
&lt;br /&gt;
* Determine what parameters a module accepts.&lt;br /&gt;
&lt;br /&gt;
* Configure the system to load modules by names other than their file name. &lt;br /&gt;
&lt;br /&gt;
* /proc filesystem&lt;br /&gt;
&lt;br /&gt;
* Content of /, /boot/ , and /lib/modules/&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to analyse information about the available hardware&lt;br /&gt;
&lt;br /&gt;
* udev rules&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /lib/modules/kernel-version/modules.dep&lt;br /&gt;
&lt;br /&gt;
* module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/kernel/&lt;br /&gt;
&lt;br /&gt;
* /sbin/depmod&lt;br /&gt;
&lt;br /&gt;
* /sbin/rmmod&lt;br /&gt;
&lt;br /&gt;
* /sbin/modinfo&lt;br /&gt;
&lt;br /&gt;
* /bin/dmesg&lt;br /&gt;
&lt;br /&gt;
* /sbin/lspci&lt;br /&gt;
&lt;br /&gt;
* /usr/bin/lsdev&lt;br /&gt;
&lt;br /&gt;
* /sbin/lsmod&lt;br /&gt;
&lt;br /&gt;
* /sbin/modprobe&lt;br /&gt;
&lt;br /&gt;
* /sbin/insmod&lt;br /&gt;
&lt;br /&gt;
* /bin/uname&lt;br /&gt;
&lt;br /&gt;
* /usr/bin/lsusb &lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.d/&lt;br /&gt;
&lt;br /&gt;
* /sbin/sysctl &lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;202.1 Customizing system startup (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to query and modify the behaviour of system services at various targets / run levels. A thorough understanding of the systemd, SysV Init and the Linux boot process is required. This objective includes interacting with systemd targets and SysV init run levels.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd&lt;br /&gt;
&lt;br /&gt;
* SysV init&lt;br /&gt;
&lt;br /&gt;
* Linux Standard Base Specification (LSB) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
* /etc/inittab&lt;br /&gt;
&lt;br /&gt;
* /etc/init.d/&lt;br /&gt;
&lt;br /&gt;
* /etc/rc.d/&lt;br /&gt;
&lt;br /&gt;
* chkconfig&lt;br /&gt;
&lt;br /&gt;
* update-rc.d&lt;br /&gt;
&lt;br /&gt;
* init and telinit&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;202.2 System recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* NVMe booting&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2 and Legacy&lt;br /&gt;
&lt;br /&gt;
* grub shell &lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* inittab, telinit and init with SysV init&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;202.3 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* Awareness of systemd-boot and U-Boot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
* Understanding of systemd mount units&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Maintaining a Linux filesystem (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly maintain a Linux filesystem using system utilities. This objective includes manipulating standard filesystems and monitoring SMART devices.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to manipulate and ext2, ext3 and ext4&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to perform basic Btrfs operations, including subvolumes and snapshots&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to manipulate XFS &lt;br /&gt;
&lt;br /&gt;
* Awareness of ZFS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mkfs (mkfs.*)&lt;br /&gt;
&lt;br /&gt;
* mkswap&lt;br /&gt;
&lt;br /&gt;
* fsck (fsck.*)&lt;br /&gt;
&lt;br /&gt;
* tune2fs, dumpe2fs and debugfs&lt;br /&gt;
&lt;br /&gt;
* btrfs, btrfs-convert&lt;br /&gt;
&lt;br /&gt;
* xfs_info, xfs_check, xfs_repair, xfsdump and xfsrestore&lt;br /&gt;
&lt;br /&gt;
* smartd, smartctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.3 Creating and configuring filesystem options (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure automount filesystems using AutoFS. This objective includes configuring automount for network and device filesystems. Also included is creating filesystems for devices such as CD-ROMs and a basic feature knowledge of encrypted filesystems.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* autofs configuration files&lt;br /&gt;
&lt;br /&gt;
* Understanding of automount units&lt;br /&gt;
&lt;br /&gt;
* UDF and ISO9660 tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Awareness of other CD-ROM filesystems (HFS)&lt;br /&gt;
&lt;br /&gt;
* Awareness of CD-ROM filesystem extensions (Joliet, Rock Ridge, El Torito) &lt;br /&gt;
&lt;br /&gt;
* Basic feature knowledge of data encryption (dm-crypt / LUKS)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/auto.master&lt;br /&gt;
&lt;br /&gt;
* /etc/auto.[dir]&lt;br /&gt;
&lt;br /&gt;
* mkisofs&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Adjusting Storage Device Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure kernel options to support various drives. This objective includes software tools to view &amp;amp; modify hard disk settings including iSCSI devices.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to configure DMA for IDE devices including ATAPI and SATA&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to configure Solid State Drives including AHCI and NVMe &lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to manipulate or analyse system resources (e.g. interrupts)&lt;br /&gt;
&lt;br /&gt;
* Awareness of sdparm command and its uses &lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for iSCSI&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* hdparm, sdparm&lt;br /&gt;
&lt;br /&gt;
* nvme&lt;br /&gt;
&lt;br /&gt;
* tune2fs&lt;br /&gt;
&lt;br /&gt;
* fstrim&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
* /dev/hd*, /dev/sd*, /dev/nvme*&lt;br /&gt;
&lt;br /&gt;
* iscsiadm, scsi_id, iscsid and iscsid.conf&lt;br /&gt;
&lt;br /&gt;
* WWID, WWN, LUN numbers&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Logical Volume Manager (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/ &lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Basic networking configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a network device to be able to connect to a local, wired or wireless, and a wide-area network. This objective includes being able to communicate between various subnets within a single network including both IPv4 and IPv6 networks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Utilities to configure and manipulate ethernet network interfaces&lt;br /&gt;
&lt;br /&gt;
* Configuring basic access to wireless networks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ifconfig&lt;br /&gt;
&lt;br /&gt;
* route&lt;br /&gt;
&lt;br /&gt;
* arp&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Advanced Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a network device to implement various network authentication schemes. This objective includes configuring a multi-homed network device and resolving communication problems.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Utilities to manipulate routing tables&lt;br /&gt;
&lt;br /&gt;
* Utilities to configure and manipulate ethernet network interfaces&lt;br /&gt;
&lt;br /&gt;
* Utilities to analyse the status of the network devices&lt;br /&gt;
&lt;br /&gt;
* Utilities to monitor and analyse the TCP/IP traffic&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ifconfig&lt;br /&gt;
&lt;br /&gt;
* route&lt;br /&gt;
&lt;br /&gt;
* arp&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* ping, ping6&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* tcpdump&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Troubleshooting network issues (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues, to include knowledge of locations for basic configuration files and commands.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Location and content of access restriction files&lt;br /&gt;
&lt;br /&gt;
* Utilities to configure and manipulate ethernet network interfaces&lt;br /&gt;
&lt;br /&gt;
* Utilities to manage routing tables&lt;br /&gt;
&lt;br /&gt;
* Utilities to list network states.&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Methods of information about the recognised and used hardware devices&lt;br /&gt;
&lt;br /&gt;
* System initialisation files and their contents (Systemd and SysV init)&lt;br /&gt;
&lt;br /&gt;
* Awareness of NetworkManager and its impact on network configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ifconfig&lt;br /&gt;
&lt;br /&gt;
* route&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* /etc/network/, /etc/sysconfig/network-scripts/&lt;br /&gt;
&lt;br /&gt;
* ping, ping6&lt;br /&gt;
&lt;br /&gt;
* traceroute, traceroute6&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* System log files such as /var/log/syslog, /var/log/messages and the systemd journal&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts.allow, /etc/hosts.deny&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 206: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;206.1 Make and install programs from source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install &lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;206.2 Backup operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Amanda, Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, CDR, disk or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups.&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files.&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /bin/sh&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;206.3 Notify users on system-related issues (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to notify the users about current issues related to the system. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Automate communication with users through logon messages.&lt;br /&gt;
&lt;br /&gt;
* Inform active users of system maintenance &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/issue&lt;br /&gt;
&lt;br /&gt;
* /etc/issue.net&lt;br /&gt;
&lt;br /&gt;
* /etc/motd&lt;br /&gt;
&lt;br /&gt;
* wall&lt;br /&gt;
&lt;br /&gt;
* shutdown &lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS server configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq, djbdns and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and maintain DNS zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone and hints for root level servers. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* nslookup&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DNS server to run as a non-root user and run in a chroot jail. This objective includes secure exchange of data between DNS servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Configuring BIND to run in a chroot jail&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 Basic Apache configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customize file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache 2.4 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* mod_perl and PHP configuration&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Apache 2.4 virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customise file access &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 Apache configuration for HTTPS (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a web server to provide HTTPS. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Configure Virtual Hosting using SNI&lt;br /&gt;
&lt;br /&gt;
* Awareness of the issues with Virtual Hosting and use of SSL&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, disable insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache2 configuration files&lt;br /&gt;
&lt;br /&gt;
* /etc/ssl/, /etc/pki/&lt;br /&gt;
&lt;br /&gt;
* openssl, CA.pl&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLCACertificateFile, SSLCACertificatePath&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Implementing Squid as a caching proxy (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a proxy server, including access policies, authentication and resource usage.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Squid 3.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods&lt;br /&gt;
&lt;br /&gt;
* Client user authentication methods&lt;br /&gt;
&lt;br /&gt;
* Layout and content of ACL in the Squid configuration files &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* squid.conf&lt;br /&gt;
&lt;br /&gt;
* acl&lt;br /&gt;
&lt;br /&gt;
* http_access &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 Implementing Nginx as a web server and a reverse proxy (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a reverse proxy server, Nginx.  Basic configuration of Nginx as a HTTP server is included. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Nginx&lt;br /&gt;
&lt;br /&gt;
* Reverse Proxy&lt;br /&gt;
&lt;br /&gt;
* Basic Web Server&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/nginx/&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba Server Configuration (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 documentation&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-Level, Share-Level and AD security &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd, nmblookup&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
* /var/log/samba/ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to certain hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
* TCP Wrappers &lt;br /&gt;
&lt;br /&gt;
* Awareness of NFSv4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* DHCP configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated range setup &lt;br /&gt;
&lt;br /&gt;
* Awareness of DHCPv6 and IPv6 Router Advertisements&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
* arp&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_cracklib, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP client usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Configuring an OpenLDAP server (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a basic OpenLDAP server including knowledge of LDIF format and essential access controls.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenLDAP&lt;br /&gt;
&lt;br /&gt;
* Directory based configuration&lt;br /&gt;
&lt;br /&gt;
* Access Control&lt;br /&gt;
&lt;br /&gt;
* Distinguished Names&lt;br /&gt;
&lt;br /&gt;
* Changetype Operations&lt;br /&gt;
&lt;br /&gt;
* Schemas and Whitepages&lt;br /&gt;
&lt;br /&gt;
* Directories&lt;br /&gt;
&lt;br /&gt;
* Object IDs, Attributes and Classes&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* slapd&lt;br /&gt;
&lt;br /&gt;
* slapd-config&lt;br /&gt;
&lt;br /&gt;
* LDIF&lt;br /&gt;
&lt;br /&gt;
* slapadd&lt;br /&gt;
&lt;br /&gt;
* slapcat&lt;br /&gt;
&lt;br /&gt;
* slapindex&lt;br /&gt;
&lt;br /&gt;
* /var/lib/ldap/&lt;br /&gt;
&lt;br /&gt;
* loglevel&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: E-Mail Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using e-mail servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an e-mail server, including the configuration of e-mail aliases, e-mail quotas and virtual e-mail domains. This objective includes configuring internal e-mail relays and monitoring e-mail servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Awareness of sendmail and exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* sendmail emulation layer commands&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing E-Mail Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client e-mail management software to filter, sort and monitor incoming user e-mail. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
* Awareness of procmail&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure POP and IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP and POP3 configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
* Awareness of Courier&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a router (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.2 Managing FTP servers (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure an FTP server for anonymous downloads and uploads. This objective includes precautions to be taken if anonymous uploads are permitted and configuring user access.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files, tools and utilities for Pure-FTPd and vsftpd&lt;br /&gt;
&lt;br /&gt;
* Awareness of ProFTPd&lt;br /&gt;
&lt;br /&gt;
* Understanding of passive vs. active FTP connections &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* vsftpd.conf&lt;br /&gt;
&lt;br /&gt;
* important Pure-FTPd command line options &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Secure shell (SSH) (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys and configuring SSH for users. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Managing and using server and client keys to login with and without password&lt;br /&gt;
&lt;br /&gt;
* Usage of multiple connections from multiple hosts to guard against loss of connection to remote host following configuration changes &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* Private and public key files&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication, Protocol &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security tasks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to receive security alerts from various sources, install, configure and run intrusion detection systems and apply security patches and bugfixes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Locations and organisations that report security alerts as Bugtraq, CERT or other sources&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to implement an intrusion detection system (IDS)&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 OpenVPN (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenVPN &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/openvpn/&lt;br /&gt;
&lt;br /&gt;
* openvpn&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Extend the amount of NetworkManager covered, i.e. including the CLI&lt;br /&gt;
&lt;br /&gt;
* lighttpd would have been too much coverage of web services.  Perhaps reduce Apache next revision to make room.&lt;br /&gt;
&lt;br /&gt;
* host level IDS (tripwire, AIDE, etc) to be covered in future LPIC-1.&lt;br /&gt;
&lt;br /&gt;
* introduction (or more) to FreeIPA&lt;br /&gt;
&lt;br /&gt;
* add coverage of mod_security and mod_evasive to Apache HTTP (maybe as a separate topic: Web Application Firewall)&lt;br /&gt;
&lt;br /&gt;
* add coverage of a higher-level firewall package like firewalld or ufw&lt;br /&gt;
&lt;br /&gt;
* Reconsider mod_perl&lt;br /&gt;
&lt;br /&gt;
* Add firewall-cmd and /etc/firewalld/firewalld.conf related to firewalld to LPIC-2&lt;br /&gt;
&lt;br /&gt;
* Awareness of firewalld&lt;br /&gt;
&lt;br /&gt;
* Add nmcli and nmtui to LPIC-2&lt;br /&gt;
&lt;br /&gt;
* Full coverage of IPv6 auto configuration&lt;br /&gt;
&lt;br /&gt;
* Remove djbdns&lt;br /&gt;
&lt;br /&gt;
* Advanced shell scripting (sed -e, set -x, set -o, pipefail, PIPESTATUS, declare)&lt;br /&gt;
&lt;br /&gt;
* Filesystem quota (similar to the topic removed from LPIC-1)&lt;br /&gt;
&lt;br /&gt;
* Understanding of consistency in backups, e.g. for databases&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certification procurement&lt;br /&gt;
&lt;br /&gt;
* 202.2: Reconsider NVMe booting&lt;br /&gt;
&lt;br /&gt;
* 207.1: Consider dropping djbdns and consider unbound&lt;br /&gt;
&lt;br /&gt;
* 207.1: /var/named/ is distro-specific&lt;br /&gt;
&lt;br /&gt;
* 207.2: Remove creation of root.hints&lt;br /&gt;
&lt;br /&gt;
* 207.2: Reconsider nslookup&lt;br /&gt;
&lt;br /&gt;
* 207.3: Reconsider chroot&lt;br /&gt;
&lt;br /&gt;
* 208.2: Remove CA.pl&lt;br /&gt;
&lt;br /&gt;
* 208.2: Remove SNI specialties&lt;br /&gt;
&lt;br /&gt;
* 208.2: Remove client certificate options&lt;br /&gt;
&lt;br /&gt;
* 208.3: Reconsider the relevance of Squid&lt;br /&gt;
&lt;br /&gt;
* 209.1: Remove Samba Share-Level security&lt;br /&gt;
&lt;br /&gt;
* 209.1: Remove nmblookup&lt;br /&gt;
&lt;br /&gt;
* 210.1: Remove arp&lt;br /&gt;
&lt;br /&gt;
* 210.4: Aggregate Whitepages, schemas, classes etc.&lt;br /&gt;
&lt;br /&gt;
* 212.2: Remove FTP&lt;br /&gt;
&lt;br /&gt;
* 212.3: Remove Protocol&lt;br /&gt;
&lt;br /&gt;
* 212.4: Remove bugtraq etc.&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V4.5&amp;diff=5720</id>
		<title>LPIC-2 Objectives V4.5</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-2_Objectives_V4.5&amp;diff=5720"/>
		<updated>2023-03-28T17:33:32Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 202.1 Customising system startup (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Overview of Tasks==&lt;br /&gt;
&lt;br /&gt;
These are required exams for LPI certification Level 2. It covers advanced skills for the Linux professional that are common across all distributions of Linux.  Also, [[LPIC-1_Objectives|LPIC-1]] must be obtained in order to receive the certification.  Exams may be taken in any order but all&lt;br /&gt;
of the requirements must be met.&lt;br /&gt;
&lt;br /&gt;
To pass LPIC-2, the candidate should be able to:&lt;br /&gt;
&lt;br /&gt;
*    Administer a small to medium-sized site.&lt;br /&gt;
*    Plan, implement, maintain, keep consistent, secure, and troubleshoot a small mixed (MS, Linux) network, including a:&lt;br /&gt;
**        LAN server (Samba, NFS, DNS, DHCP, client management).&lt;br /&gt;
**        Internet Gateway (firewall, VPN, SSH, web cache/proxy, mail).&lt;br /&gt;
**        Internet Server (web server and reverse proxy, FTP server).&lt;br /&gt;
*    Supervise assistants.&lt;br /&gt;
*    Advise management on automation and purchases.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exams==&lt;br /&gt;
&lt;br /&gt;
In order to be certified [[LPIC-2]], the candidate must pass both the [[#Objectives: Exam 201|201]] and [[#Objectives: Exam 202|202]] exams and be a holder of an active [[LPIC-1]] certification.&lt;br /&gt;
&lt;br /&gt;
* [[#Objectives: Exam 201|201]]&lt;br /&gt;
* [[#Objectives: Exam 202|202]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are version 4.5.0.  This version is to go live on February 13th, 2017.&lt;br /&gt;
&lt;br /&gt;
This is also a [[LPIC-2_Summary_Version_4.0_To_4.5|summary and detailed information]] on the changes from version 4.0.x to 4.5.0 of the objectives.&lt;br /&gt;
&lt;br /&gt;
The [[LPIC-2_Objectives_V4|version 4.0 of the LPIC-2 Objectives]] are still online.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version Update (February 13th, 2017)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* updated to version 4.5.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V4.5|English]]&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V4.5(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V4.5(FR)|French]]&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V4.5(DE)|German]]&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-2_Objectives_V4.5(PT-BR)|Portuguese]]&lt;br /&gt;
&lt;br /&gt;
If you would like to help translating the objectives, please contact [mailto:fthorns@lpi.org Fabian]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 201==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 200: Capacity Planning&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.1 Measure and Troubleshoot Resource Usage (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to measure hardware resource and network bandwidth, identify and troubleshoot resource problems.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure CPU usage.&lt;br /&gt;
&lt;br /&gt;
* Measure memory usage.&lt;br /&gt;
&lt;br /&gt;
* Measure disk I/O.&lt;br /&gt;
&lt;br /&gt;
* Measure network I/O.&lt;br /&gt;
&lt;br /&gt;
* Measure firewalling and routing throughput.&lt;br /&gt;
&lt;br /&gt;
* Map client bandwidth usage.&lt;br /&gt;
&lt;br /&gt;
* Match / correlate system symptoms with likely problems.&lt;br /&gt;
&lt;br /&gt;
* Estimate throughput and identify bottlenecks in a system including networking.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iostat&lt;br /&gt;
&lt;br /&gt;
* iotop&lt;br /&gt;
&lt;br /&gt;
* vmstat&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* iptraf&lt;br /&gt;
&lt;br /&gt;
* pstree, ps&lt;br /&gt;
&lt;br /&gt;
* w&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* top&lt;br /&gt;
&lt;br /&gt;
* htop&lt;br /&gt;
&lt;br /&gt;
* uptime&lt;br /&gt;
&lt;br /&gt;
* sar &lt;br /&gt;
&lt;br /&gt;
* swap&lt;br /&gt;
&lt;br /&gt;
* processes blocked on I/O&lt;br /&gt;
&lt;br /&gt;
* blocks in&lt;br /&gt;
&lt;br /&gt;
* blocks out &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;200.2 Predict Future Resource Needs (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to monitor resource usage to predict future resource needs.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use monitoring and measurement tools to monitor IT infrastructure usage.&lt;br /&gt;
&lt;br /&gt;
* Predict capacity break point of a configuration.&lt;br /&gt;
&lt;br /&gt;
* Observe growth rate of capacity usage.&lt;br /&gt;
&lt;br /&gt;
* Graph the trend of capacity usage.&lt;br /&gt;
&lt;br /&gt;
* Awareness of monitoring solutions such as Icinga2, Nagios, collectd, MRTG and Cacti&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* diagnose&lt;br /&gt;
&lt;br /&gt;
* predict growth&lt;br /&gt;
&lt;br /&gt;
* resource exhaustion&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 201: Linux Kernel&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.1 Kernel components (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to utilise kernel components that are necessary to specific hardware, hardware drivers, system resources and requirements. This objective includes implementing different types of kernel images, understanding stable and longterm kernels and patches, as well as using kernel modules.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kernel 2.6.x, 3.x and 4.x documentation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/linux/&lt;br /&gt;
&lt;br /&gt;
* /usr/src/linux/Documentation/&lt;br /&gt;
&lt;br /&gt;
* zImage&lt;br /&gt;
&lt;br /&gt;
* bzImage &lt;br /&gt;
&lt;br /&gt;
* xz compression&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.2 Compiling a Linux kernel (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure a kernel to include or disable specific features of the Linux kernel as necessary. This objective includes compiling and recompiling the Linux kernel as needed, updating and noting changes in a new kernel, creating an initrd image and installing new kernels.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/linux/&lt;br /&gt;
&lt;br /&gt;
* Kernel Makefiles&lt;br /&gt;
&lt;br /&gt;
* Kernel 2.6.x, 3.x and 4.x make targets &lt;br /&gt;
&lt;br /&gt;
* Customize the current kernel configuration.&lt;br /&gt;
&lt;br /&gt;
* Build a new kernel and appropriate kernel modules.&lt;br /&gt;
&lt;br /&gt;
* Install a new kernel and any modules.&lt;br /&gt;
&lt;br /&gt;
* Ensure that the boot manager can locate the new kernel and associated files.&lt;br /&gt;
&lt;br /&gt;
* Module configuration files&lt;br /&gt;
&lt;br /&gt;
* Use DKMS to compile kernel modules.&lt;br /&gt;
&lt;br /&gt;
* Awareness of dracut&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mkinitrd&lt;br /&gt;
&lt;br /&gt;
* mkinitramfs&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* make targets (all, config, xconfig, menuconfig, gconfig, oldconfig, mrproper, zImage, bzImage, modules, modules_install, rpm-pkg, binrpm-pkg, deb-pkg) &lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2 &lt;br /&gt;
&lt;br /&gt;
* module tools&lt;br /&gt;
&lt;br /&gt;
* /usr/src/linux/.config&lt;br /&gt;
&lt;br /&gt;
* /lib/modules/kernel-version/&lt;br /&gt;
&lt;br /&gt;
* depmod&lt;br /&gt;
&lt;br /&gt;
* dkms&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;201.3 Kernel runtime management and troubleshooting (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage and/or query a 2.6.x, 3.x or 4.x kernel and its loadable modules.  Candidates should be able to identify and correct common boot and run time issues. Candidates should understand device detection and management using udev. This objective includes troubleshooting udev rules. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use command-line utilities to get information about the currently running kernel and kernel modules.&lt;br /&gt;
&lt;br /&gt;
* Manually load and unload kernel modules.&lt;br /&gt;
&lt;br /&gt;
* Determine when modules can be unloaded.&lt;br /&gt;
&lt;br /&gt;
* Determine what parameters a module accepts.&lt;br /&gt;
&lt;br /&gt;
* Configure the system to load modules by names other than their file name. &lt;br /&gt;
&lt;br /&gt;
* /proc filesystem&lt;br /&gt;
&lt;br /&gt;
* Content of /, /boot/ , and /lib/modules/&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to analyse information about the available hardware&lt;br /&gt;
&lt;br /&gt;
* udev rules&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /lib/modules/kernel-version/modules.dep&lt;br /&gt;
&lt;br /&gt;
* module configuration files in /etc/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/kernel/&lt;br /&gt;
&lt;br /&gt;
* /sbin/depmod&lt;br /&gt;
&lt;br /&gt;
* /sbin/rmmod&lt;br /&gt;
&lt;br /&gt;
* /sbin/modinfo&lt;br /&gt;
&lt;br /&gt;
* /bin/dmesg&lt;br /&gt;
&lt;br /&gt;
* /sbin/lspci&lt;br /&gt;
&lt;br /&gt;
* /usr/bin/lsdev&lt;br /&gt;
&lt;br /&gt;
* /sbin/lsmod&lt;br /&gt;
&lt;br /&gt;
* /sbin/modprobe&lt;br /&gt;
&lt;br /&gt;
* /sbin/insmod&lt;br /&gt;
&lt;br /&gt;
* /bin/uname&lt;br /&gt;
&lt;br /&gt;
* /usr/bin/lsusb &lt;br /&gt;
&lt;br /&gt;
* /etc/sysctl.conf, /etc/sysctl.d/&lt;br /&gt;
&lt;br /&gt;
* /sbin/sysctl &lt;br /&gt;
&lt;br /&gt;
* udevmonitor&lt;br /&gt;
&lt;br /&gt;
* udevadm monitor&lt;br /&gt;
&lt;br /&gt;
* /etc/udev/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 202: System Startup&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;202.1 Customizing system startup (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to query and modify the behaviour of system services at various targets / run levels. A thorough understanding of the systemd, SysV Init and the Linux boot process is required. This objective includes interacting with systemd targets and SysV init run levels.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Systemd&lt;br /&gt;
&lt;br /&gt;
* SysV init&lt;br /&gt;
&lt;br /&gt;
* Linux Standard Base Specification (LSB) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/lib/systemd/&lt;br /&gt;
&lt;br /&gt;
* /etc/systemd/&lt;br /&gt;
&lt;br /&gt;
* /run/systemd/&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
* systemd-delta&lt;br /&gt;
&lt;br /&gt;
* /etc/inittab&lt;br /&gt;
&lt;br /&gt;
* /etc/init.d/&lt;br /&gt;
&lt;br /&gt;
* /etc/rc.d/&lt;br /&gt;
&lt;br /&gt;
* chkconfig&lt;br /&gt;
&lt;br /&gt;
* update-rc.d&lt;br /&gt;
&lt;br /&gt;
* init and telinit&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;202.2 System recovery (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly manipulate a Linux system during both the boot process and during recovery mode. This objective includes using both the init utility and init-related kernel options.  Candidates should be able to determine the cause of errors in loading and usage of bootloaders.  GRUB version 2 and GRUB Legacy are the bootloaders of interest.  Both BIOS and UEFI systems are covered.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* NVMe booting&lt;br /&gt;
&lt;br /&gt;
* GRUB version 2 and Legacy&lt;br /&gt;
&lt;br /&gt;
* grub shell &lt;br /&gt;
&lt;br /&gt;
* boot loader start and hand off to kernel&lt;br /&gt;
&lt;br /&gt;
* kernel loading&lt;br /&gt;
&lt;br /&gt;
* hardware initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* daemon/service initialisation and setup&lt;br /&gt;
&lt;br /&gt;
* Know the different boot loader install locations on a hard disk or removable device.&lt;br /&gt;
&lt;br /&gt;
* Overwrite standard boot loader options and using boot loader shells.&lt;br /&gt;
&lt;br /&gt;
* Use systemd rescue and emergency modes.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* fsck&lt;br /&gt;
&lt;br /&gt;
* inittab, telinit and init with SysV init&lt;br /&gt;
&lt;br /&gt;
* The contents of /boot/, /boot/grub/ and /boot/efi/&lt;br /&gt;
&lt;br /&gt;
* EFI System Partition (ESP)&lt;br /&gt;
&lt;br /&gt;
* GRUB&lt;br /&gt;
&lt;br /&gt;
* grub-install&lt;br /&gt;
&lt;br /&gt;
* efibootmgr&lt;br /&gt;
&lt;br /&gt;
* UEFI shell&lt;br /&gt;
&lt;br /&gt;
* initrd, initramfs&lt;br /&gt;
&lt;br /&gt;
* Master boot record&lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;202.3 Alternate Bootloaders (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of other bootloaders and their major features.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SYSLINUX, ISOLINUX, PXELINUX&lt;br /&gt;
&lt;br /&gt;
* Understanding of PXE for both BIOS and UEFI&lt;br /&gt;
&lt;br /&gt;
* Awareness of systemd-boot and U-Boot&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* syslinux&lt;br /&gt;
&lt;br /&gt;
* extlinux&lt;br /&gt;
&lt;br /&gt;
* isolinux.bin&lt;br /&gt;
&lt;br /&gt;
* isolinux.cfg&lt;br /&gt;
&lt;br /&gt;
* isohdpfx.bin&lt;br /&gt;
&lt;br /&gt;
* efiboot.img&lt;br /&gt;
&lt;br /&gt;
* pxelinux.0&lt;br /&gt;
&lt;br /&gt;
* pxelinux.cfg/&lt;br /&gt;
&lt;br /&gt;
* uefi/shim.efi&lt;br /&gt;
&lt;br /&gt;
* uefi/grubx64.efi&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 203: Filesystem and Devices&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.1 Operating the Linux filesystem (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly configure and navigate the standard Linux filesystem. This objective includes configuring and mounting various filesystem types.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* The concept of the fstab configuration&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for handling swap partitions and files&lt;br /&gt;
&lt;br /&gt;
* Use of UUIDs for identifying and mounting file systems&lt;br /&gt;
&lt;br /&gt;
* Understanding of systemd mount units&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* /etc/mtab&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* mount and umount&lt;br /&gt;
&lt;br /&gt;
* blkid&lt;br /&gt;
&lt;br /&gt;
* sync&lt;br /&gt;
&lt;br /&gt;
* swapon&lt;br /&gt;
&lt;br /&gt;
* swapoff &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.2 Maintaining a Linux filesystem (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to properly maintain a Linux filesystem using system utilities. This objective includes manipulating standard filesystems and monitoring SMART devices.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to manipulate and ext2, ext3 and ext4&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to perform basic Btrfs operations, including subvolumes and snapshots&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to manipulate XFS &lt;br /&gt;
&lt;br /&gt;
* Awareness of ZFS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mkfs (mkfs.*)&lt;br /&gt;
&lt;br /&gt;
* mkswap&lt;br /&gt;
&lt;br /&gt;
* fsck (fsck.*)&lt;br /&gt;
&lt;br /&gt;
* tune2fs, dumpe2fs and debugfs&lt;br /&gt;
&lt;br /&gt;
* btrfs, btrfs-convert&lt;br /&gt;
&lt;br /&gt;
* xfs_info, xfs_check, xfs_repair, xfsdump and xfsrestore&lt;br /&gt;
&lt;br /&gt;
* smartd, smartctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;203.3 Creating and configuring filesystem options (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure automount filesystems using AutoFS. This objective includes configuring automount for network and device filesystems. Also included is creating filesystems for devices such as CD-ROMs and a basic feature knowledge of encrypted filesystems.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* autofs configuration files&lt;br /&gt;
&lt;br /&gt;
* Understanding of automount units&lt;br /&gt;
&lt;br /&gt;
* UDF and ISO9660 tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Awareness of other CD-ROM filesystems (HFS)&lt;br /&gt;
&lt;br /&gt;
* Awareness of CD-ROM filesystem extensions (Joliet, Rock Ridge, El Torito) &lt;br /&gt;
&lt;br /&gt;
* Basic feature knowledge of data encryption (dm-crypt / LUKS)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/auto.master&lt;br /&gt;
&lt;br /&gt;
* /etc/auto.[dir]&lt;br /&gt;
&lt;br /&gt;
* mkisofs&lt;br /&gt;
&lt;br /&gt;
* cryptsetup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 204: Advanced Storage Device Administration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.1 Configuring RAID (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and implement software RAID. This objective includes using and configuring RAID 0, 1 and 5.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Software RAID configuration files and utilities &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* mdadm.conf&lt;br /&gt;
&lt;br /&gt;
* mdadm&lt;br /&gt;
&lt;br /&gt;
* /proc/mdstat&lt;br /&gt;
&lt;br /&gt;
* partition type 0xFD &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.2 Adjusting Storage Device Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure kernel options to support various drives. This objective includes software tools to view &amp;amp; modify hard disk settings including iSCSI devices.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to configure DMA for IDE devices including ATAPI and SATA&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to configure Solid State Drives including AHCI and NVMe &lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to manipulate or analyse system resources (e.g. interrupts)&lt;br /&gt;
&lt;br /&gt;
* Awareness of sdparm command and its uses &lt;br /&gt;
&lt;br /&gt;
* Tools and utilities for iSCSI&lt;br /&gt;
&lt;br /&gt;
* Awareness of SAN, including relevant protocols (AoE, FCoE)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* hdparm, sdparm&lt;br /&gt;
&lt;br /&gt;
* nvme&lt;br /&gt;
&lt;br /&gt;
* tune2fs&lt;br /&gt;
&lt;br /&gt;
* fstrim&lt;br /&gt;
&lt;br /&gt;
* sysctl&lt;br /&gt;
&lt;br /&gt;
* /dev/hd*, /dev/sd*, /dev/nvme*&lt;br /&gt;
&lt;br /&gt;
* iscsiadm, scsi_id, iscsid and iscsid.conf&lt;br /&gt;
&lt;br /&gt;
* WWID, WWN, LUN numbers&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;204.3 Logical Volume Manager (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create and remove logical volumes, volume groups, and physical volumes. This objective includes snapshots and resizing logical volumes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools in the LVM suite&lt;br /&gt;
&lt;br /&gt;
* Resizing, renaming, creating, and removing logical volumes, volume groups, and physical volumes&lt;br /&gt;
&lt;br /&gt;
* Creating and maintaining snapshots&lt;br /&gt;
&lt;br /&gt;
* Activating volume groups &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /sbin/pv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/lv*&lt;br /&gt;
&lt;br /&gt;
* /sbin/vg*&lt;br /&gt;
&lt;br /&gt;
* mount&lt;br /&gt;
&lt;br /&gt;
* /dev/mapper/ &lt;br /&gt;
&lt;br /&gt;
* lvm.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 205: Networking Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.1 Basic networking configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a network device to be able to connect to a local, wired or wireless, and a wide-area network. This objective includes being able to communicate between various subnets within a single network including both IPv4 and IPv6 networks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Utilities to configure and manipulate ethernet network interfaces&lt;br /&gt;
&lt;br /&gt;
* Configuring basic access to wireless networks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ifconfig&lt;br /&gt;
&lt;br /&gt;
* route&lt;br /&gt;
&lt;br /&gt;
* arp&lt;br /&gt;
&lt;br /&gt;
* iw&lt;br /&gt;
&lt;br /&gt;
* iwconfig&lt;br /&gt;
&lt;br /&gt;
* iwlist&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.2 Advanced Network Configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a network device to implement various network authentication schemes. This objective includes configuring a multi-homed network device and resolving communication problems.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Utilities to manipulate routing tables&lt;br /&gt;
&lt;br /&gt;
* Utilities to configure and manipulate ethernet network interfaces&lt;br /&gt;
&lt;br /&gt;
* Utilities to analyse the status of the network devices&lt;br /&gt;
&lt;br /&gt;
* Utilities to monitor and analyse the TCP/IP traffic&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ifconfig&lt;br /&gt;
&lt;br /&gt;
* route&lt;br /&gt;
&lt;br /&gt;
* arp&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* lsof&lt;br /&gt;
&lt;br /&gt;
* ping, ping6&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* tcpdump&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;205.3 Troubleshooting network issues (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to identify and correct common network setup issues, to include knowledge of locations for basic configuration files and commands.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Location and content of access restriction files&lt;br /&gt;
&lt;br /&gt;
* Utilities to configure and manipulate ethernet network interfaces&lt;br /&gt;
&lt;br /&gt;
* Utilities to manage routing tables&lt;br /&gt;
&lt;br /&gt;
* Utilities to list network states.&lt;br /&gt;
&lt;br /&gt;
* Utilities to gain information about the network configuration&lt;br /&gt;
&lt;br /&gt;
* Methods of information about the recognised and used hardware devices&lt;br /&gt;
&lt;br /&gt;
* System initialisation files and their contents (Systemd and SysV init)&lt;br /&gt;
&lt;br /&gt;
* Awareness of NetworkManager and its impact on network configuration&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ip&lt;br /&gt;
&lt;br /&gt;
* ifconfig&lt;br /&gt;
&lt;br /&gt;
* route&lt;br /&gt;
&lt;br /&gt;
* ss&lt;br /&gt;
&lt;br /&gt;
* netstat&lt;br /&gt;
&lt;br /&gt;
* /etc/network/, /etc/sysconfig/network-scripts/&lt;br /&gt;
&lt;br /&gt;
* ping, ping6&lt;br /&gt;
&lt;br /&gt;
* traceroute, traceroute6&lt;br /&gt;
&lt;br /&gt;
* mtr&lt;br /&gt;
&lt;br /&gt;
* hostname&lt;br /&gt;
&lt;br /&gt;
* System log files such as /var/log/syslog, /var/log/messages and the systemd journal&lt;br /&gt;
&lt;br /&gt;
* dmesg&lt;br /&gt;
&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts&lt;br /&gt;
&lt;br /&gt;
* /etc/hostname, /etc/HOSTNAME&lt;br /&gt;
&lt;br /&gt;
* /etc/hosts.allow, /etc/hosts.deny&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 206: System Maintenance&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;206.1 Make and install programs from source (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to build and install an executable program from source. This objective includes being able to unpack a file of sources.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unpack source code using common compression and archive utilities.&lt;br /&gt;
&lt;br /&gt;
* Understand basics of invoking make to compile programs.&lt;br /&gt;
&lt;br /&gt;
* Apply parameters to a configure script.&lt;br /&gt;
&lt;br /&gt;
* Know where sources are stored by default. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /usr/src/&lt;br /&gt;
&lt;br /&gt;
* gunzip&lt;br /&gt;
&lt;br /&gt;
* gzip&lt;br /&gt;
&lt;br /&gt;
* bzip2&lt;br /&gt;
&lt;br /&gt;
* xz&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* configure&lt;br /&gt;
&lt;br /&gt;
* make&lt;br /&gt;
&lt;br /&gt;
* uname&lt;br /&gt;
&lt;br /&gt;
* install &lt;br /&gt;
&lt;br /&gt;
* patch&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;206.2 Backup operations (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to use system tools to back up important system data. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge about directories that have to be included in backups&lt;br /&gt;
&lt;br /&gt;
* Awareness of network backup solutions such as Amanda, Bacula, Bareos and BackupPC&lt;br /&gt;
&lt;br /&gt;
* Knowledge of the benefits and drawbacks of tapes, CDR, disk or other backup media&lt;br /&gt;
&lt;br /&gt;
* Perform partial and manual backups.&lt;br /&gt;
&lt;br /&gt;
* Verify the integrity of backup files.&lt;br /&gt;
&lt;br /&gt;
* Partially or fully restore backups. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /bin/sh&lt;br /&gt;
&lt;br /&gt;
* dd&lt;br /&gt;
&lt;br /&gt;
* tar&lt;br /&gt;
&lt;br /&gt;
* /dev/st* and /dev/nst*&lt;br /&gt;
&lt;br /&gt;
* mt&lt;br /&gt;
&lt;br /&gt;
* rsync &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;206.3 Notify users on system-related issues (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to notify the users about current issues related to the system. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Automate communication with users through logon messages.&lt;br /&gt;
&lt;br /&gt;
* Inform active users of system maintenance &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/issue&lt;br /&gt;
&lt;br /&gt;
* /etc/issue.net&lt;br /&gt;
&lt;br /&gt;
* /etc/motd&lt;br /&gt;
&lt;br /&gt;
* wall&lt;br /&gt;
&lt;br /&gt;
* shutdown &lt;br /&gt;
&lt;br /&gt;
* systemctl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives: Exam 202==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 207: Domain Name Server&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.1 Basic DNS server configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure BIND to function as an authoritative and as a recursive, caching-only DNS server. This objective includes the ability to manage a running server and configuring logging.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Defining the location of the BIND zone files in BIND configuration files&lt;br /&gt;
&lt;br /&gt;
* Reloading modified configuration and zone files &lt;br /&gt;
&lt;br /&gt;
* Awareness of dnsmasq, djbdns and PowerDNS as alternate name servers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* rndc&lt;br /&gt;
&lt;br /&gt;
* named-checkconf&lt;br /&gt;
&lt;br /&gt;
* kill &lt;br /&gt;
&lt;br /&gt;
* host&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.2 Create and maintain DNS zones (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to create a zone file for a forward or reverse zone and hints for root level servers. This objective includes setting appropriate values for records, adding hosts in zones and adding zones to the DNS. A candidate should also be able to delegate zones to another DNS server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Utilities to request information from the DNS server&lt;br /&gt;
&lt;br /&gt;
* Layout, content and file location of the BIND zone files&lt;br /&gt;
&lt;br /&gt;
* Various methods to add a new host in the zone files, including reverse zones &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/named/&lt;br /&gt;
&lt;br /&gt;
* zone file syntax&lt;br /&gt;
&lt;br /&gt;
* resource record formats&lt;br /&gt;
&lt;br /&gt;
* named-checkzone&lt;br /&gt;
&lt;br /&gt;
* named-compilezone&lt;br /&gt;
&lt;br /&gt;
* masterfile-format&lt;br /&gt;
&lt;br /&gt;
* dig&lt;br /&gt;
&lt;br /&gt;
* nslookup&lt;br /&gt;
&lt;br /&gt;
* host &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;207.3 Securing a DNS server (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DNS server to run as a non-root user and run in a chroot jail. This objective includes secure exchange of data between DNS servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* BIND 9 configuration files&lt;br /&gt;
&lt;br /&gt;
* Configuring BIND to run in a chroot jail&lt;br /&gt;
&lt;br /&gt;
* Split configuration of BIND using the forwarders statement &lt;br /&gt;
&lt;br /&gt;
* Configuring and using transaction signatures (TSIG)&lt;br /&gt;
&lt;br /&gt;
* Awareness of DNSSEC and basic tools&lt;br /&gt;
&lt;br /&gt;
* Awareness of DANE and related records&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/named.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
&lt;br /&gt;
* DNSSEC&lt;br /&gt;
&lt;br /&gt;
* dnssec-keygen &lt;br /&gt;
&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 208: HTTP Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.1 Basic Apache configuration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a web server. This objective includes monitoring the server&#039;s load and performance, restricting client user access, configuring support for scripting languages as modules and setting up client user authentication. Also included is configuring server options to restrict usage of resources. Candidates should be able to configure a web server to use virtual hosts and customise file access. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache 2.4 configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Apache log files configuration and content&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods and files&lt;br /&gt;
&lt;br /&gt;
* mod_perl and PHP configuration&lt;br /&gt;
&lt;br /&gt;
* Client user authentication files and utilities&lt;br /&gt;
&lt;br /&gt;
* Configuration of maximum requests, minimum and maximum servers and clients &lt;br /&gt;
&lt;br /&gt;
* Apache 2.4 virtual host implementation (with and without dedicated IP addresses)&lt;br /&gt;
&lt;br /&gt;
* Using redirect statements in Apache&#039;s configuration files to customise file access &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* access logs and error logs&lt;br /&gt;
&lt;br /&gt;
* .htaccess&lt;br /&gt;
&lt;br /&gt;
* httpd.conf&lt;br /&gt;
&lt;br /&gt;
* mod_auth_basic, mod_authz_host and mod_access_compat&lt;br /&gt;
&lt;br /&gt;
* htpasswd&lt;br /&gt;
&lt;br /&gt;
* AuthUserFile, AuthGroupFile&lt;br /&gt;
&lt;br /&gt;
* apachectl, apache2ctl&lt;br /&gt;
&lt;br /&gt;
* httpd, apache2&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.2 Apache configuration for HTTPS (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a web server to provide HTTPS. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Generate a server private key and CSR for a commercial CA&lt;br /&gt;
&lt;br /&gt;
* Generate a self-signed Certificate&lt;br /&gt;
&lt;br /&gt;
* Install the key and certificate, including intermediate CAs&lt;br /&gt;
&lt;br /&gt;
* Configure Virtual Hosting using SNI&lt;br /&gt;
&lt;br /&gt;
* Awareness of the issues with Virtual Hosting and use of SSL&lt;br /&gt;
&lt;br /&gt;
* Security issues in SSL use, disable insecure protocols and ciphers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Apache2 configuration files&lt;br /&gt;
&lt;br /&gt;
* /etc/ssl/, /etc/pki/&lt;br /&gt;
&lt;br /&gt;
* openssl, CA.pl&lt;br /&gt;
&lt;br /&gt;
* SSLEngine, SSLCertificateKeyFile, SSLCertificateFile&lt;br /&gt;
&lt;br /&gt;
* SSLCACertificateFile, SSLCACertificatePath&lt;br /&gt;
&lt;br /&gt;
* SSLProtocol, SSLCipherSuite, ServerTokens, ServerSignature, TraceEnable&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.3 Implementing Squid as a caching proxy (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a proxy server, including access policies, authentication and resource usage.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Squid 3.x configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restriction methods&lt;br /&gt;
&lt;br /&gt;
* Client user authentication methods&lt;br /&gt;
&lt;br /&gt;
* Layout and content of ACL in the Squid configuration files &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* squid.conf&lt;br /&gt;
&lt;br /&gt;
* acl&lt;br /&gt;
&lt;br /&gt;
* http_access &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;208.4 Implementing Nginx as a web server and a reverse proxy (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure a reverse proxy server, Nginx.  Basic configuration of Nginx as a HTTP server is included. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Nginx&lt;br /&gt;
&lt;br /&gt;
* Reverse Proxy&lt;br /&gt;
&lt;br /&gt;
* Basic Web Server&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/nginx/&lt;br /&gt;
&lt;br /&gt;
* nginx&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 209: File Sharing&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.1 Samba Server Configuration (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up a Samba server for various clients. This objective includes setting up Samba as a standalone server as well as integrating Samba as a member in an Active Directory. Furthermore, the configuration of simple CIFS and printer shares is covered. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Samba 4 documentation&lt;br /&gt;
&lt;br /&gt;
* Samba 4 configuration files&lt;br /&gt;
&lt;br /&gt;
* Samba 4 tools and utilities and daemons&lt;br /&gt;
&lt;br /&gt;
* Mounting CIFS shares on Linux&lt;br /&gt;
&lt;br /&gt;
* Mapping Windows user names to Linux user names&lt;br /&gt;
&lt;br /&gt;
* User-Level, Share-Level and AD security &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smbd, nmbd, winbindd&lt;br /&gt;
&lt;br /&gt;
* smbcontrol, smbstatus, testparm, smbpasswd, nmblookup&lt;br /&gt;
&lt;br /&gt;
* samba-tool&lt;br /&gt;
&lt;br /&gt;
* net&lt;br /&gt;
&lt;br /&gt;
* smbclient&lt;br /&gt;
&lt;br /&gt;
* mount.cifs&lt;br /&gt;
&lt;br /&gt;
* /etc/samba/&lt;br /&gt;
&lt;br /&gt;
* /var/log/samba/ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;209.2 NFS Server Configuration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* NFS version 3 configuration files&lt;br /&gt;
&lt;br /&gt;
* NFS tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Access restrictions to certain hosts and/or subnets&lt;br /&gt;
&lt;br /&gt;
* Mount options on server and client&lt;br /&gt;
&lt;br /&gt;
* TCP Wrappers &lt;br /&gt;
&lt;br /&gt;
* Awareness of NFSv4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/exports&lt;br /&gt;
&lt;br /&gt;
* exportfs&lt;br /&gt;
&lt;br /&gt;
* showmount&lt;br /&gt;
&lt;br /&gt;
* nfsstat&lt;br /&gt;
&lt;br /&gt;
* /proc/mounts&lt;br /&gt;
&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
* rpcinfo&lt;br /&gt;
&lt;br /&gt;
* mountd&lt;br /&gt;
&lt;br /&gt;
* portmapper&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 210: Network Client Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.1 DHCP configuration (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a DHCP server. This objective includes setting default and per client options, adding static hosts and BOOTP hosts. Also included is configuring a DHCP relay agent and maintaining the DHCP server.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* DHCP configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* Subnet and dynamically-allocated range setup &lt;br /&gt;
&lt;br /&gt;
* Awareness of DHCPv6 and IPv6 Router Advertisements&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* dhcpd.conf&lt;br /&gt;
&lt;br /&gt;
* dhcpd.leases&lt;br /&gt;
&lt;br /&gt;
* DHCP Log messages in syslog or systemd journal&lt;br /&gt;
&lt;br /&gt;
* arp&lt;br /&gt;
&lt;br /&gt;
* dhcpd &lt;br /&gt;
&lt;br /&gt;
* radvd&lt;br /&gt;
&lt;br /&gt;
* radvd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.2 PAM authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | The candidate should be able to configure PAM to support authentication using various available methods. This includes basic SSSD functionality.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM configuration files, terms and utilities&lt;br /&gt;
&lt;br /&gt;
* passwd and shadow passwords &lt;br /&gt;
&lt;br /&gt;
* Use sssd for LDAP authentication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
&lt;br /&gt;
* pam.conf&lt;br /&gt;
&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
* pam_unix, pam_cracklib, pam_limits, pam_listfile, pam_sss&lt;br /&gt;
&lt;br /&gt;
* sssd.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.3 LDAP client usage (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to perform queries and updates to an LDAP server. Also included is importing and adding items, as well as adding and managing users.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* LDAP utilities for data management and queries&lt;br /&gt;
&lt;br /&gt;
* Change user passwords&lt;br /&gt;
&lt;br /&gt;
* Querying the LDAP directory &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ldapsearch&lt;br /&gt;
&lt;br /&gt;
* ldappasswd&lt;br /&gt;
&lt;br /&gt;
* ldapadd&lt;br /&gt;
&lt;br /&gt;
* ldapdelete &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;210.4 Configuring an OpenLDAP server (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a basic OpenLDAP server including knowledge of LDIF format and essential access controls.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenLDAP&lt;br /&gt;
&lt;br /&gt;
* Directory based configuration&lt;br /&gt;
&lt;br /&gt;
* Access Control&lt;br /&gt;
&lt;br /&gt;
* Distinguished Names&lt;br /&gt;
&lt;br /&gt;
* Changetype Operations&lt;br /&gt;
&lt;br /&gt;
* Schemas and Whitepages&lt;br /&gt;
&lt;br /&gt;
* Directories&lt;br /&gt;
&lt;br /&gt;
* Object IDs, Attributes and Classes&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* slapd&lt;br /&gt;
&lt;br /&gt;
* slapd-config&lt;br /&gt;
&lt;br /&gt;
* LDIF&lt;br /&gt;
&lt;br /&gt;
* slapadd&lt;br /&gt;
&lt;br /&gt;
* slapcat&lt;br /&gt;
&lt;br /&gt;
* slapindex&lt;br /&gt;
&lt;br /&gt;
* /var/lib/ldap/&lt;br /&gt;
&lt;br /&gt;
* loglevel&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 211: E-Mail Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.1 Using e-mail servers (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to manage an e-mail server, including the configuration of e-mail aliases, e-mail quotas and virtual e-mail domains. This objective includes configuring internal e-mail relays and monitoring e-mail servers.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for postfix&lt;br /&gt;
&lt;br /&gt;
* Basic knowledge of the SMTP protocol&lt;br /&gt;
&lt;br /&gt;
* Awareness of sendmail and exim &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files and commands for postfix&lt;br /&gt;
&lt;br /&gt;
* /etc/postfix/&lt;br /&gt;
&lt;br /&gt;
* /var/spool/postfix/&lt;br /&gt;
&lt;br /&gt;
* sendmail emulation layer commands&lt;br /&gt;
&lt;br /&gt;
* /etc/aliases&lt;br /&gt;
&lt;br /&gt;
* mail-related logs in /var/log/ &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.2 Managing E-Mail Delivery (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to implement client e-mail management software to filter, sort and monitor incoming user e-mail. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of Sieve functionality, syntax and operators&lt;br /&gt;
&lt;br /&gt;
* Use Sieve to filter and sort mail with respect to sender, recipient(s), headers and size&lt;br /&gt;
&lt;br /&gt;
* Awareness of procmail&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conditions and comparison operators&lt;br /&gt;
&lt;br /&gt;
* keep, fileinto, redirect, reject, discard, stop&lt;br /&gt;
&lt;br /&gt;
* Dovecot vacation extension&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;211.3 Managing Mailbox Access (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to install and configure POP and IMAP daemons. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Dovecot IMAP and POP3 configuration and administration&lt;br /&gt;
&lt;br /&gt;
* Basic TLS configuration for Dovecot&lt;br /&gt;
&lt;br /&gt;
* Awareness of Courier&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/dovecot/&lt;br /&gt;
&lt;br /&gt;
* dovecot.conf &lt;br /&gt;
&lt;br /&gt;
* doveconf&lt;br /&gt;
&lt;br /&gt;
* doveadm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 212: System Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.1 Configuring a router (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a system to forward IP packet and perform network address translation (NAT, IP masquerading) and state its significance in protecting a network. This objective includes configuring port redirection, managing filter rules and averting attacks.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* iptables and ip6tables configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Tools, commands and utilities to manage routing tables.&lt;br /&gt;
&lt;br /&gt;
* Private address ranges (IPv4) and Unique Local Addresses as well as Link Local Addresses (IPv6)&lt;br /&gt;
&lt;br /&gt;
* Port redirection and IP forwarding&lt;br /&gt;
&lt;br /&gt;
* List and write filtering and rules that accept or block IP packets based on source or destination protocol, port and address&lt;br /&gt;
&lt;br /&gt;
* Save and reload filtering configurations &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv4/&lt;br /&gt;
&lt;br /&gt;
* /proc/sys/net/ipv6/&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
* ip6tables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.2 Managing FTP servers (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure an FTP server for anonymous downloads and uploads. This objective includes precautions to be taken if anonymous uploads are permitted and configuring user access.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configuration files, tools and utilities for Pure-FTPd and vsftpd&lt;br /&gt;
&lt;br /&gt;
* Awareness of ProFTPd&lt;br /&gt;
&lt;br /&gt;
* Understanding of passive vs. active FTP connections &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* vsftpd.conf&lt;br /&gt;
&lt;br /&gt;
* important Pure-FTPd command line options &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.3 Secure shell (SSH) (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure and secure an SSH daemon. This objective includes managing keys and configuring SSH for users. Candidates should also be able to forward an application protocol over SSH and manage the SSH login.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenSSH configuration files, tools and utilities&lt;br /&gt;
&lt;br /&gt;
* Login restrictions for the superuser and the normal users&lt;br /&gt;
&lt;br /&gt;
* Managing and using server and client keys to login with and without password&lt;br /&gt;
&lt;br /&gt;
* Usage of multiple connections from multiple hosts to guard against loss of connection to remote host following configuration changes &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ssh&lt;br /&gt;
&lt;br /&gt;
* sshd&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
* /etc/ssh/&lt;br /&gt;
&lt;br /&gt;
* Private and public key files&lt;br /&gt;
&lt;br /&gt;
* PermitRootLogin, PubKeyAuthentication, AllowUsers, PasswordAuthentication, Protocol &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.4 Security tasks (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to receive security alerts from various sources, install, configure and run intrusion detection systems and apply security patches and bugfixes.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to scan and test ports on a server&lt;br /&gt;
&lt;br /&gt;
* Locations and organisations that report security alerts as Bugtraq, CERT or other sources&lt;br /&gt;
&lt;br /&gt;
* Tools and utilities to implement an intrusion detection system (IDS)&lt;br /&gt;
&lt;br /&gt;
* Awareness of OpenVAS and Snort&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* telnet&lt;br /&gt;
&lt;br /&gt;
* nmap&lt;br /&gt;
&lt;br /&gt;
* fail2ban&lt;br /&gt;
&lt;br /&gt;
* nc&lt;br /&gt;
&lt;br /&gt;
* iptables &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;212.5 OpenVPN (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenVPN &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/openvpn/&lt;br /&gt;
&lt;br /&gt;
* openvpn&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Extend the amount of NetworkManager covered, i.e. including the CLI&lt;br /&gt;
&lt;br /&gt;
* lighttpd would have been too much coverage of web services.  Perhaps reduce Apache next revision to make room.&lt;br /&gt;
&lt;br /&gt;
* host level IDS (tripwire, AIDE, etc) to be covered in future LPIC-1.&lt;br /&gt;
&lt;br /&gt;
* introduction (or more) to FreeIPA&lt;br /&gt;
&lt;br /&gt;
* add coverage of mod_security and mod_evasive to Apache HTTP (maybe as a separate topic: Web Application Firewall)&lt;br /&gt;
&lt;br /&gt;
* add coverage of a higher-level firewall package like firewalld or ufw&lt;br /&gt;
&lt;br /&gt;
* Reconsider mod_perl&lt;br /&gt;
&lt;br /&gt;
* Add firewall-cmd and /etc/firewalld/firewalld.conf related to firewalld to LPIC-2&lt;br /&gt;
&lt;br /&gt;
* Awareness of firewalld&lt;br /&gt;
&lt;br /&gt;
* Add nmcli and nmtui to LPIC-2&lt;br /&gt;
&lt;br /&gt;
* Full coverage of IPv6 auto configuration&lt;br /&gt;
&lt;br /&gt;
* Remove djbdns&lt;br /&gt;
&lt;br /&gt;
* Advanced shell scripting (sed -e, set -x, set -o, pipefail, PIPESTATUS, declare)&lt;br /&gt;
&lt;br /&gt;
* Filesystem quota (similar to the topic removed from LPIC-1)&lt;br /&gt;
&lt;br /&gt;
* Understanding of consistency in backups, e.g. for databases&lt;br /&gt;
&lt;br /&gt;
* Let&#039;s Encrypt for certification procurement&lt;br /&gt;
&lt;br /&gt;
* 202.2: Reconsider NVMe booting&lt;br /&gt;
&lt;br /&gt;
* 207.1: Consider dropping djbdns and consider unbound&lt;br /&gt;
&lt;br /&gt;
* 207.1: /var/named/ is distro-specific&lt;br /&gt;
&lt;br /&gt;
* 207.2: Remove creation of root.hints&lt;br /&gt;
&lt;br /&gt;
* 207.2: Reconsider nslookup&lt;br /&gt;
&lt;br /&gt;
* 207.3: Reconsider chroot&lt;br /&gt;
&lt;br /&gt;
* 208.2: Remove CA.pl&lt;br /&gt;
&lt;br /&gt;
* 208.2: Remove SNI specialties&lt;br /&gt;
&lt;br /&gt;
* 208.2: Remove client certificate options&lt;br /&gt;
&lt;br /&gt;
* 208.3: Reconsider the relevance of Squid&lt;br /&gt;
&lt;br /&gt;
* 209.1: Remove Samba Share-Level security&lt;br /&gt;
&lt;br /&gt;
* 209.1: Remove nmblookup&lt;br /&gt;
&lt;br /&gt;
* 210.1: Remove arp&lt;br /&gt;
&lt;br /&gt;
* 210.4: Aggregate Whitepages, schemas, classes etc.&lt;br /&gt;
&lt;br /&gt;
* 212.2: Remove FTP&lt;br /&gt;
&lt;br /&gt;
* 212.3: Remove Protocol&lt;br /&gt;
&lt;br /&gt;
* 212.4: Remove bugtraq etc.&lt;br /&gt;
&lt;br /&gt;
* Remove paths to commands and configuration files wherever possible&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5713</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5713"/>
		<updated>2022-11-15T21:32:30Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the common security threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security goals &lt;br /&gt;
&lt;br /&gt;
* Understanding of common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understanding of common goals of attacks against IT systems and devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of attribution and related issues&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand how to find and interpret relevant security information. This includes understanding the risk of a security vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understanding of security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, IoT devices (e.g. light bulbs, thermostats, TVs)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems, and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand how to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access, and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward DNS, reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common security threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand recognition and anonymity concepts when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of cryptocurrencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPNs)&lt;br /&gt;
&lt;br /&gt;
* End-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi-factor authentication, and single sign-on, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (e.g. length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multi-factor authentication (MFA), including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understanding of how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring personal accounts for password leaks (e.g. search engine alerts for usernames and password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two-factor authentication (2FA) and multi-factor authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
* One-time passwords (OTP), time-based one-time passwords (TOTP)&lt;br /&gt;
&lt;br /&gt;
* Authenticator applications&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand how to keep confidential information secret and ensure the confidentiality of digital communication. This includes recognizing attempts of phishing and social engineering, as well as using secure means of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam, email spam filtering&lt;br /&gt;
&lt;br /&gt;
* Non-disclosure agreements (NDA)&lt;br /&gt;
&lt;br /&gt;
* Information classification&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common security threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling, and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding personal information (e.g. GDPR)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting, user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5712</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5712"/>
		<updated>2022-11-15T21:26:18Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 025.2 Information Confidentiality and Secure Communication (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security goals &lt;br /&gt;
&lt;br /&gt;
* Understanding of common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understanding of common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of attribution and related issues&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understanding of security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, IoT devices (e.g. light bulbs, thermostats, TVs)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems, and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand how to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access, and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward DNS, reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand recognition and anonymity concepts when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of cryptocurrencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPNs)&lt;br /&gt;
&lt;br /&gt;
* End-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi-factor authentication, and single sign-on, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (e.g. length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multi-factor authentication (MFA), including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understanding of how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring personal accounts for password leaks (e.g. search engine alerts for usernames and password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two-factor authentication (2FA) and multi-factor authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
* One-time passwords (OTP), time-based one-time passwords (TOTP)&lt;br /&gt;
&lt;br /&gt;
* Authenticator applications&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand how to keep confidential information secret and ensure the confidentiality of digital communication. This includes recognizing attempts of phishing and social engineering, as well as using secure means of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam, email spam filtering&lt;br /&gt;
&lt;br /&gt;
* Non-disclosure agreements (NDA)&lt;br /&gt;
&lt;br /&gt;
* Information classification&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling, and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding personal information (e.g. GDPR)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting, user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5711</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5711"/>
		<updated>2022-11-15T21:25:56Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 023.4 Data Availability (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security goals &lt;br /&gt;
&lt;br /&gt;
* Understanding of common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understanding of common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of attribution and related issues&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understanding of security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, IoT devices (e.g. light bulbs, thermostats, TVs)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems, and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand how to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access, and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward DNS, reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand recognition and anonymity concepts when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of cryptocurrencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPNs)&lt;br /&gt;
&lt;br /&gt;
* End-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi-factor authentication, and single sign-on, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (e.g. length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multi-factor authentication (MFA), including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understanding of how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring personal accounts for password leaks (e.g. search engine alerts for usernames and password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two-factor authentication (2FA) and multi-factor authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
* One-time passwords (OTP), time-based one-time passwords (TOTP)&lt;br /&gt;
&lt;br /&gt;
* Authenticator applications&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and ensure the confidentiality of digital communication. This includes recognizing attempts of phishing and social engineering, as well as using secure means of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam, email spam filtering&lt;br /&gt;
&lt;br /&gt;
* Non-disclosure agreements (NDA)&lt;br /&gt;
&lt;br /&gt;
* Information classification&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling, and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding personal information (e.g. GDPR)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting, user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5710</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5710"/>
		<updated>2022-11-15T21:25:26Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 021.2 Risk Assessment and Management (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security goals &lt;br /&gt;
&lt;br /&gt;
* Understanding of common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understanding of common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of attribution and related issues&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understanding of security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, IoT devices (e.g. light bulbs, thermostats, TVs)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems, and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access, and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward DNS, reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand recognition and anonymity concepts when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of cryptocurrencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPNs)&lt;br /&gt;
&lt;br /&gt;
* End-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi-factor authentication, and single sign-on, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (e.g. length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multi-factor authentication (MFA), including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understanding of how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring personal accounts for password leaks (e.g. search engine alerts for usernames and password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two-factor authentication (2FA) and multi-factor authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
* One-time passwords (OTP), time-based one-time passwords (TOTP)&lt;br /&gt;
&lt;br /&gt;
* Authenticator applications&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and ensure the confidentiality of digital communication. This includes recognizing attempts of phishing and social engineering, as well as using secure means of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam, email spam filtering&lt;br /&gt;
&lt;br /&gt;
* Non-disclosure agreements (NDA)&lt;br /&gt;
&lt;br /&gt;
* Information classification&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling, and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding personal information (e.g. GDPR)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting, user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5709</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5709"/>
		<updated>2022-11-15T21:24:09Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security goals &lt;br /&gt;
&lt;br /&gt;
* Understanding of common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understanding of common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of attribution and related issues&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understanding of security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, IoT devices (e.g. light bulbs, thermostats, TVs)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems, and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access, and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward DNS, reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand recognition and anonymity concepts when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of cryptocurrencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPNs)&lt;br /&gt;
&lt;br /&gt;
* End-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi-factor authentication, and single sign-on, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (e.g. length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multi-factor authentication (MFA), including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understanding of how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring personal accounts for password leaks (e.g. search engine alerts for usernames and password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two-factor authentication (2FA) and multi-factor authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
* One-time passwords (OTP), time-based one-time passwords (TOTP)&lt;br /&gt;
&lt;br /&gt;
* Authenticator applications&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and ensure the confidentiality of digital communication. This includes recognizing attempts of phishing and social engineering, as well as using secure means of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam, email spam filtering&lt;br /&gt;
&lt;br /&gt;
* Non-disclosure agreements (NDA)&lt;br /&gt;
&lt;br /&gt;
* Information classification&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling, and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding personal information (e.g. GDPR)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting, user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5708</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5708"/>
		<updated>2022-11-15T21:22:35Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 021.1 Goals, Roles and Actors (weight: 1) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of attribution and related issues&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, IoT devices (e.g. light bulbs, thermostats, TVs)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems, and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access, and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward DNS, reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand recognition and anonymity concepts when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of cryptocurrencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPNs)&lt;br /&gt;
&lt;br /&gt;
* End-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi-factor authentication, and single sign-on, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (e.g. length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multi-factor authentication (MFA), including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring personal accounts for password leaks (e.g. search engine alerts for usernames and password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two-factor authentication (2FA) and multi-factor authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
* One-time passwords (OTP), time-based one-time passwords (TOTP)&lt;br /&gt;
&lt;br /&gt;
* Authenticator applications&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and ensure the confidentiality of digital communication. This includes recognizing attempts of phishing and social engineering, as well as using secure means of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam, email spam filtering&lt;br /&gt;
&lt;br /&gt;
* Non-disclosure agreements (NDA)&lt;br /&gt;
&lt;br /&gt;
* Information classification&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling, and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding personal information (e.g. GDPR)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting, user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5707</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5707"/>
		<updated>2022-11-15T21:17:22Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 025.3 Privacy Protection (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, IoT devices (e.g. light bulbs, thermostats, TVs)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems, and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access, and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward DNS, reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand recognition and anonymity concepts when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of cryptocurrencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPNs)&lt;br /&gt;
&lt;br /&gt;
* End-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi-factor authentication, and single sign-on, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (e.g. length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multi-factor authentication (MFA), including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring personal accounts for password leaks (e.g. search engine alerts for usernames and password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two-factor authentication (2FA) and multi-factor authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
* One-time passwords (OTP), time-based one-time passwords (TOTP)&lt;br /&gt;
&lt;br /&gt;
* Authenticator applications&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and ensure the confidentiality of digital communication. This includes recognizing attempts of phishing and social engineering, as well as using secure means of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam, email spam filtering&lt;br /&gt;
&lt;br /&gt;
* Non-disclosure agreements (NDA)&lt;br /&gt;
&lt;br /&gt;
* Information classification&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling, and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding personal information (e.g. GDPR)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting, user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5706</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5706"/>
		<updated>2022-11-15T21:14:31Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 025.2 Information Confidentiality and Secure Communication (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, IoT devices (e.g. light bulbs, thermostats, TVs)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems, and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access, and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward DNS, reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand recognition and anonymity concepts when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of cryptocurrencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPNs)&lt;br /&gt;
&lt;br /&gt;
* End-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi-factor authentication, and single sign-on, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (e.g. length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multi-factor authentication (MFA), including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring personal accounts for password leaks (e.g. search engine alerts for usernames and password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two-factor authentication (2FA) and multi-factor authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
* One-time passwords (OTP), time-based one-time passwords (TOTP)&lt;br /&gt;
&lt;br /&gt;
* Authenticator applications&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and ensure the confidentiality of digital communication. This includes recognizing attempts of phishing and social engineering, as well as using secure means of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam, email spam filtering&lt;br /&gt;
&lt;br /&gt;
* Non-disclosure agreements (NDA)&lt;br /&gt;
&lt;br /&gt;
* Information classification&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5705</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5705"/>
		<updated>2022-11-15T21:10:47Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 025.1 Identity and Authentication (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, IoT devices (e.g. light bulbs, thermostats, TVs)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems, and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access, and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward DNS, reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand recognition and anonymity concepts when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of cryptocurrencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPNs)&lt;br /&gt;
&lt;br /&gt;
* End-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi-factor authentication, and single sign-on, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (e.g. length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multi-factor authentication (MFA), including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring personal accounts for password leaks (e.g. search engine alerts for usernames and password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two-factor authentication (2FA) and multi-factor authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
* One-time passwords (OTP), time-based one-time passwords (TOTP)&lt;br /&gt;
&lt;br /&gt;
* Authenticator applications&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and to ensure the confidentiality of digital communication. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam and email spam filtering&lt;br /&gt;
&lt;br /&gt;
* Non disclosure agreements (NDA)&lt;br /&gt;
&lt;br /&gt;
* Information classification&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5703</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5703"/>
		<updated>2022-11-15T21:03:13Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 024.3 Network Encryption and Anonymity (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, IoT devices (e.g. light bulbs, thermostats, TVs)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems, and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access, and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward DNS, reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand recognition and anonymity concepts when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of cryptocurrencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPNs)&lt;br /&gt;
&lt;br /&gt;
* End-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi factor authentication and Single Sign-On, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multifactor factor authentication, including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two factor authentication (2FA) and Multi factor authentication&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and to ensure the confidentiality of digital communication. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam and email spam filtering&lt;br /&gt;
&lt;br /&gt;
* Non disclosure agreements (NDA)&lt;br /&gt;
&lt;br /&gt;
* Information classification&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5701</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5701"/>
		<updated>2022-11-15T20:55:06Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 024.2 Network and Internet Security (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, IoT devices (e.g. light bulbs, thermostats, TVs)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems, and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access, and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward DNS, reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand about recognition and anonymity when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPN)&lt;br /&gt;
&lt;br /&gt;
* End to end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi factor authentication and Single Sign-On, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multifactor factor authentication, including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two factor authentication (2FA) and Multi factor authentication&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and to ensure the confidentiality of digital communication. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam and email spam filtering&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5700</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5700"/>
		<updated>2022-11-15T20:54:10Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 024.1 Networks, Network Services and the Internet (weight: 4) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, IoT devices (e.g. light bulbs, thermostats, TVs)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems, and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access, and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward DNS, reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand about recognition and anonymity when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPN)&lt;br /&gt;
&lt;br /&gt;
* End to end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi factor authentication and Single Sign-On, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multifactor factor authentication, including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two factor authentication (2FA) and Multi factor authentication&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and to ensure the confidentiality of digital communication. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam and email spam filtering&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5699</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5699"/>
		<updated>2022-11-15T20:51:35Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 023.4 Data Availability (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, IoT devices (e.g. light bulbs, thermostats, TVs)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems, and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access, and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward and reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand about recognition and anonymity when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPN)&lt;br /&gt;
&lt;br /&gt;
* End to end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi factor authentication and Single Sign-On, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multifactor factor authentication, including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two factor authentication (2FA) and Multi factor authentication&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and to ensure the confidentiality of digital communication. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam and email spam filtering&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5698</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5698"/>
		<updated>2022-11-15T20:47:57Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 023.2 Application Security (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, IoT devices (e.g. light bulbs, thermostats, TVs)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems, and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward and reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand about recognition and anonymity when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPN)&lt;br /&gt;
&lt;br /&gt;
* End to end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi factor authentication and Single Sign-On, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multifactor factor authentication, including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two factor authentication (2FA) and Multi factor authentication&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and to ensure the confidentiality of digital communication. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam and email spam filtering&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5697</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5697"/>
		<updated>2022-11-15T20:44:52Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 023.1 Hardware Security (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, IoT devices (e.g. light bulbs, thermostats, TVs)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward and reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand about recognition and anonymity when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPN)&lt;br /&gt;
&lt;br /&gt;
* End to end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi factor authentication and Single Sign-On, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multifactor factor authentication, including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two factor authentication (2FA) and Multi factor authentication&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and to ensure the confidentiality of digital communication. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam and email spam filtering&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5696</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5696"/>
		<updated>2022-11-15T20:43:32Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 023.1 Hardware Security (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections, and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, IoT devices (light bulbs, thermostats, TVs, …)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward and reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand about recognition and anonymity when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPN)&lt;br /&gt;
&lt;br /&gt;
* End to end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi factor authentication and Single Sign-On, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multifactor factor authentication, including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two factor authentication (2FA) and Multi factor authentication&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and to ensure the confidentiality of digital communication. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam and email spam filtering&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5695</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5695"/>
		<updated>2022-11-15T20:38:47Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 022.4 Data Storage Encryption (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud services&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, and IoT devices (light bulbs, thermostats, TVs, …)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward and reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand about recognition and anonymity when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPN)&lt;br /&gt;
&lt;br /&gt;
* End to end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi factor authentication and Single Sign-On, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multifactor factor authentication, including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two factor authentication (2FA) and Multi factor authentication&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and to ensure the confidentiality of digital communication. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam and email spam filtering&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5694</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5694"/>
		<updated>2022-11-15T20:37:54Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 022.3 Email Encryption (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys, key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud service&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, and IoT devices (light bulbs, thermostats, TVs, …)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward and reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand about recognition and anonymity when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPN)&lt;br /&gt;
&lt;br /&gt;
* End to end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi factor authentication and Single Sign-On, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multifactor factor authentication, including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two factor authentication (2FA) and Multi factor authentication&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and to ensure the confidentiality of digital communication. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam and email spam filtering&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5693</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5693"/>
		<updated>2022-11-15T20:32:29Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 022.1 Cryptography and Public Key Infrastructure (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys and key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud service&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, and IoT devices (light bulbs, thermostats, TVs, …)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward and reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand about recognition and anonymity when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPN)&lt;br /&gt;
&lt;br /&gt;
* End to end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi factor authentication and Single Sign-On, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multifactor factor authentication, including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two factor authentication (2FA) and Multi factor authentication&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and to ensure the confidentiality of digital communication. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam and email spam filtering&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5692</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5692"/>
		<updated>2022-11-15T20:30:56Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, and Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys and key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud service&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, and IoT devices (light bulbs, thermostats, TVs, …)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward and reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand about recognition and anonymity when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPN)&lt;br /&gt;
&lt;br /&gt;
* End to end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi factor authentication and Single Sign-On, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multifactor factor authentication, including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two factor authentication (2FA) and Multi factor authentication&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and to ensure the confidentiality of digital communication. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam and email spam filtering&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms, and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5691</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5691"/>
		<updated>2022-11-15T20:28:23Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concept of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of Public Key Infrastructures (PKI), Certificate Authorities, and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, and Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys and key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of data, file, and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the core features of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud service&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, and IoT devices (light bulbs, thermostats, TVs, …)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration, and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera, microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of MAC and link-layer addresses, IP addresses, TCP and UDP ports, and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks, cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers, Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward and reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand about recognition and anonymity when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPN)&lt;br /&gt;
&lt;br /&gt;
* End to end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi factor authentication and Single Sign-On, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of authentication, authorization, and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of multifactor factor authentication, including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two factor authentication (2FA) and Multi factor authentication&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and to ensure the confidentiality of digital communication. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the concepts of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam and email spam filtering&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5690</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5690"/>
		<updated>2022-11-15T20:18:02Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 022.2 Web Encryption (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common principles in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of Public Key Infrastructures (PKI), Certificate Authorities and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, and Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS, SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys and key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principles of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of data, file and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud service&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, and IoT devices (light bulbs, thermostats, TVs, …)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of various types of malware. This includes understanding of how they are installed on a device, what effects they cause and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera and microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principles of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of MAC and link-layer addresses, IP addresses, TCP and UDP ports and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks and cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers and Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward and reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand about recognition and anonymity when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPN)&lt;br /&gt;
&lt;br /&gt;
* End to end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi factor authentication and Single Sign-On, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of authentication, authorization and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of multifactor factor authentication, including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two factor authentication (2FA) and Multi factor authentication&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and to ensure the confidentiality of digital communication. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam and email spam filtering&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5689</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5689"/>
		<updated>2022-11-15T20:17:28Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 022.2 Web Encryption (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common principles in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of Public Key Infrastructures (PKI), Certificate Authorities and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, and Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS and SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity, and subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys and key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principles of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of data, file and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud service&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, and IoT devices (light bulbs, thermostats, TVs, …)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of various types of malware. This includes understanding of how they are installed on a device, what effects they cause and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera and microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principles of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of MAC and link-layer addresses, IP addresses, TCP and UDP ports and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks and cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers and Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward and reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand about recognition and anonymity when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPN)&lt;br /&gt;
&lt;br /&gt;
* End to end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi factor authentication and Single Sign-On, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of authentication, authorization and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of multifactor factor authentication, including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two factor authentication (2FA) and Multi factor authentication&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and to ensure the confidentiality of digital communication. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam and email spam filtering&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5688</id>
		<title>Security Essentials Objectives V1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=Security_Essentials_Objectives_V1.0&amp;diff=5688"/>
		<updated>2022-11-15T20:16:12Z</updated>

		<summary type="html">&lt;p&gt;GMatthewRice: /* 022.1 Cryptography and Public Key Infrastructure (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the main threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
===The Minimally Qualified Candidate===&lt;br /&gt;
&lt;br /&gt;
The candidate has a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud. The candidate understands common ways to prevent and mitigate attacks against their personal devices and data. Furthermore, the candidate is able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud. The candidate is able to apply common security best practices, protect private information, and secure their identity. The candidate is able to securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are &#039;&#039;&#039;A DRAFT FOR&#039;&#039;&#039; version 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0|English]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(PT-BR)|Brazilian Portuguese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH)|Chinese (Simplified)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ZH-TW)|Chinese (Traditional)]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(NL)|Dutch]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(FR)|French]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(DE)|German]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(IT)|Italian]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(JA)|Japanese]]&lt;br /&gt;
* [[SecurityEssentials Objectives V1.0(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;021 Security Concepts&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.1 Goals, Roles and Actors (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the importance of IT security&lt;br /&gt;
&lt;br /&gt;
* Understand common security goals &lt;br /&gt;
&lt;br /&gt;
* Understand common roles in security&lt;br /&gt;
&lt;br /&gt;
* Understand common goals of security attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Confidentiality, integrity, availability, non-repudiation&lt;br /&gt;
&lt;br /&gt;
* Hackers, crackers, script kiddies&lt;br /&gt;
&lt;br /&gt;
* Black hat and white hat hackers&lt;br /&gt;
&lt;br /&gt;
* Accessing, manipulating or deleting data&lt;br /&gt;
&lt;br /&gt;
* Interrupting services, extorting ransom&lt;br /&gt;
&lt;br /&gt;
* Industrial espionage&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.2 Risk Assessment and Management (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should know how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need and urgency for a reaction.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Know common sources for security information&lt;br /&gt;
&lt;br /&gt;
* Understand security incident classification schema and important types of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of security assessments and IT forensics&lt;br /&gt;
&lt;br /&gt;
* Awareness of Information Security Management Systems (ISMS) and Information Security Incident Response Plans and Teams &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Common Vulnerabilities and Exposures (CVE)&lt;br /&gt;
&lt;br /&gt;
* CVE ID&lt;br /&gt;
&lt;br /&gt;
* Computer Emergency Response Team (CERT)&lt;br /&gt;
&lt;br /&gt;
* Penetration testing&lt;br /&gt;
&lt;br /&gt;
* Untargeted security attacks and Advanced Persistent Threats (APT)&lt;br /&gt;
&lt;br /&gt;
* Zero-day security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Remote execution and explication of security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
* Privilege escalation due to security vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;021.3 Ethical Behavior (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common principles in copyright and privacy laws.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications for others of actions taken related to security&lt;br /&gt;
&lt;br /&gt;
* Handling information about security vulnerabilities responsibly&lt;br /&gt;
&lt;br /&gt;
* Handling confidential information responsibly&lt;br /&gt;
&lt;br /&gt;
* Awareness of personal, financial, ecological, and social implication of errors and outages in information technology services&lt;br /&gt;
&lt;br /&gt;
* Awareness of legal implications of security scans, assessments, and attacks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Responsible Disclosure and Full Disclosure&lt;br /&gt;
&lt;br /&gt;
* Bug Bounty programs&lt;br /&gt;
&lt;br /&gt;
* Public and private law&lt;br /&gt;
&lt;br /&gt;
* Penal law, privacy law, copyright law&lt;br /&gt;
&lt;br /&gt;
* Liability, financial compensation claims&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;022 Encryption&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.1 Cryptography and Public Key Infrastructure (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of symmetric, asymmetric, and hybrid cryptography&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of Perfect Forward Secrecy&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of hash functions, ciphers, and key exchange algorithms&lt;br /&gt;
&lt;br /&gt;
* Understanding of the differences between end-to-end encryption and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of Public Key Infrastructures (PKI), Certificate Authorities and Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are requested and issued&lt;br /&gt;
&lt;br /&gt;
* Awareness of certificate revocation&lt;br /&gt;
&lt;br /&gt;
* Awareness of Let’s Encrypt&lt;br /&gt;
&lt;br /&gt;
* Awareness of important cryptographic algorithms&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Public Key Infrastructures (PKI)&lt;br /&gt;
&lt;br /&gt;
* Certificate Authorities&lt;br /&gt;
&lt;br /&gt;
* Trusted Root-CAs&lt;br /&gt;
&lt;br /&gt;
* Certificate Signing Requests (CSR) and certificates&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: Subject, Issuer, Validity&lt;br /&gt;
&lt;br /&gt;
* RSA, AES, MD5, SHA-256, Diffie–Hellman key exchange, and Elliptic Curve Cryptography&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.2 Web Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major differences between plain text protocols and transport encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of important fields in X.509 certificates for the use with HTTPS&lt;br /&gt;
&lt;br /&gt;
* Understanding of how X.509 certificates are associated with a specific web site&lt;br /&gt;
&lt;br /&gt;
* Understanding of the validity checks web browsers perform on X.509 certificates&lt;br /&gt;
&lt;br /&gt;
* Determining whether or not a website is encrypted, including common browser messages&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* HTTPS, TLS and SSL&lt;br /&gt;
&lt;br /&gt;
* X.509 certificate fields: subject, Validity and subjectAltName&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.3 Email Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of email encryption and email signatures&lt;br /&gt;
&lt;br /&gt;
* Understanding of OpenPGP&lt;br /&gt;
&lt;br /&gt;
* Understanding of S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of OpenPGP key servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of certificates for S/MIME&lt;br /&gt;
&lt;br /&gt;
* Understanding of how PGP keys and S/MIME certificates are associated with an email address&lt;br /&gt;
&lt;br /&gt;
* Using Mozilla Thunderbird to send and receive encrypted email using OpenPGP and S/MIME&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* GnuPGP, GPG keys and key servers&lt;br /&gt;
&lt;br /&gt;
* S/MIME and S/MIME certificates&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;022.4 Data Storage Encryption (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principles of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of data, file and storage device encryption&lt;br /&gt;
&lt;br /&gt;
* Using VeraCrypt to store data in an encrypted container or an encrypted storage devices&lt;br /&gt;
&lt;br /&gt;
* Understanding the principle of BitLocker&lt;br /&gt;
&lt;br /&gt;
* Using Cryptomator to encrypt files stored in file storage cloud service&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* VeraCrypt&lt;br /&gt;
&lt;br /&gt;
* BitLocker&lt;br /&gt;
&lt;br /&gt;
* Cryptomator&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;023 Node, Device and Storage Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.1 Hardware Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the major components of a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of the smart devices and the Internet of Things (IoT)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of physical access to a computer&lt;br /&gt;
&lt;br /&gt;
* Understanding of USB devices devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of Bluetooth devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Understanding of RFID devices types, connections and security aspects&lt;br /&gt;
&lt;br /&gt;
* Awareness of Trusted Computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Processors, memory, storage, network adapters&lt;br /&gt;
&lt;br /&gt;
* Tablets, smartphones, smart tvs, routers, printers smart home, alarm, and IoT devices (light bulbs, thermostats, TVs, …)&lt;br /&gt;
&lt;br /&gt;
* USB&lt;br /&gt;
&lt;br /&gt;
* Bluetooth&lt;br /&gt;
&lt;br /&gt;
* RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.2 Application Security (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the security aspects of software. This includes securely installing software, managing software updates and protecting software from unintended network connections.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of software&lt;br /&gt;
&lt;br /&gt;
* Understanding of various sources for applications and ways to securely procure and install software&lt;br /&gt;
&lt;br /&gt;
* Understanding of updates for firmware, operating systems and applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of sources for mobile applications&lt;br /&gt;
&lt;br /&gt;
* Understanding of common security vulnerabilities in software&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of local protective software&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Firmware, operating systems, applications&lt;br /&gt;
&lt;br /&gt;
* App stores&lt;br /&gt;
&lt;br /&gt;
* Local packet filters, endpoint firewalls, application layer firewalls&lt;br /&gt;
&lt;br /&gt;
* Buffer overflows, SQL injections&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.3 Malware (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of various types of malware. This includes understanding of how they are installed on a device, what effects they cause and how to protect against malware.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of common types of malware &lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of rootkit and remote access&lt;br /&gt;
&lt;br /&gt;
* Understanding of virus and malware scanners&lt;br /&gt;
&lt;br /&gt;
* Awareness of the risk of malware used for spying, data exfiltration and address books copies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Viruses, ransomware, trojan malware, adware, cryptominers&lt;br /&gt;
&lt;br /&gt;
* Backdoors and remote access&lt;br /&gt;
&lt;br /&gt;
* File copying, keylogging, camera and microphone hijacking&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;023.4 Data Availability (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of common backup types and strategies&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of backups&lt;br /&gt;
&lt;br /&gt;
* Creating and securely storing backups&lt;br /&gt;
&lt;br /&gt;
* Understanding of data storage, access and sharing in cloud services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security implications of cloud storage and shared access in the cloud&lt;br /&gt;
&lt;br /&gt;
* Awareness of the dependence on Internet connection and the synchronization of data between cloud services and local storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Full, differential and incremental backups&lt;br /&gt;
&lt;br /&gt;
* Backup retention&lt;br /&gt;
&lt;br /&gt;
* File sharing cloud services&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;024 Network and Service Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.1 Networks, Network Services and the Internet (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principles of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing and packet forwarding as well as understanding of the most important protocols used in the Internet.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the various types of network media and network devices&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of IP networks and the Internet&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of routing and Internet Service Providers (ISPs)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of MAC and link-layer addresses, IP addresses, TCP and UDP ports and DNS&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of cloud computing&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Wired networks, WiFi networks and cellular networks&lt;br /&gt;
&lt;br /&gt;
* Switches, Routers and Access Points&lt;br /&gt;
&lt;br /&gt;
* Default Router&lt;br /&gt;
&lt;br /&gt;
* Internet Service Provider&lt;br /&gt;
&lt;br /&gt;
* IPv4, IPv6&lt;br /&gt;
&lt;br /&gt;
* TCP, UDP, ICMP, DHCP&lt;br /&gt;
&lt;br /&gt;
* DNS, DNS host names, forward and reverse DNS&lt;br /&gt;
&lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&lt;br /&gt;
* Infrastructure as a Service (IaaS)&lt;br /&gt;
&lt;br /&gt;
* Platform as a Service (PaaS)&lt;br /&gt;
&lt;br /&gt;
* Software as a Service (SaaS)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.2 Network and Internet Security (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the implications of media / link layer access&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risks and secure use of WiFi networks&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of traffic interception&lt;br /&gt;
&lt;br /&gt;
* Understanding of common threats in the Internet along with approaches of mitigation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Link layer&lt;br /&gt;
&lt;br /&gt;
* Unencrypted and public WiFi&lt;br /&gt;
&lt;br /&gt;
* WiFi security and encryption&lt;br /&gt;
&lt;br /&gt;
* WEP, WPA, WPA2&lt;br /&gt;
&lt;br /&gt;
* Traffic interception&lt;br /&gt;
&lt;br /&gt;
* Man in the Middle attacks&lt;br /&gt;
&lt;br /&gt;
* DoS and DDoS attacks&lt;br /&gt;
&lt;br /&gt;
* Botnets&lt;br /&gt;
&lt;br /&gt;
* Packet filters&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;024.3 Network Encryption and Anonymity (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the principle of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand about recognition and anonymity when using the Internet as well as anonymization tools, such as TOR.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of virtual private networks (VPN)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of end-to-end encryption&lt;br /&gt;
&lt;br /&gt;
* Understanding anonymity and recognition in the Internet&lt;br /&gt;
&lt;br /&gt;
* Identification due to link layer addresses and IP addresses&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of proxy servers&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of TOR &lt;br /&gt;
&lt;br /&gt;
* Awareness of the Darknet&lt;br /&gt;
&lt;br /&gt;
* Awareness of crypto currencies and their anonymity aspects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Virtual Private Network (VPN)&lt;br /&gt;
&lt;br /&gt;
* Public VPN providers&lt;br /&gt;
&lt;br /&gt;
* Organization-specific VPN (e.g. company or university VPN)&lt;br /&gt;
&lt;br /&gt;
* End to end encryption&lt;br /&gt;
&lt;br /&gt;
* Transfer encryption&lt;br /&gt;
&lt;br /&gt;
* Anonymity&lt;br /&gt;
&lt;br /&gt;
* Proxy servers&lt;br /&gt;
&lt;br /&gt;
* TOR&lt;br /&gt;
&lt;br /&gt;
* Hidden service&lt;br /&gt;
&lt;br /&gt;
* .onion&lt;br /&gt;
&lt;br /&gt;
* Blockchain&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;025 Identity and Privacy&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.1 Identity and Authentication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi factor authentication and Single Sign-On, as well as being aware of common security threats regarding individual identities.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle digital identities.&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principles of authentication, authorization and accounting&lt;br /&gt;
&lt;br /&gt;
* Understanding of the characteristics of secure password (length, special characters, change frequencies, complexity)&lt;br /&gt;
&lt;br /&gt;
* Using a password manager&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of security questions and account recovery tools&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of multifactor factor authentication, including common factors&lt;br /&gt;
&lt;br /&gt;
* Understanding of the principle of single sign-on (SSO) and social media logins&lt;br /&gt;
&lt;br /&gt;
* Understanding of the role of email accounts for IT security&lt;br /&gt;
&lt;br /&gt;
* Understand how passwords are stored in online services&lt;br /&gt;
&lt;br /&gt;
* Understand common attacks against passwords &lt;br /&gt;
&lt;br /&gt;
* Monitoring own accounts for password leaks (Search engine alerts for own usernames, password leak checkers)&lt;br /&gt;
&lt;br /&gt;
* Understanding of the security aspects of online banking and credit cards&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Online and offline password managers&lt;br /&gt;
&lt;br /&gt;
* keepass2&lt;br /&gt;
&lt;br /&gt;
* Single sign-on (SSO)&lt;br /&gt;
&lt;br /&gt;
* Two factor authentication (2FA) and Multi factor authentication&lt;br /&gt;
&lt;br /&gt;
* Password hashing and salting&lt;br /&gt;
&lt;br /&gt;
* Brute force attacks, directory attacks, rainbow table attacks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.2 Information Confidentiality and Secure Communication (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should be able to keep confidential information secret and to ensure the confidentiality of digital communication. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the implications and risks of data leaks and intercepted communication&lt;br /&gt;
&lt;br /&gt;
* Understanding of Phishing and social engineering and scamming&lt;br /&gt;
&lt;br /&gt;
* Understanding the principles of email spam filters&lt;br /&gt;
&lt;br /&gt;
* Securely handling of received email attachments&lt;br /&gt;
&lt;br /&gt;
* Sharing information securely and responsibly using email cloud shares and messaging services&lt;br /&gt;
&lt;br /&gt;
* Using encrypted instant messaging&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Phishing and social engineering&lt;br /&gt;
&lt;br /&gt;
* Identity theft&lt;br /&gt;
&lt;br /&gt;
* Scamming and scareware&lt;br /&gt;
&lt;br /&gt;
* Email spam and email spam filtering&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;025.3 Privacy Protection (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common threats regarding personal information.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding of the importance of personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of how personal information can be used for a malicious purpose&lt;br /&gt;
&lt;br /&gt;
* Understanding of the concepts of information gathering, profiling and user tracking&lt;br /&gt;
&lt;br /&gt;
* Managing profile privacy settings on social media platforms and online services&lt;br /&gt;
&lt;br /&gt;
* Understanding of the risk of publishing personal information&lt;br /&gt;
&lt;br /&gt;
* Understanding of the rights regarding information about personal information (such as GDPR in Europe)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Stalking and cybermobbing&lt;br /&gt;
&lt;br /&gt;
* HTTP cookies, browser fingerprinting and user tracking&lt;br /&gt;
&lt;br /&gt;
* Script blockers and ad blockers in web browsers&lt;br /&gt;
&lt;br /&gt;
* Profiles in online services and social media&lt;br /&gt;
&lt;br /&gt;
* Contacts and privacy settings in social media&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>GMatthewRice</name></author>
	</entry>
</feed>