<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.lpi.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Restaurador</id>
	<title>LPI Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.lpi.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Restaurador"/>
	<link rel="alternate" type="text/html" href="https://wiki.lpi.org/wiki/Special:Contributions/Restaurador"/>
	<updated>2026-04-25T07:24:00Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=DevOps_Tools_Engineer_Objectives_V1(ES)&amp;diff=4363</id>
		<title>DevOps Tools Engineer Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=DevOps_Tools_Engineer_Objectives_V1(ES)&amp;diff=4363"/>
		<updated>2017-12-12T15:54:49Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: Created page with &amp;quot;__FORCETOC__ ==Introduccion==  Este es un examen obligatorio para la certificación LPIC-OT DevOps Tools Engineer. Cubre las habilidades básicas en el uso de herramientas com...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
&lt;br /&gt;
Este es un examen obligatorio para la certificación LPIC-OT DevOps Tools Engineer. Cubre las habilidades básicas en el uso de herramientas comúnmente utilizadas para tareas DevOps.&lt;br /&gt;
&lt;br /&gt;
Esta página cubre el objetivo actualmente publicado para la certificación LPIC-OT DevOps Tools Engineer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Descripción del candidato==&lt;br /&gt;
&lt;br /&gt;
El titular de la certificación es un desarrollador de software profesional o un administrador de sistemas profesional que está involucrado en la producción de soluciones de TI que requieren un proceso robusto y eficiente para obtener desde materiales fuente originales hasta un producto o servicio final desplegado o distribuible con un enfoque particular  usando la tecnología de código abierto. El titular de la certificación tiene la capacidad de crear, entregar y operar software utilizando métodos colaborativos que abordan aspectos del desarrollo de software y la administración del sistema. En particular, el titular de la certificación es experto en cerrar la brecha entre el desarrollo y las operaciones de una solución o producto. El titular de la certificación entiende cómo estas herramientas facilitan el desarrollo y las tareas operativas en la entrega de servicios estables, escalables y actualizados a usuarios y clientes.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Exámenes y requisitos==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-OT_DevOps_Tools_Engineer_Objectives_V1|Ingles]]&lt;br /&gt;
* [[LPIC-OT_DevOps_Tools_Engineer_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Exámenes y requisitos==&lt;br /&gt;
&lt;br /&gt;
La certificación LPIC-OT DevOps Tools Engineer se otorga después de aprobar este examen. No hay ningún requisito para poseer otras certificaciones. LPI recomienda a todos los ingenieros de herramientas de DevOps de LPIC-OT que mantengan al menos una certificación activa en la administración del sistema o en el desarrollo del software. Esta certificación debe tener un nivel equivalente a LPIC-1.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectivos==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;701 Ingeniería de software&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.1 Desarrollo de software moderno (peso: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to design software solutions suitable for modern runtime environments. Candidates should understand how services handle data persistence, sessions, status information, transactions, concurrency, security, performance, availability, scaling, load balancing, messaging, monitoring and APIs. Furthermore, candidates should understand the implications of agile and DevOps on software development.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and design service based applications&lt;br /&gt;
&lt;br /&gt;
* Understand common API concepts and standards&lt;br /&gt;
&lt;br /&gt;
* Understand aspects of data storage, service status and session handling&lt;br /&gt;
&lt;br /&gt;
* Design software to be run in containers&lt;br /&gt;
&lt;br /&gt;
* Design software to be deployed to cloud services&lt;br /&gt;
&lt;br /&gt;
* Awareness of risks in the migration and integration of monolithic legacy software&lt;br /&gt;
&lt;br /&gt;
* Understand common application security risks and ways to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of agile software development&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of DevOps and its implications to software developers and operators&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* REST, JSON&lt;br /&gt;
&lt;br /&gt;
* Service Orientated Architectures (SOA)&lt;br /&gt;
&lt;br /&gt;
* Microservices&lt;br /&gt;
&lt;br /&gt;
* Immutable servers&lt;br /&gt;
&lt;br /&gt;
* Loose coupling&lt;br /&gt;
&lt;br /&gt;
* Cross site scripting, SQL injections, verbose error reports, API authentication, consistent enforcement of transport encryption&lt;br /&gt;
&lt;br /&gt;
* CORS headers and CSRF tokens&lt;br /&gt;
&lt;br /&gt;
* ACID properties and CAP theorem&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.2 Standard Components and Platforms for Software (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand services offered by common cloud platforms. They should be able to include these services in their application architectures and deployment toolchains and understand the required service configurations. OpenStack service components are used as a reference implementation.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of object storage&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of relational and NoSQL databases&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of message brokers and message queues&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of big data services&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of application runtimes / PaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of content delivery networks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenStack Swift&lt;br /&gt;
&lt;br /&gt;
* OpenStack Trove&lt;br /&gt;
&lt;br /&gt;
* OpenStack Zaqar&lt;br /&gt;
&lt;br /&gt;
* CloudFoundry&lt;br /&gt;
&lt;br /&gt;
* OpenShift&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.3 Source Code Management (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to use Git to manage and share source code. This includes creating and contributing to a repository as well as the usage of tags, branches and remote repositories. Furthermore, the candidate should be able to merge files and resolve merging conflicts. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand Git concepts and repository structure&lt;br /&gt;
&lt;br /&gt;
* Manage files within a Git repository&lt;br /&gt;
&lt;br /&gt;
* Manage branches and tags&lt;br /&gt;
&lt;br /&gt;
* Work with remote repositories and branches as well as submodules&lt;br /&gt;
&lt;br /&gt;
* Merge files and branches&lt;br /&gt;
&lt;br /&gt;
* Awareness of SVN and CVS, including concepts of centralized and distributed SCM solutions&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* .gitignore&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.4 Continuous Integration and Continuous Delivery (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the principles and components of a continuous integration and continuous delivery pipeline. Candidates should be able to implement a CI/CD pipeline using Jenkins, including triggering the CI/CD pipeline, running unit, integration and acceptance tests, packaging software and handling the deployment of tested software artifacts. This objective covers the feature set of Jenkins version 2.0 or later.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Continuous Integration and Continuous Delivery&lt;br /&gt;
&lt;br /&gt;
* Understand the components of a CI/CD pipeline, including builds, unit, integration and acceptance tests, artifact management, delivery and deployment&lt;br /&gt;
&lt;br /&gt;
* Understand deployment best practices&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and features of Jenkins, including Jenkins Plugins, Jenkins API, notifications and distributed builds&lt;br /&gt;
&lt;br /&gt;
* Define and run jobs in Jenkins, including parameter handling&lt;br /&gt;
&lt;br /&gt;
* Fingerprinting, artifacts and artifact repositories&lt;br /&gt;
&lt;br /&gt;
* Understand how Jenkins models continuous delivery pipelines and implement a declarative continuous delivery pipeline in Jenkins&lt;br /&gt;
&lt;br /&gt;
* Awareness of possible authentication and authorization models&lt;br /&gt;
&lt;br /&gt;
* Understanding of the Pipeline Plugin&lt;br /&gt;
&lt;br /&gt;
* Understand the features of important Jenkins modules such as Copy Artifact Plugin, Fingerprint Plugin, Docker Pipeline, Docker Build and Publish plugin, Git Plugin, Credentials Plugin&lt;br /&gt;
&lt;br /&gt;
* Awareness of Artifactory and Nexus&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Step, Node, Stage&lt;br /&gt;
&lt;br /&gt;
* Jenkins SDL&lt;br /&gt;
&lt;br /&gt;
* Jenkinsfile&lt;br /&gt;
&lt;br /&gt;
* Declarative Pipeline&lt;br /&gt;
&lt;br /&gt;
* Blue-green and canary deployment&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;702 Container Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.1 Container Usage (weight: 7)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 7&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to build, share and operate Docker containers. This includes creating Dockerfiles, using a Docker registry, creating and interacting with containers as well as connecting containers to networks and storage volumes. This objective covers the feature set of Docker version 17.06 or later.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the Docker architecture&lt;br /&gt;
&lt;br /&gt;
* Use existing Docker images from a Docker registry&lt;br /&gt;
&lt;br /&gt;
* Create Dockerfiles and build images from Dockerfiles&lt;br /&gt;
&lt;br /&gt;
* Upload images to a Docker registry&lt;br /&gt;
&lt;br /&gt;
* Operate and access Docker containers&lt;br /&gt;
&lt;br /&gt;
* Connect container to Docker networks&lt;br /&gt;
&lt;br /&gt;
* Use Docker volumes for shared and persistent container storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker&lt;br /&gt;
&lt;br /&gt;
* Dockerfile&lt;br /&gt;
&lt;br /&gt;
* .dockerignore&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.2 Container Deployment and Orchestration (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to run and manage multiple containers that work together to provide a service. This includes the orchestration of Docker containers using Docker Compose in conjunction with an existing Docker Swarm cluster as well as using an existing Kubernetes cluster. This objective covers the feature sets of Docker Compose version 1.14 or later, Docker Swarm included in Docker 17.06 or later and Kubernetes 1.6 or later.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the application model of Docker Compose&lt;br /&gt;
&lt;br /&gt;
* Create and run Docker Compose Files (version 3 or later)&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and functionality of Docker Swarm mode&lt;br /&gt;
&lt;br /&gt;
* Run containers in a Docker Swarm, including the definition of services, stacks and the usage of secrets&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and application model Kubernetes&lt;br /&gt;
&lt;br /&gt;
* Define and manage a container-based application for Kubernetes, including the definition of Deployments, Services, ReplicaSets and Pods&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker-compose&lt;br /&gt;
&lt;br /&gt;
* docker&lt;br /&gt;
&lt;br /&gt;
* kubectl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.3 Container Infrastructure (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to set up a runtime environment for containers. This includes running containers on a local workstation as well as setting up a dedicated container host. Furthermore, candidates should be aware of other container infrastructures, storage, networking and container specific security aspects. This objective covers the feature set of Docker version 17.06 or later and Docker Machine 0.12 or later.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use Docker Machine to setup a Docker host&lt;br /&gt;
&lt;br /&gt;
* Understand Docker networking concepts, including overlay networks&lt;br /&gt;
&lt;br /&gt;
* Create and manage Docker networks&lt;br /&gt;
&lt;br /&gt;
* Understand Docker storage concepts&lt;br /&gt;
&lt;br /&gt;
* Create and manage Docker volumes&lt;br /&gt;
&lt;br /&gt;
* Awareness of Flocker and flannel&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of service discovery&lt;br /&gt;
&lt;br /&gt;
* Basic feature knowledge of CoreOS Container Linux, rkt and etcd&lt;br /&gt;
&lt;br /&gt;
* Understand security risks of container virtualization and container images and how to mitigate them&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker-machine&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;703 Machine Deployment&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.1 Virtual Machine Deployment (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to automate the deployment of a virtual machine with an operating system and a specific set of configuration files and software.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand Vagrant architecture and concepts, including storage and networking&lt;br /&gt;
&lt;br /&gt;
* Retrieve and use boxes from Atlas&lt;br /&gt;
&lt;br /&gt;
* Create and run Vagrantfiles&lt;br /&gt;
&lt;br /&gt;
* Access Vagrant virtual machines&lt;br /&gt;
&lt;br /&gt;
* Share and synchronize folder between a Vagrant virtual machine and the host system&lt;br /&gt;
&lt;br /&gt;
* Understand Vagrant provisioning, including File, Shell, Ansible and Docker&lt;br /&gt;
&lt;br /&gt;
* Understand multi-machine setup&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* vagrant&lt;br /&gt;
&lt;br /&gt;
* Vagrantfile&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.2 Cloud Deployment (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure IaaS cloud instances and adjust them to match their available hardware resources, specifically, disk space and volumes.  Additinally, candidates should be able to configure instances to allow secure SSH logins and prepare the instances to be ready for a configuration management tool such as Ansible.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the features and concepts of cloud-init, including user-data and initializing and configuring cloud-init&lt;br /&gt;
&lt;br /&gt;
* Use cloud-init to create, resize and mount file systems, configure user accounts, including login credentials such as SSH keys and install software packages from the distribution’s repository&lt;br /&gt;
&lt;br /&gt;
* Understand the features and implications of IaaS clouds and virtualization for a computing instance, such as snapshotting, pausing, cloning and resource limits.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.3 System Image Creation (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to create images for containers, virtual machines and IaaS cloud instances.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the functionality and features of Packer&lt;br /&gt;
&lt;br /&gt;
* Create and maintain template files&lt;br /&gt;
&lt;br /&gt;
* Build images from template files using different builders &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* packer&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;704 Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;704.1 Ansible (weight: 8)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 8&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to use Ansible to ensure a target server is in a specific state regarding its configuration and installed software. This objective covers the feature set of Ansible version 2.2 or later.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Manage SSH login credentials for Ansible, including using unprivileged login accounts&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Set and use variables&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks, including file, copy, template, ini_file, lineinfile, patch, replace, user, group, command, shell, service, systemd, cron, apt, debconf, yum, git, and debug&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of Ansibles features for non-Linux systems&lt;br /&gt;
&lt;br /&gt;
* Awareness of Ansible containers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;704.2 Other Configuration Management Tools (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the main features and principles of important configuration management tools other than Ansible.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Basic feature and architecture knowledge of Puppet.&lt;br /&gt;
&lt;br /&gt;
* Basic feature and architecture knowledge of Chef.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Manifest, Class, Recipe, Cookbook&lt;br /&gt;
&lt;br /&gt;
* puppet&lt;br /&gt;
&lt;br /&gt;
* chef&lt;br /&gt;
&lt;br /&gt;
* chef-solo&lt;br /&gt;
&lt;br /&gt;
* chef-client&lt;br /&gt;
&lt;br /&gt;
* chef-server-ctl&lt;br /&gt;
&lt;br /&gt;
* knife&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;705 Service Operations&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.1 IT Operations and Monitoring (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand how IT infrastructure is involved in delivering a service. This includes knowledge about the major goals of IT operations, understanding functional and nonfunctional properties of an IT services and ways to monitor and measure them using Prometheus. Furthermore candidates should understand major security risks in IT infrastructure. This objective covers the feature set of Prometheus 1.7 or later.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand goals of IT operations and service provisioning, including nonfunctional properties such as availability, latency, responsiveness&lt;br /&gt;
&lt;br /&gt;
* Understand and identify metrics and indicators to monitor and measure the technical functionality of a service&lt;br /&gt;
&lt;br /&gt;
* Understand and identify metrics and indicators to monitor and measure the logical functionality of a service&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture of Prometheus, including Exporters, Pushgateway, Alertmanager and Grafana&lt;br /&gt;
&lt;br /&gt;
* Monitor containers and microservices using Prometheus&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of IT attacks against IT infrastructure&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of the most important ways to protect IT infrastructure&lt;br /&gt;
&lt;br /&gt;
* Understand core IT infrastructure components and their the role in deployment &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Prometheus, Node exporter, Pushgateway, Altermanager, Grafana&lt;br /&gt;
&lt;br /&gt;
* Service exploits, brute force attacks, and denial of service attacks&lt;br /&gt;
&lt;br /&gt;
* Security updates, packet filtering and application gateways&lt;br /&gt;
&lt;br /&gt;
* Virtualization hosts, DNS and load balancers&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.2 Log Management and Analysis (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the role of log files in operations and troubleshooting. They should be able to set up centralized logging infrastructure based on Logstash to collect and normalize log data. Furthermore, candidates should understand how Elasticsearch and Kibana help to store and access log data.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand how application and system logging works&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and functionality of Logstash, including the lifecycle of a log message and Logstash plugins&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and functionality of Elasticsearch and Kibana in the context of log data management (Elastic Stack)&lt;br /&gt;
&lt;br /&gt;
* Configure Logstash to collect, normalize, transform and ship log data&lt;br /&gt;
&lt;br /&gt;
* Configure syslog and Filebeat to send log data to Logstash&lt;br /&gt;
&lt;br /&gt;
* Configure Logstash to send email alerts&lt;br /&gt;
&lt;br /&gt;
* Understand application support for log management&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* logstash&lt;br /&gt;
&lt;br /&gt;
* input, filter, output&lt;br /&gt;
&lt;br /&gt;
* grok filter&lt;br /&gt;
&lt;br /&gt;
* Log files, metrics&lt;br /&gt;
&lt;br /&gt;
* syslog.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/logstash/logstash.yml&lt;br /&gt;
&lt;br /&gt;
* /etc/filebeat/filebeat.yml&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=DevOps_Tools_Engineer_Objectives_V1&amp;diff=4362</id>
		<title>DevOps Tools Engineer Objectives V1</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=DevOps_Tools_Engineer_Objectives_V1&amp;diff=4362"/>
		<updated>2017-12-12T15:48:53Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
This is a required exam for the LPIC-OT DevOps Tools Engineer certification. It covers basic skills in using tools commonly used to implement DevOps.&lt;br /&gt;
&lt;br /&gt;
This page covers the currently released objective for the LPIC-OT DevOps Tools Engineer certification. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Candidate Description==&lt;br /&gt;
&lt;br /&gt;
The certification holder is either a professional software developer or a professional system administrator who is involved in the production of IT solutions which require a robust and efficient process to get from original source materials to a final deployed or distributable product or service with a particular focus on using Open Source technology. The certification holder has the ability to create, deliver and operate software using collaborative methods which address aspects of software development as well as system administration. In particular, the certification holder is adept at bridging the gap between the development and operations of a solution or product. The certification holder understands how these tools facilitate development and operational tasks in the delivery of stable, scalable and up to date services to users and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are version 1.0.0. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-OT_DevOps_Tools_Engineer_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-OT_DevOps_Tools_Engineer_Objectives_V1(ES)|Spanish]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Exams and Requirements==&lt;br /&gt;
&lt;br /&gt;
The LPIC-OT DevOps Tools Engineer certification is awarded after passing this exam. There is no requirement to posses another certifications. LPI recommends all LPIC-OT DevOps Tools Engineers to maintain at least one active certification in either system administration or software development. This certification should be on a level equivalent to LPIC-1.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;701 Software Engineering&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.1 Modern Software Development (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to design software solutions suitable for modern runtime environments. Candidates should understand how services handle data persistence, sessions, status information, transactions, concurrency, security, performance, availability, scaling, load balancing, messaging, monitoring and APIs. Furthermore, candidates should understand the implications of agile and DevOps on software development.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and design service based applications&lt;br /&gt;
&lt;br /&gt;
* Understand common API concepts and standards&lt;br /&gt;
&lt;br /&gt;
* Understand aspects of data storage, service status and session handling&lt;br /&gt;
&lt;br /&gt;
* Design software to be run in containers&lt;br /&gt;
&lt;br /&gt;
* Design software to be deployed to cloud services&lt;br /&gt;
&lt;br /&gt;
* Awareness of risks in the migration and integration of monolithic legacy software&lt;br /&gt;
&lt;br /&gt;
* Understand common application security risks and ways to mitigate them&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of agile software development&lt;br /&gt;
&lt;br /&gt;
* Understand the concept of DevOps and its implications to software developers and operators&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* REST, JSON&lt;br /&gt;
&lt;br /&gt;
* Service Orientated Architectures (SOA)&lt;br /&gt;
&lt;br /&gt;
* Microservices&lt;br /&gt;
&lt;br /&gt;
* Immutable servers&lt;br /&gt;
&lt;br /&gt;
* Loose coupling&lt;br /&gt;
&lt;br /&gt;
* Cross site scripting, SQL injections, verbose error reports, API authentication, consistent enforcement of transport encryption&lt;br /&gt;
&lt;br /&gt;
* CORS headers and CSRF tokens&lt;br /&gt;
&lt;br /&gt;
* ACID properties and CAP theorem&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.2 Standard Components and Platforms for Software (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand services offered by common cloud platforms. They should be able to include these services in their application architectures and deployment toolchains and understand the required service configurations. OpenStack service components are used as a reference implementation.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of object storage&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of relational and NoSQL databases&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of message brokers and message queues&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of big data services&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of application runtimes / PaaS&lt;br /&gt;
&lt;br /&gt;
* Features and concepts of content delivery networks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* OpenStack Swift&lt;br /&gt;
&lt;br /&gt;
* OpenStack Trove&lt;br /&gt;
&lt;br /&gt;
* OpenStack Zaqar&lt;br /&gt;
&lt;br /&gt;
* CloudFoundry&lt;br /&gt;
&lt;br /&gt;
* OpenShift&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.3 Source Code Management (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to use Git to manage and share source code. This includes creating and contributing to a repository as well as the usage of tags, branches and remote repositories. Furthermore, the candidate should be able to merge files and resolve merging conflicts. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand Git concepts and repository structure&lt;br /&gt;
&lt;br /&gt;
* Manage files within a Git repository&lt;br /&gt;
&lt;br /&gt;
* Manage branches and tags&lt;br /&gt;
&lt;br /&gt;
* Work with remote repositories and branches as well as submodules&lt;br /&gt;
&lt;br /&gt;
* Merge files and branches&lt;br /&gt;
&lt;br /&gt;
* Awareness of SVN and CVS, including concepts of centralized and distributed SCM solutions&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* git&lt;br /&gt;
&lt;br /&gt;
* .gitignore&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;701.4 Continuous Integration and Continuous Delivery (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the principles and components of a continuous integration and continuous delivery pipeline. Candidates should be able to implement a CI/CD pipeline using Jenkins, including triggering the CI/CD pipeline, running unit, integration and acceptance tests, packaging software and handling the deployment of tested software artifacts. This objective covers the feature set of Jenkins version 2.0 or later.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of Continuous Integration and Continuous Delivery&lt;br /&gt;
&lt;br /&gt;
* Understand the components of a CI/CD pipeline, including builds, unit, integration and acceptance tests, artifact management, delivery and deployment&lt;br /&gt;
&lt;br /&gt;
* Understand deployment best practices&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and features of Jenkins, including Jenkins Plugins, Jenkins API, notifications and distributed builds&lt;br /&gt;
&lt;br /&gt;
* Define and run jobs in Jenkins, including parameter handling&lt;br /&gt;
&lt;br /&gt;
* Fingerprinting, artifacts and artifact repositories&lt;br /&gt;
&lt;br /&gt;
* Understand how Jenkins models continuous delivery pipelines and implement a declarative continuous delivery pipeline in Jenkins&lt;br /&gt;
&lt;br /&gt;
* Awareness of possible authentication and authorization models&lt;br /&gt;
&lt;br /&gt;
* Understanding of the Pipeline Plugin&lt;br /&gt;
&lt;br /&gt;
* Understand the features of important Jenkins modules such as Copy Artifact Plugin, Fingerprint Plugin, Docker Pipeline, Docker Build and Publish plugin, Git Plugin, Credentials Plugin&lt;br /&gt;
&lt;br /&gt;
* Awareness of Artifactory and Nexus&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Step, Node, Stage&lt;br /&gt;
&lt;br /&gt;
* Jenkins SDL&lt;br /&gt;
&lt;br /&gt;
* Jenkinsfile&lt;br /&gt;
&lt;br /&gt;
* Declarative Pipeline&lt;br /&gt;
&lt;br /&gt;
* Blue-green and canary deployment&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;702 Container Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.1 Container Usage (weight: 7)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 7&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to build, share and operate Docker containers. This includes creating Dockerfiles, using a Docker registry, creating and interacting with containers as well as connecting containers to networks and storage volumes. This objective covers the feature set of Docker version 17.06 or later.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the Docker architecture&lt;br /&gt;
&lt;br /&gt;
* Use existing Docker images from a Docker registry&lt;br /&gt;
&lt;br /&gt;
* Create Dockerfiles and build images from Dockerfiles&lt;br /&gt;
&lt;br /&gt;
* Upload images to a Docker registry&lt;br /&gt;
&lt;br /&gt;
* Operate and access Docker containers&lt;br /&gt;
&lt;br /&gt;
* Connect container to Docker networks&lt;br /&gt;
&lt;br /&gt;
* Use Docker volumes for shared and persistent container storage&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker&lt;br /&gt;
&lt;br /&gt;
* Dockerfile&lt;br /&gt;
&lt;br /&gt;
* .dockerignore&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.2 Container Deployment and Orchestration (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to run and manage multiple containers that work together to provide a service. This includes the orchestration of Docker containers using Docker Compose in conjunction with an existing Docker Swarm cluster as well as using an existing Kubernetes cluster. This objective covers the feature sets of Docker Compose version 1.14 or later, Docker Swarm included in Docker 17.06 or later and Kubernetes 1.6 or later.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the application model of Docker Compose&lt;br /&gt;
&lt;br /&gt;
* Create and run Docker Compose Files (version 3 or later)&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and functionality of Docker Swarm mode&lt;br /&gt;
&lt;br /&gt;
* Run containers in a Docker Swarm, including the definition of services, stacks and the usage of secrets&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and application model Kubernetes&lt;br /&gt;
&lt;br /&gt;
* Define and manage a container-based application for Kubernetes, including the definition of Deployments, Services, ReplicaSets and Pods&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker-compose&lt;br /&gt;
&lt;br /&gt;
* docker&lt;br /&gt;
&lt;br /&gt;
* kubectl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;702.3 Container Infrastructure (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to set up a runtime environment for containers. This includes running containers on a local workstation as well as setting up a dedicated container host. Furthermore, candidates should be aware of other container infrastructures, storage, networking and container specific security aspects. This objective covers the feature set of Docker version 17.06 or later and Docker Machine 0.12 or later.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Use Docker Machine to setup a Docker host&lt;br /&gt;
&lt;br /&gt;
* Understand Docker networking concepts, including overlay networks&lt;br /&gt;
&lt;br /&gt;
* Create and manage Docker networks&lt;br /&gt;
&lt;br /&gt;
* Understand Docker storage concepts&lt;br /&gt;
&lt;br /&gt;
* Create and manage Docker volumes&lt;br /&gt;
&lt;br /&gt;
* Awareness of Flocker and flannel&lt;br /&gt;
&lt;br /&gt;
* Understand the concepts of service discovery&lt;br /&gt;
&lt;br /&gt;
* Basic feature knowledge of CoreOS Container Linux, rkt and etcd&lt;br /&gt;
&lt;br /&gt;
* Understand security risks of container virtualization and container images and how to mitigate them&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* docker-machine&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;703 Machine Deployment&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.1 Virtual Machine Deployment (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to automate the deployment of a virtual machine with an operating system and a specific set of configuration files and software.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand Vagrant architecture and concepts, including storage and networking&lt;br /&gt;
&lt;br /&gt;
* Retrieve and use boxes from Atlas&lt;br /&gt;
&lt;br /&gt;
* Create and run Vagrantfiles&lt;br /&gt;
&lt;br /&gt;
* Access Vagrant virtual machines&lt;br /&gt;
&lt;br /&gt;
* Share and synchronize folder between a Vagrant virtual machine and the host system&lt;br /&gt;
&lt;br /&gt;
* Understand Vagrant provisioning, including File, Shell, Ansible and Docker&lt;br /&gt;
&lt;br /&gt;
* Understand multi-machine setup&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* vagrant&lt;br /&gt;
&lt;br /&gt;
* Vagrantfile&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.2 Cloud Deployment (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure IaaS cloud instances and adjust them to match their available hardware resources, specifically, disk space and volumes.  Additinally, candidates should be able to configure instances to allow secure SSH logins and prepare the instances to be ready for a configuration management tool such as Ansible.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understanding the features and concepts of cloud-init, including user-data and initializing and configuring cloud-init&lt;br /&gt;
&lt;br /&gt;
* Use cloud-init to create, resize and mount file systems, configure user accounts, including login credentials such as SSH keys and install software packages from the distribution’s repository&lt;br /&gt;
&lt;br /&gt;
* Understand the features and implications of IaaS clouds and virtualization for a computing instance, such as snapshotting, pausing, cloning and resource limits.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;703.3 System Image Creation (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to create images for containers, virtual machines and IaaS cloud instances.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the functionality and features of Packer&lt;br /&gt;
&lt;br /&gt;
* Create and maintain template files&lt;br /&gt;
&lt;br /&gt;
* Build images from template files using different builders &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* packer&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;704 Configuration Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;704.1 Ansible (weight: 8)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 8&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should be able to use Ansible to ensure a target server is in a specific state regarding its configuration and installed software. This objective covers the feature set of Ansible version 2.2 or later.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of automated system configuration and software installation&lt;br /&gt;
&lt;br /&gt;
* Create and maintain inventory files&lt;br /&gt;
&lt;br /&gt;
* Understand how Ansible interacts with remote systems&lt;br /&gt;
&lt;br /&gt;
* Manage SSH login credentials for Ansible, including using unprivileged login accounts&lt;br /&gt;
&lt;br /&gt;
* Create, maintain and run Ansible playbooks, including tasks, handlers, conditionals, loops and registers&lt;br /&gt;
&lt;br /&gt;
* Set and use variables&lt;br /&gt;
&lt;br /&gt;
* Maintain secrets using Ansible vaults&lt;br /&gt;
&lt;br /&gt;
* Write Jinja2 templates, including using common filters, loops and conditionals&lt;br /&gt;
&lt;br /&gt;
* Understand and use Ansible roles and install Ansible roles from Ansible Galaxy&lt;br /&gt;
&lt;br /&gt;
* Understand and use important Ansible tasks, including file, copy, template, ini_file, lineinfile, patch, replace, user, group, command, shell, service, systemd, cron, apt, debconf, yum, git, and debug&lt;br /&gt;
&lt;br /&gt;
* Awareness of dynamic inventory&lt;br /&gt;
&lt;br /&gt;
* Awareness of Ansibles features for non-Linux systems&lt;br /&gt;
&lt;br /&gt;
* Awareness of Ansible containers&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* ansible.cfg&lt;br /&gt;
&lt;br /&gt;
* ansible-playbook&lt;br /&gt;
&lt;br /&gt;
* ansible-vault&lt;br /&gt;
&lt;br /&gt;
* ansible-galaxy&lt;br /&gt;
&lt;br /&gt;
* ansible-doc&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;704.2 Other Configuration Management Tools (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the main features and principles of important configuration management tools other than Ansible.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Basic feature and architecture knowledge of Puppet.&lt;br /&gt;
&lt;br /&gt;
* Basic feature and architecture knowledge of Chef.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Manifest, Class, Recipe, Cookbook&lt;br /&gt;
&lt;br /&gt;
* puppet&lt;br /&gt;
&lt;br /&gt;
* chef&lt;br /&gt;
&lt;br /&gt;
* chef-solo&lt;br /&gt;
&lt;br /&gt;
* chef-client&lt;br /&gt;
&lt;br /&gt;
* chef-server-ctl&lt;br /&gt;
&lt;br /&gt;
* knife&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;705 Service Operations&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.1 IT Operations and Monitoring (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand how IT infrastructure is involved in delivering a service. This includes knowledge about the major goals of IT operations, understanding functional and nonfunctional properties of an IT services and ways to monitor and measure them using Prometheus. Furthermore candidates should understand major security risks in IT infrastructure. This objective covers the feature set of Prometheus 1.7 or later.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand goals of IT operations and service provisioning, including nonfunctional properties such as availability, latency, responsiveness&lt;br /&gt;
&lt;br /&gt;
* Understand and identify metrics and indicators to monitor and measure the technical functionality of a service&lt;br /&gt;
&lt;br /&gt;
* Understand and identify metrics and indicators to monitor and measure the logical functionality of a service&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture of Prometheus, including Exporters, Pushgateway, Alertmanager and Grafana&lt;br /&gt;
&lt;br /&gt;
* Monitor containers and microservices using Prometheus&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of IT attacks against IT infrastructure&lt;br /&gt;
&lt;br /&gt;
* Understand the principles of the most important ways to protect IT infrastructure&lt;br /&gt;
&lt;br /&gt;
* Understand core IT infrastructure components and their the role in deployment &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Prometheus, Node exporter, Pushgateway, Altermanager, Grafana&lt;br /&gt;
&lt;br /&gt;
* Service exploits, brute force attacks, and denial of service attacks&lt;br /&gt;
&lt;br /&gt;
* Security updates, packet filtering and application gateways&lt;br /&gt;
&lt;br /&gt;
* Virtualization hosts, DNS and load balancers&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;705.2 Log Management and Analysis (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
Candidates should understand the role of log files in operations and troubleshooting. They should be able to set up centralized logging infrastructure based on Logstash to collect and normalize log data. Furthermore, candidates should understand how Elasticsearch and Kibana help to store and access log data.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand how application and system logging works&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and functionality of Logstash, including the lifecycle of a log message and Logstash plugins&lt;br /&gt;
&lt;br /&gt;
* Understand the architecture and functionality of Elasticsearch and Kibana in the context of log data management (Elastic Stack)&lt;br /&gt;
&lt;br /&gt;
* Configure Logstash to collect, normalize, transform and ship log data&lt;br /&gt;
&lt;br /&gt;
* Configure syslog and Filebeat to send log data to Logstash&lt;br /&gt;
&lt;br /&gt;
* Configure Logstash to send email alerts&lt;br /&gt;
&lt;br /&gt;
* Understand application support for log management&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* logstash&lt;br /&gt;
&lt;br /&gt;
* input, filter, output&lt;br /&gt;
&lt;br /&gt;
* grok filter&lt;br /&gt;
&lt;br /&gt;
* Log files, metrics&lt;br /&gt;
&lt;br /&gt;
* syslog.conf&lt;br /&gt;
&lt;br /&gt;
* /etc/logstash/logstash.yml&lt;br /&gt;
&lt;br /&gt;
* /etc/filebeat/filebeat.yml&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=SpanishTranslationNotes&amp;diff=4361</id>
		<title>SpanishTranslationNotes</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=SpanishTranslationNotes&amp;diff=4361"/>
		<updated>2017-12-12T15:43:20Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Using OmegaT for Group Translations==&lt;br /&gt;
&lt;br /&gt;
First be sure to read the [[Translation_Instructions]].&lt;br /&gt;
&lt;br /&gt;
==Managing Translation Memories==&lt;br /&gt;
&lt;br /&gt;
Read this post: [[http://www.proz.com/forum/omegat_support/146666-importing_a_translation_memory_into_omegat.html#1226038]]&lt;br /&gt;
&lt;br /&gt;
We need to decide on how to share translations.&lt;br /&gt;
&lt;br /&gt;
Possibilities:&lt;br /&gt;
* share them as project_save_name.tmx and share them (con: one person will have to do a final translation with everyone&#039;s translation memories)&lt;br /&gt;
* have a master and pass it around as a token (con: no parallel translations)&lt;br /&gt;
* other ideas? (let&#039;s keep it simple, though)&lt;br /&gt;
&lt;br /&gt;
==Common Terms==&lt;br /&gt;
&lt;br /&gt;
===Current Glossary===&lt;br /&gt;
&lt;br /&gt;
The current glossary in Spanish is available in [[Media:Glossary-es.pdf|PDF]] and [[Media:Glossary-es.jpg|JPG]] formats.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, the wiki doesn&#039;t allow for upload of OOo or other editable formats.&lt;br /&gt;
&lt;br /&gt;
===Words agreed===&lt;br /&gt;
&lt;br /&gt;
 Note: By using OmegaT and sharing translation memories, technical terms should naturally stabilise (or cause a dialect war ;)).&lt;br /&gt;
&lt;br /&gt;
Meanwhile, while the OmegaT/TM &amp;quot;standard&amp;quot; is happening, here is a jargon list:&lt;br /&gt;
&lt;br /&gt;
Mark in bold words that should go in the exam glossary.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please indicate which version you use (es_ES, es_AR, es_CL, ...)&lt;br /&gt;
{|border=&amp;quot;1&amp;quot;&lt;br /&gt;
|+ Proposed spanish terms&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;English&#039;&#039;&#039; &lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &#039;&#039;&#039;Spanish&#039;&#039;&#039;, agreed&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;es_ES&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &#039;&#039;&#039;es_MX&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;es_CO&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &#039;&#039;&#039;es_AR&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| file&lt;br /&gt;
| archivo&lt;br /&gt;
| fichero. Nota, archivo tb. se entiende&lt;br /&gt;
| &lt;br /&gt;
| archivo&lt;br /&gt;
| archivo&lt;br /&gt;
|-&lt;br /&gt;
| file system&lt;br /&gt;
| sistema de archivos&lt;br /&gt;
| sistema de ficheros&lt;br /&gt;
| &lt;br /&gt;
| sistemas de archivos&lt;br /&gt;
| sistemas de archivos&lt;br /&gt;
|-&lt;br /&gt;
| script&lt;br /&gt;
| script&lt;br /&gt;
| script, guión&lt;br /&gt;
| &lt;br /&gt;
| archivo de órdenes, programa simple&lt;br /&gt;
| script&lt;br /&gt;
|-&lt;br /&gt;
| remove,delete&lt;br /&gt;
| borrar&lt;br /&gt;
| eliminar, borrar&lt;br /&gt;
| eliminar&lt;br /&gt;
| borrar, remover&lt;br /&gt;
| borrar, eliminar&lt;br /&gt;
|-&lt;br /&gt;
| linker&lt;br /&gt;
| enlazador&lt;br /&gt;
| linker&lt;br /&gt;
|&lt;br /&gt;
| enlazador&lt;br /&gt;
| linker&lt;br /&gt;
|-&lt;br /&gt;
| library&lt;br /&gt;
| librería&lt;br /&gt;
| librería&lt;br /&gt;
|&lt;br /&gt;
| biblioteca, libreria&lt;br /&gt;
| biblioteca, libreria&lt;br /&gt;
|-&lt;br /&gt;
| stdin&lt;br /&gt;
| entrada estándar&lt;br /&gt;
| entrada estándar&lt;br /&gt;
|&lt;br /&gt;
| entrada estándar&lt;br /&gt;
| entrada estándar&lt;br /&gt;
|-&lt;br /&gt;
| stdout&lt;br /&gt;
| salida estándar&lt;br /&gt;
| salida estándar&lt;br /&gt;
|&lt;br /&gt;
| salida estándar&lt;br /&gt;
| salida estándar&lt;br /&gt;
|-&lt;br /&gt;
| stderr&lt;br /&gt;
| error estándar&lt;br /&gt;
| error estándar&lt;br /&gt;
|&lt;br /&gt;
| error estándar&lt;br /&gt;
| error estándar&lt;br /&gt;
|-&lt;br /&gt;
| environment variable&lt;br /&gt;
| Variable de entorno&lt;br /&gt;
| Variable de entorno&lt;br /&gt;
|&lt;br /&gt;
| Variable de ambiente&lt;br /&gt;
| Variable de entorno, Variable de ambiente&lt;br /&gt;
|-&lt;br /&gt;
| boot loader&lt;br /&gt;
| gestor de arranque&lt;br /&gt;
| gestor de arranque&lt;br /&gt;
|&lt;br /&gt;
| gestor de arranque, cargador de arranque&lt;br /&gt;
| gestor de arranque&lt;br /&gt;
|-&lt;br /&gt;
| image file&lt;br /&gt;
| archivo de imagen&lt;br /&gt;
| fichero de imagen&lt;br /&gt;
|&lt;br /&gt;
| archivo de imagen, fichero de imagen&lt;br /&gt;
| archivo de imagen&lt;br /&gt;
|-&lt;br /&gt;
| utility&lt;br /&gt;
| utilidad&lt;br /&gt;
| utilidad, programa&lt;br /&gt;
|&lt;br /&gt;
| utilidad&lt;br /&gt;
| utilidad, programa&lt;br /&gt;
|-&lt;br /&gt;
| /, root directory&lt;br /&gt;
| directorio raíz,&lt;br /&gt;
| en el caso del usuario &#039;root&#039; sería administrador&lt;br /&gt;
| Raíz y cuenta usuario administrador&lt;br /&gt;
| Raíz, en el caso del usuario &#039;root&#039; sería cuenta usuario administrador tb se entiende root&lt;br /&gt;
| Raíz, directorio Raiz&lt;br /&gt;
|-&lt;br /&gt;
| root user&lt;br /&gt;
| usuario raíz,&lt;br /&gt;
| en el caso del usuario &#039;root&#039; sería administrador&lt;br /&gt;
| Raíz, cuenta usuario administrador&lt;br /&gt;
| Raíz, en el caso del usuario &#039;root&#039; sería cuenta usuario administrador tb se entiende root&lt;br /&gt;
| en el caso del usuario &#039;root&#039; seria super usuario, usuario administrador, tb se entiende root&lt;br /&gt;
|-&lt;br /&gt;
| edit files&lt;br /&gt;
| editar archivos&lt;br /&gt;
| editar ficheros, modificar ficheros&lt;br /&gt;
|&lt;br /&gt;
| editar archivos&lt;br /&gt;
| modificar archivos, modificar ficheros&lt;br /&gt;
|-&lt;br /&gt;
| network locations&lt;br /&gt;
| localización de red&lt;br /&gt;
| localización de red&lt;br /&gt;
|&lt;br /&gt;
| localización, ubicación de red&lt;br /&gt;
| ubicaciones de red&lt;br /&gt;
|-&lt;br /&gt;
| PATH&lt;br /&gt;
| ruta&lt;br /&gt;
| camino (en España no se utiliza), ruta &lt;br /&gt;
|&lt;br /&gt;
| ruta, paso&lt;br /&gt;
| ruta, path (tambien se usa termino en Ingles)&lt;br /&gt;
|-&lt;br /&gt;
| relative path&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| absolute path&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| environment path&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| hard link&lt;br /&gt;
| enlace fuerte&lt;br /&gt;
| enlace duro (en España no se utiliza)&lt;br /&gt;
|&lt;br /&gt;
| vínculo, enlace fuerte&lt;br /&gt;
| Enlace duro tb hard link(la gente de sistemas lo usa asi)&lt;br /&gt;
|-&lt;br /&gt;
| symbolic link&lt;br /&gt;
| enlace simbólico&lt;br /&gt;
| enlace simbólico (en España sin embargo sí se utiliza... ¿?)&lt;br /&gt;
|&lt;br /&gt;
| enlace simbólico&lt;br /&gt;
| link simbólico&lt;br /&gt;
|-&lt;br /&gt;
| kernel&lt;br /&gt;
| núcleo&lt;br /&gt;
| núcleo, aunque en España se utiliza de forma común kernel.&lt;br /&gt;
|&lt;br /&gt;
| Parte importante de un sistema operativo, núcleo del mismo&lt;br /&gt;
| kernel, núcleo&lt;br /&gt;
|-&lt;br /&gt;
| Window manager&lt;br /&gt;
| Gestor de ventanas&lt;br /&gt;
| Gestor de ventanas&lt;br /&gt;
|&lt;br /&gt;
| Gestor de ventanas&lt;br /&gt;
| Gestor de ventanas&lt;br /&gt;
|-&lt;br /&gt;
| X Display Manager&lt;br /&gt;
| Administrador de Pantalla (X Display Manager)&lt;br /&gt;
| Gestor de Visualización X, aunque nadie lo utiliza, yo pondría X Display Manager. Administrador de pantalla.&lt;br /&gt;
|&lt;br /&gt;
| Gestor de pantalla&lt;br /&gt;
| Administrador de Pantalla&lt;br /&gt;
|-&lt;br /&gt;
| log&lt;br /&gt;
| Registro de eventos&lt;br /&gt;
| log, registro&lt;br /&gt;
| bitácora&lt;br /&gt;
| Registro de eventos&lt;br /&gt;
| log/registro/evento&lt;br /&gt;
|-&lt;br /&gt;
| log priority&lt;br /&gt;
| prioridad de registro&lt;br /&gt;
| prioridad de registro&lt;br /&gt;
| prioridad de bitácora&lt;br /&gt;
| prioridad de eventos&lt;br /&gt;
| prioridad de eventos/registros/log&lt;br /&gt;
|-&lt;br /&gt;
| log facility&lt;br /&gt;
| canal de registro, tipo de registro&lt;br /&gt;
|&lt;br /&gt;
| canal/tipo de registro/bitácora&lt;br /&gt;
| Eventos mensajes de registro de syslog&lt;br /&gt;
| Eventos del sistema de registro/log&lt;br /&gt;
|-&lt;br /&gt;
| network address&lt;br /&gt;
| dirección de red&lt;br /&gt;
| dirección de red&lt;br /&gt;
| dirección de red&lt;br /&gt;
| dirección de red&lt;br /&gt;
| dirección de red&lt;br /&gt;
|-&lt;br /&gt;
| interface&lt;br /&gt;
| interfaz&lt;br /&gt;
| interfaz&lt;br /&gt;
|&lt;br /&gt;
| interface&lt;br /&gt;
| interface,interfaz&lt;br /&gt;
|-&lt;br /&gt;
| connectionless&lt;br /&gt;
| No orientado a conexión&lt;br /&gt;
| No orientado a conexión&lt;br /&gt;
|&lt;br /&gt;
| conexión perdida, sin conexión&lt;br /&gt;
| No orientado a la conexión&lt;br /&gt;
|-&lt;br /&gt;
| scheduling system&lt;br /&gt;
| sistema de planificación&lt;br /&gt;
| sistema de planificación&lt;br /&gt;
|&lt;br /&gt;
| Planificación de sistema&lt;br /&gt;
| Planificador/Planificación de sistema&lt;br /&gt;
|-&lt;br /&gt;
| dynamic linker&lt;br /&gt;
| enlazador dinámico&lt;br /&gt;
| En España se utiliza linker dinámico, pero tiene sentido enlazador dinámico.&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| Enlazador dinamico tb dynamic linker(la gente de sistemas lo usa asi)&lt;br /&gt;
|-&lt;br /&gt;
| to add&lt;br /&gt;
| añadir&lt;br /&gt;
| añadir (raramente se utiliza agregar aunque se entiende)&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| agregar,añadir&lt;br /&gt;
|-&lt;br /&gt;
| legacy&lt;br /&gt;
| legacy&lt;br /&gt;
| Se suele utilizar legacy en España...&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| legacy&lt;br /&gt;
|-&lt;br /&gt;
| keys&lt;br /&gt;
| clave&lt;br /&gt;
| clave, llave no se suele utilizar&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| llave&lt;br /&gt;
|-&lt;br /&gt;
| crypt&lt;br /&gt;
| cifrar&lt;br /&gt;
| cifrar (encriptar se utiliza pero está mal dicho)&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| cifrar (tambien encriptar pero esta mal dicho)&lt;br /&gt;
|-&lt;br /&gt;
| locale configuration&lt;br /&gt;
| configuración regional&lt;br /&gt;
| configuración regional (a veces configuración local aunque probablemente sea más correcto regional)&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| configuración regional,local&lt;br /&gt;
|-&lt;br /&gt;
| gateway&lt;br /&gt;
| puerta de enlace&lt;br /&gt;
| puerta de enlace&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| puerta de enlace&lt;br /&gt;
|-&lt;br /&gt;
| default&lt;br /&gt;
| por defecto&lt;br /&gt;
| por defecto (se entiende tb. predeterminada)&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| predeterminada, tb.default,por defecto&lt;br /&gt;
|-&lt;br /&gt;
| password&lt;br /&gt;
| clave&lt;br /&gt;
| clave, contraseña&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| contraseña, clave&lt;br /&gt;
|-&lt;br /&gt;
| newline&lt;br /&gt;
| salto de línea&lt;br /&gt;
| salto de línea&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| salto de línea&lt;br /&gt;
|-&lt;br /&gt;
| carriage return&lt;br /&gt;
| retorno de carro&lt;br /&gt;
| retorno de carro&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| retorno de carro&lt;br /&gt;
|-&lt;br /&gt;
| runlevel&lt;br /&gt;
| runlevel&lt;br /&gt;
| nivel de ejecución&lt;br /&gt;
| &lt;br /&gt;
| nivel de inicio, nivel de arranque, runlevel&lt;br /&gt;
|-&lt;br /&gt;
| daemon&lt;br /&gt;
| demonio&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| demonio, daemon tambien&lt;br /&gt;
|-&lt;br /&gt;
| login shell&lt;br /&gt;
| intérprete de comandos&lt;br /&gt;
| intérprete de comandos&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| intérprete de ordenes, interprete de inicio, shell de inicio, intréprete de comandos&lt;br /&gt;
|-&lt;br /&gt;
| background&lt;br /&gt;
| segundo plano&lt;br /&gt;
| segundo plano&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| segundo plano&lt;br /&gt;
|-&lt;br /&gt;
| sub-shell/s&lt;br /&gt;
| sub-shell&lt;br /&gt;
| sub-shell&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| sub-shell/s&lt;br /&gt;
|-&lt;br /&gt;
| buffer&lt;br /&gt;
| buffer&lt;br /&gt;
| Tb. buffer&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| buffer&lt;br /&gt;
|-&lt;br /&gt;
| Swap&lt;br /&gt;
| Área de intercambio&lt;br /&gt;
| Área de intercambio&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| Área de intercambio&lt;br /&gt;
|-&lt;br /&gt;
| Paging&lt;br /&gt;
| Paginación&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| Paginación&lt;br /&gt;
|-&lt;br /&gt;
| login&lt;br /&gt;
| firmarse/iniciar sesión&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Inode&lt;br /&gt;
| Inodo&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| Inodo&lt;br /&gt;
|-&lt;br /&gt;
| Archiving format&lt;br /&gt;
| &lt;br /&gt;
| Formato de empaquetado&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| Empaquetado&lt;br /&gt;
|-&lt;br /&gt;
| kernel source tree&lt;br /&gt;
| codigo fuente del núcleo&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| codigo fuente del núcleo&lt;br /&gt;
|-&lt;br /&gt;
| firewall&lt;br /&gt;
|&lt;br /&gt;
| cortafuegos&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|servidor de seguridad, firewall&lt;br /&gt;
|-&lt;br /&gt;
|volume group&lt;br /&gt;
|grupo de volúmenes&lt;br /&gt;
|grupo de volúmenes&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|grupo de volumenes&lt;br /&gt;
|-&lt;br /&gt;
|physical volume&lt;br /&gt;
|volumen físico&lt;br /&gt;
|volumen físico&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|volumen fisico&lt;br /&gt;
|-&lt;br /&gt;
|router&lt;br /&gt;
|enrutador&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|enrutador,ruta&lt;br /&gt;
|-&lt;br /&gt;
|stack fingerprinting&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|network for forensics&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|kernel buffer ring&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| anillo de buffer del nucelo&lt;br /&gt;
|-&lt;br /&gt;
| make target&lt;br /&gt;
| &lt;br /&gt;
| objetivo de make&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| patch&lt;br /&gt;
| &lt;br /&gt;
| parche&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| home directory&lt;br /&gt;
| &lt;br /&gt;
| directorio home (no se suele traducir)&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| initramfs&lt;br /&gt;
| &lt;br /&gt;
| initramfs (no se suele traducir)&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| boot time&lt;br /&gt;
| &lt;br /&gt;
| tiempo de arranque (boot time), o inicio de sistema (boot time), creo que es más claro incluir el término sin traducir tb. entre paréntesis&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| single user mode&lt;br /&gt;
| &lt;br /&gt;
| modo monousuario, aunque le añadiría entre paréntesis el término en inglés (single user mode)&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| shared library&lt;br /&gt;
| &lt;br /&gt;
| librería dinámica&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| routed&lt;br /&gt;
| &lt;br /&gt;
| enrutada&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Active Directory&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| bridge&lt;br /&gt;
| &lt;br /&gt;
| Puente&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| hardening&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| backup&lt;br /&gt;
| &lt;br /&gt;
| copia de respaldo, copia de seguridad&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Spanish conventions===&lt;br /&gt;
&lt;br /&gt;
This could go into policy. But I think this is just a discussion point.&lt;br /&gt;
&lt;br /&gt;
* Usage of the first person, verbal time, ..., so that the exam looks consistent. See the different translations of could -&amp;gt; podría, podía, puede... Mi opinión es utilizar el presente siempre. Si utiliza, si hace, si borra, cuando crea, ...&lt;br /&gt;
&lt;br /&gt;
* Uso de Usted. En España suena muy, muy raro, intentemos usar tercera persona, o impersonal. Usted borra-&amp;gt; Se borra.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Uso de artículos determinados para los boot loaders, el arranque &#039;&#039;&#039;de&#039;&#039;&#039; lilo vs el arranque &#039;&#039;&#039;del&#039;&#039;&#039; lilo&lt;br /&gt;
&lt;br /&gt;
* Uo de artículos determinados para &#039;&#039;&#039;la shell&#039;&#039;&#039;, &#039;&#039;&#039;la bash&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4360</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4360"/>
		<updated>2017-12-12T15:41:14Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* 394.2 Autenticación, autorización y Winbind (Peso: 5) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: Configuración de OpenLDAP&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Replicación de OpenLDAP (Pesot: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con la replicación del servidor disponible con OpenLDAP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conceptos de replicación&lt;br /&gt;
* Configurar la replicación de OpenLDAP&lt;br /&gt;
* Analizar archivos de registro de replicación&lt;br /&gt;
* Comprender los centros de réplica&lt;br /&gt;
* Referencias de LDAP&lt;br /&gt;
* Replicación de sincronización LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* servidor maestro / esclavo&lt;br /&gt;
* replicación multi-master&lt;br /&gt;
* consumer&lt;br /&gt;
* hub de réplica&lt;br /&gt;
* modo one-shot&lt;br /&gt;
* referral&lt;br /&gt;
* syncrepl&lt;br /&gt;
* sincronización basada en pull / basado en push&lt;br /&gt;
* refreshOnly and refreshAndPersist&lt;br /&gt;
* replog&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.2  Asegurar el directorio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder configurar el acceso codificado al directorio LDAP y restringir el acceso al nivel del firewall.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Asegurar el directorio con SSL y TLS&lt;br /&gt;
* Consideraciones de firewall&lt;br /&gt;
* Métodos de acceso no autenticado&lt;br /&gt;
* Métodos de autenticación de usuario / contraseña&lt;br /&gt;
* Mantenimiento del usuario SASL DB&lt;br /&gt;
* Certificados de cliente / servidor&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL / TLS&lt;br /&gt;
* Factores de fortaleza de seguridad (SSF)&lt;br /&gt;
* SASL&lt;br /&gt;
* autorización de proxy&lt;br /&gt;
* StartTLS&lt;br /&gt;
* iptables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.3  Ajuste del rendimiento del servidor OpenLDAP (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de medir el rendimiento de un servidor LDAP y ajustar las directivas de configuración.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Medir el rendimiento de OpenLDAP&lt;br /&gt;
* Ajuste la configuración del software para aumentar el rendimiento&lt;br /&gt;
* Comprender los índices&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* index&lt;br /&gt;
* DB_CONFIG&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 391: OpenLDAP como un backend de autenticación&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.1 Integración LDAP con PAM y NSS (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar PAM y NSS para recuperar información de un directorio LDAP.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar PAM para usar LDAP para autenticación&lt;br /&gt;
* Configurar NSS para recuperar información de LDAP&lt;br /&gt;
* Configurar módulos PAM en varios entornos Unix&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM&lt;br /&gt;
* NSS&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
* /etc/nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.2 Integración de LDAP con Active Directory y Kerberos (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder integrar LDAP con los Servicios de Active Directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Integración de Kerberos con LDAP&lt;br /&gt;
* Autenticación multiplataforma&lt;br /&gt;
* Conceptos de inicio de sesión único&lt;br /&gt;
* Limitaciones de integración y compatibilidad entre OpenLDAP y Active Directory&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos&lt;br /&gt;
* Active Directory &lt;br /&gt;
* inicio de sesión único&lt;br /&gt;
* DNS&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 392: Conceptos básicos de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.1 Arquitectura y conceptos de Samba  (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben entender los conceptos esenciales de Samba. Además, las principales diferencias entre Samba3 y Samba4 deberían conocerse.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender los roles de los demonios y componentes de Samba&lt;br /&gt;
* Comprender los problemas clave relacionados con las redes heterogéneas&lt;br /&gt;
* Identificar los puertos clave TCP / UDP utilizados con SMB / CIFS&lt;br /&gt;
* Conocimiento de las diferencias entre Samba3 y Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
* Samba daemons: smbd, nmbd, samba, winbindd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.2 Configurar Samba (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar los demonios Samba para una amplia variedad de propósitos.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento de la estructura del archivo de configuración del servidor Samba&lt;br /&gt;
* Conocimiento de variables de Samba y parámetros de configuración&lt;br /&gt;
* Solucionar problemas y depurar problemas de configuración con Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smb.conf parameters&lt;br /&gt;
* smb.conf variables&lt;br /&gt;
* testparm&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.3 Mantenimiento regular de samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben conocer las diversas herramientas y utilidades que forman parte de una instalación de Samba.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Controla e interactúa con los daemons de Samba mientras estan en ejecución&lt;br /&gt;
* Realizar copias de seguridad periódicas de la configuración de Samba y sus datos de estado&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smbcontrol&lt;br /&gt;
* smbstatus&lt;br /&gt;
* tdbbackup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.4 Solución de problemas de Samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender la estructura de los archivos triviales de la base de datos y saber cómo solucionar los problemas.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar el registro de Samba&lt;br /&gt;
* Copia de seguridad de archivos TDB&lt;br /&gt;
* Restaurar archivos TDB&lt;br /&gt;
* Identifica los corrupción del archivo TDB&lt;br /&gt;
* Editar / listar contenido del archivo TDB&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/log/samba/&lt;br /&gt;
* log level&lt;br /&gt;
* debuglevel&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* pdbedit&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
* tdbbackup&lt;br /&gt;
* tdbdump&lt;br /&gt;
* tdbrestore&lt;br /&gt;
* tdbtool&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.5 Internacionalización (Peso: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder trabajar con códigos de caracteres de internacionalización y páginas de códigos.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender códigos de caracteres de internacionalización y páginas de códigos&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a compartir, archivos y nombres de directorios en un entorno que no sea inglés&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a los nombres de usuarios y grupos en un entorno que no es inglés&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a la denominación de la computadora en un entorno que no sea inglés&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* internacionalización&lt;br /&gt;
* códigos de caracteres&lt;br /&gt;
* páginas de códigos&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dos charset, display charset y unix charset&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 393: Configuración de Samba Share&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.1 Servicios de archivo (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de crear y configurar archivos compartidos en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Crear y configurar archivos compartidos&lt;br /&gt;
* Plan de migración del servicio de archivos&lt;br /&gt;
* Limite el acceso a IPC $&lt;br /&gt;
* Crear scripts para el manejo de usuarios y grupos de archivos compartidos&lt;br /&gt;
* Parámetros de configuración de acceso de Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [homes]&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* smbsh&lt;br /&gt;
* browseable, writeable, valid users, write list, read list, read only and guest ok&lt;br /&gt;
* IPC$&lt;br /&gt;
* mount, smbmount&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.2 Sistema de archivos Linux y permisos de Compartir / Servicio(Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender los permisos de archivos en un sistema de archivos Linux en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento del control de permisos de archivos / directorios&lt;br /&gt;
* Comprender cómo interactúa Samba con los permisos del sistema de archivos de Linux y las ACL&lt;br /&gt;
* Utilice Samba VFS para almacenar las ACL de Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* chmod, chown&lt;br /&gt;
* create mask, directory mask, force create mode, force directory mode&lt;br /&gt;
* smbcacls&lt;br /&gt;
* getfacl, setfacl&lt;br /&gt;
* vfs_acl_xattr, vfs_acl_tdb and vfs objects&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.3 Servicios de impresión (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían ser capaces de crear y administrar recursos compartidos de impresión en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Crear y configurar el uso compartido de impresoras&lt;br /&gt;
* Configurar la integración entre Samba y CUPS&lt;br /&gt;
* Administrar los controladores de impresión de Windows y configurar la descarga de los controladores de impresión&lt;br /&gt;
* Configurar [imprimir $]&lt;br /&gt;
* Comprender las preocupaciones de seguridad con el uso compartido de impresoras&lt;br /&gt;
* Carga de controladores de impresora para la instalación del controlador Point&#039;n&#039;Print con &#039;Asistente para Agregar controlador de impresora&#039; en Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [print$]&lt;br /&gt;
* CUPS&lt;br /&gt;
* cupsd.conf&lt;br /&gt;
* /var/spool/samba/&lt;br /&gt;
* smbspool&lt;br /&gt;
* rpcclient&lt;br /&gt;
* net&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 394: Gestion de Usuarios y Grupos de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.1 Gestión de cuentas y grupos de usuarios  (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de administrar cuentas de usuarios y grupos en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Administrador de cuentas de usuarios y grupos&lt;br /&gt;
* Comprender el mapeo de usuarios y grupos&lt;br /&gt;
* Conocimiento de herramientas de administración de cuentas de usuario&lt;br /&gt;
* Uso del programa smbpasswd&lt;br /&gt;
* Forzar las propiedades de los objetos de archivos y directorios&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* pdbedit&lt;br /&gt;
* smb.conf&lt;br /&gt;
* samba-tool user (con subcomandos)&lt;br /&gt;
* samba-tool group (con subcommands)&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
* force user, force group&lt;br /&gt;
* idmap&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.2 Autenticación, autorización y Winbind (Peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender los diversos mecanismos de autenticación y configurar el control de acceso. Los candidatos deberían poder instalar y configurar el servicio Winbind.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar una base de datos de contraseñas local&lt;br /&gt;
* Realizar sincronización de contraseña&lt;br /&gt;
* Conocimiento de diferentes backends de passdb&lt;br /&gt;
* Convert between Samba passdb backends&lt;br /&gt;
* Integrar Samba con LDAP&lt;br /&gt;
* Configurar el servicio de Winbind&lt;br /&gt;
* Configurar PAM y NSS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbpasswd, tdbsam, ldapsam&lt;br /&gt;
* passdb backend&lt;br /&gt;
* libnss_winbind&lt;br /&gt;
* libpam_winbind&lt;br /&gt;
* libpam_smbpass&lt;br /&gt;
* wbinfo&lt;br /&gt;
* getent&lt;br /&gt;
* SID y otros SID externos&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 395: Integración de dominios Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.1 Samba como PDC y BDC (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían ser capaces de configurar y mantener los controladores de dominio principales y de respaldo. Los candidatos deberían poder administrar el acceso de los clientes de Windows / Linux a los dominios  del estilo NT.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender y configurar membresía de dominio y relaciones de confianza&lt;br /&gt;
* Crear y mantener un controlador de dominio principal con Samba3 y Samba4&lt;br /&gt;
* Crear y mantener un controlador de dominio de respaldo con Samba3 y Samba4&lt;br /&gt;
* Agregar computadoras a un dominio existente&lt;br /&gt;
* Configurar scripts de inicio de sesión&lt;br /&gt;
* Configurar perfiles itinerantes&lt;br /&gt;
* Configurar políticas del sistema&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* security mode&lt;br /&gt;
* server role&lt;br /&gt;
* domain logons&lt;br /&gt;
* domain master&lt;br /&gt;
* logon script&lt;br /&gt;
* logon path&lt;br /&gt;
* NTConfig.pol&lt;br /&gt;
* net&lt;br /&gt;
* profiles&lt;br /&gt;
* add machine script&lt;br /&gt;
* profile acls&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.2 Samba4 como controlador de dominio compatible con AD (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder configurar Samba 4 como un controlador de dominio AD.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar y probar Samba 4 como AD DC&lt;br /&gt;
* Uso de smbclient para confirmar la operación de AD&lt;br /&gt;
* Comprender cómo se integra Samba con los servicios de AD: DNS, Kerberos, NTP, LDAP&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* samba-tool domain (with subcommands)&lt;br /&gt;
* samba&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.3 Configurar Samba como servidor de miembros de dominio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de integrar servidores Linux en un entorno donde esté presente Active Directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unirse a Samba a un dominio NT4 existente&lt;br /&gt;
* Unirse a Samba a un dominio de AD existente&lt;br /&gt;
* Capacidad de obtener un TGT de un KDC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* server security&lt;br /&gt;
* net command&lt;br /&gt;
* kinit, TGT and REALM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 396: Servicios de nombres de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.1 NetBIOS y WINS  (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con los conceptos NetBIOS / WINS y comprender la navegación de red.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Entender los conceptos de WINS&lt;br /&gt;
* Comprender los conceptos de NetBIOS&lt;br /&gt;
* Comprender el papel de un navegador maestro local&lt;br /&gt;
* Comprender el papel de un navegador maestro de dominio&lt;br /&gt;
* Comprender el papel de Samba como servidor WINS&lt;br /&gt;
* Entender la resolución del nombre&lt;br /&gt;
* Configurar Samba como un servidor WINS&lt;br /&gt;
* Configurar la replicación de WINS&lt;br /&gt;
* Comprender la navegación de NetBIOS y las elecciones de navegador&lt;br /&gt;
* Comprender los tipos de nombre NETBIOS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* nmblookup&lt;br /&gt;
* smbclient&lt;br /&gt;
* name resolve order&lt;br /&gt;
* lmhosts&lt;br /&gt;
* wins support, wins server, wins proxy, dns proxy&lt;br /&gt;
* domain master, os level, preferred master&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.2 Resolución de nombre de Active Directory  (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con el servidor DNS interno con Samba4.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender y gestionar DNS para Samba4 como un controlador de dominio AD&lt;br /&gt;
* Reenvío de DNS con el servidor DNS interno de Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba-tool dns (with subcommands)&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dns forwarder&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
* dig, host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 397: Trabajar con clientes Linux y Windows&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.1 Integración de CIFS (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben sentirse cómodos trabajando con CIFS en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Entender los conceptos SMB / CIFS&lt;br /&gt;
* Acceda y monte recursos compartidos de CIFS remotos desde un cliente de Linux&lt;br /&gt;
* Almacenamiento seguro de credenciales CIFS&lt;br /&gt;
* Comprender las características y los beneficios de CIFS&lt;br /&gt;
* Comprender los permisos y la propiedad de archivos de acciones compartidas de CIFS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SMB/CIFS&lt;br /&gt;
* mount, mount.cifs&lt;br /&gt;
* smbclient&lt;br /&gt;
* smbget&lt;br /&gt;
* smbtar&lt;br /&gt;
* smbtree&lt;br /&gt;
* findsmb&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.2 Trabajar con clientes de Windows (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder interactuar con clientes remotos de Windows y configurar estaciones de trabajo de Windows para acceder a los servicios de archivo e impresión desde servidores Linux.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento de clientes de Windows&lt;br /&gt;
* Explorar listas de exploración y clientes SMB desde Windows&lt;br /&gt;
* Compartir archivos / imprimir recursos desde Windows&lt;br /&gt;
* Uso del programa smbclient&lt;br /&gt;
* Uso de la utilidad de red de Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Windows net command&lt;br /&gt;
* smbclient&lt;br /&gt;
* control panel&lt;br /&gt;
* rdesktop&lt;br /&gt;
* workgroup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=SpanishTranslationNotes&amp;diff=4359</id>
		<title>SpanishTranslationNotes</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=SpanishTranslationNotes&amp;diff=4359"/>
		<updated>2017-12-12T15:40:54Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Using OmegaT for Group Translations==&lt;br /&gt;
&lt;br /&gt;
First be sure to read the [[Translation_Instructions]].&lt;br /&gt;
&lt;br /&gt;
==Managing Translation Memories==&lt;br /&gt;
&lt;br /&gt;
Read this post: [[http://www.proz.com/forum/omegat_support/146666-importing_a_translation_memory_into_omegat.html#1226038]]&lt;br /&gt;
&lt;br /&gt;
We need to decide on how to share translations.&lt;br /&gt;
&lt;br /&gt;
Possibilities:&lt;br /&gt;
* share them as project_save_name.tmx and share them (con: one person will have to do a final translation with everyone&#039;s translation memories)&lt;br /&gt;
* have a master and pass it around as a token (con: no parallel translations)&lt;br /&gt;
* other ideas? (let&#039;s keep it simple, though)&lt;br /&gt;
&lt;br /&gt;
==Common Terms==&lt;br /&gt;
&lt;br /&gt;
===Current Glossary===&lt;br /&gt;
&lt;br /&gt;
The current glossary in Spanish is available in [[Media:Glossary-es.pdf|PDF]] and [[Media:Glossary-es.jpg|JPG]] formats.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, the wiki doesn&#039;t allow for upload of OOo or other editable formats.&lt;br /&gt;
&lt;br /&gt;
===Words agreed===&lt;br /&gt;
&lt;br /&gt;
 Note: By using OmegaT and sharing translation memories, technical terms should naturally stabilise (or cause a dialect war ;)).&lt;br /&gt;
&lt;br /&gt;
Meanwhile, while the OmegaT/TM &amp;quot;standard&amp;quot; is happening, here is a jargon list:&lt;br /&gt;
&lt;br /&gt;
Mark in bold words that should go in the exam glossary.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please indicate which version you use (es_ES, es_AR, es_CL, ...)&lt;br /&gt;
{|border=&amp;quot;1&amp;quot;&lt;br /&gt;
|+ Proposed spanish terms&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;English&#039;&#039;&#039; &lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &#039;&#039;&#039;Spanish&#039;&#039;&#039;, agreed&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;es_ES&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &#039;&#039;&#039;es_MX&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;es_CO&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &#039;&#039;&#039;es_AR&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| file&lt;br /&gt;
| archivo&lt;br /&gt;
| fichero. Nota, archivo tb. se entiende&lt;br /&gt;
| &lt;br /&gt;
| archivo&lt;br /&gt;
| archivo&lt;br /&gt;
|-&lt;br /&gt;
| file system&lt;br /&gt;
| sistema de archivos&lt;br /&gt;
| sistema de ficheros&lt;br /&gt;
| &lt;br /&gt;
| sistemas de archivos&lt;br /&gt;
| sistemas de archivos&lt;br /&gt;
|-&lt;br /&gt;
| script&lt;br /&gt;
| script&lt;br /&gt;
| script, guión&lt;br /&gt;
| &lt;br /&gt;
| archivo de órdenes, programa simple&lt;br /&gt;
| script&lt;br /&gt;
|-&lt;br /&gt;
| remove,delete&lt;br /&gt;
| borrar&lt;br /&gt;
| eliminar, borrar&lt;br /&gt;
| eliminar&lt;br /&gt;
| borrar, remover&lt;br /&gt;
| borrar, eliminar&lt;br /&gt;
|-&lt;br /&gt;
| linker&lt;br /&gt;
| enlazador&lt;br /&gt;
| linker&lt;br /&gt;
|&lt;br /&gt;
| enlazador&lt;br /&gt;
| linker&lt;br /&gt;
|-&lt;br /&gt;
| library&lt;br /&gt;
| librería&lt;br /&gt;
| librería&lt;br /&gt;
|&lt;br /&gt;
| biblioteca, libreria&lt;br /&gt;
| biblioteca, libreria&lt;br /&gt;
|-&lt;br /&gt;
| stdin&lt;br /&gt;
| entrada estándar&lt;br /&gt;
| entrada estándar&lt;br /&gt;
|&lt;br /&gt;
| entrada estándar&lt;br /&gt;
| entrada estándar&lt;br /&gt;
|-&lt;br /&gt;
| stdout&lt;br /&gt;
| salida estándar&lt;br /&gt;
| salida estándar&lt;br /&gt;
|&lt;br /&gt;
| salida estándar&lt;br /&gt;
| salida estándar&lt;br /&gt;
|-&lt;br /&gt;
| stderr&lt;br /&gt;
| error estándar&lt;br /&gt;
| error estándar&lt;br /&gt;
|&lt;br /&gt;
| error estándar&lt;br /&gt;
| error estándar&lt;br /&gt;
|-&lt;br /&gt;
| environment variable&lt;br /&gt;
| Variable de entorno&lt;br /&gt;
| Variable de entorno&lt;br /&gt;
|&lt;br /&gt;
| Variable de ambiente&lt;br /&gt;
| Variable de entorno, Variable de ambiente&lt;br /&gt;
|-&lt;br /&gt;
| boot loader&lt;br /&gt;
| gestor de arranque&lt;br /&gt;
| gestor de arranque&lt;br /&gt;
|&lt;br /&gt;
| gestor de arranque, cargador de arranque&lt;br /&gt;
| gestor de arranque&lt;br /&gt;
|-&lt;br /&gt;
| image file&lt;br /&gt;
| archivo de imagen&lt;br /&gt;
| fichero de imagen&lt;br /&gt;
|&lt;br /&gt;
| archivo de imagen, fichero de imagen&lt;br /&gt;
| archivo de imagen&lt;br /&gt;
|-&lt;br /&gt;
| utility&lt;br /&gt;
| utilidad&lt;br /&gt;
| utilidad, programa&lt;br /&gt;
|&lt;br /&gt;
| utilidad&lt;br /&gt;
| utilidad, programa&lt;br /&gt;
|-&lt;br /&gt;
| /, root directory&lt;br /&gt;
| directorio raíz,&lt;br /&gt;
| en el caso del usuario &#039;root&#039; sería administrador&lt;br /&gt;
| Raíz y cuenta usuario administrador&lt;br /&gt;
| Raíz, en el caso del usuario &#039;root&#039; sería cuenta usuario administrador tb se entiende root&lt;br /&gt;
| Raíz, directorio Raiz&lt;br /&gt;
|-&lt;br /&gt;
| root user&lt;br /&gt;
| usuario raíz,&lt;br /&gt;
| en el caso del usuario &#039;root&#039; sería administrador&lt;br /&gt;
| Raíz, cuenta usuario administrador&lt;br /&gt;
| Raíz, en el caso del usuario &#039;root&#039; sería cuenta usuario administrador tb se entiende root&lt;br /&gt;
| en el caso del usuario &#039;root&#039; seria super usuario, usuario administrador, tb se entiende root&lt;br /&gt;
|-&lt;br /&gt;
| edit files&lt;br /&gt;
| editar archivos&lt;br /&gt;
| editar ficheros, modificar ficheros&lt;br /&gt;
|&lt;br /&gt;
| editar archivos&lt;br /&gt;
| modificar archivos, modificar ficheros&lt;br /&gt;
|-&lt;br /&gt;
| network locations&lt;br /&gt;
| localización de red&lt;br /&gt;
| localización de red&lt;br /&gt;
|&lt;br /&gt;
| localización, ubicación de red&lt;br /&gt;
| ubicaciones de red&lt;br /&gt;
|-&lt;br /&gt;
| PATH&lt;br /&gt;
| ruta&lt;br /&gt;
| camino (en España no se utiliza), ruta &lt;br /&gt;
|&lt;br /&gt;
| ruta, paso&lt;br /&gt;
| ruta, path (tambien se usa termino en Ingles)&lt;br /&gt;
|-&lt;br /&gt;
| hard link&lt;br /&gt;
| enlace fuerte&lt;br /&gt;
| enlace duro (en España no se utiliza)&lt;br /&gt;
|&lt;br /&gt;
| vínculo, enlace fuerte&lt;br /&gt;
| Enlace duro tb hard link(la gente de sistemas lo usa asi)&lt;br /&gt;
|-&lt;br /&gt;
| symbolic link&lt;br /&gt;
| enlace simbólico&lt;br /&gt;
| enlace simbólico (en España sin embargo sí se utiliza... ¿?)&lt;br /&gt;
|&lt;br /&gt;
| enlace simbólico&lt;br /&gt;
| link simbólico&lt;br /&gt;
|-&lt;br /&gt;
| kernel&lt;br /&gt;
| núcleo&lt;br /&gt;
| núcleo, aunque en España se utiliza de forma común kernel.&lt;br /&gt;
|&lt;br /&gt;
| Parte importante de un sistema operativo, núcleo del mismo&lt;br /&gt;
| kernel, núcleo&lt;br /&gt;
|-&lt;br /&gt;
| Window manager&lt;br /&gt;
| Gestor de ventanas&lt;br /&gt;
| Gestor de ventanas&lt;br /&gt;
|&lt;br /&gt;
| Gestor de ventanas&lt;br /&gt;
| Gestor de ventanas&lt;br /&gt;
|-&lt;br /&gt;
| X Display Manager&lt;br /&gt;
| Administrador de Pantalla (X Display Manager)&lt;br /&gt;
| Gestor de Visualización X, aunque nadie lo utiliza, yo pondría X Display Manager. Administrador de pantalla.&lt;br /&gt;
|&lt;br /&gt;
| Gestor de pantalla&lt;br /&gt;
| Administrador de Pantalla&lt;br /&gt;
|-&lt;br /&gt;
| log&lt;br /&gt;
| Registro de eventos&lt;br /&gt;
| log, registro&lt;br /&gt;
| bitácora&lt;br /&gt;
| Registro de eventos&lt;br /&gt;
| log/registro/evento&lt;br /&gt;
|-&lt;br /&gt;
| log priority&lt;br /&gt;
| prioridad de registro&lt;br /&gt;
| prioridad de registro&lt;br /&gt;
| prioridad de bitácora&lt;br /&gt;
| prioridad de eventos&lt;br /&gt;
| prioridad de eventos/registros/log&lt;br /&gt;
|-&lt;br /&gt;
| log facility&lt;br /&gt;
| canal de registro, tipo de registro&lt;br /&gt;
|&lt;br /&gt;
| canal/tipo de registro/bitácora&lt;br /&gt;
| Eventos mensajes de registro de syslog&lt;br /&gt;
| Eventos del sistema de registro/log&lt;br /&gt;
|-&lt;br /&gt;
| network address&lt;br /&gt;
| dirección de red&lt;br /&gt;
| dirección de red&lt;br /&gt;
| dirección de red&lt;br /&gt;
| dirección de red&lt;br /&gt;
| dirección de red&lt;br /&gt;
|-&lt;br /&gt;
| interface&lt;br /&gt;
| interfaz&lt;br /&gt;
| interfaz&lt;br /&gt;
|&lt;br /&gt;
| interface&lt;br /&gt;
| interface,interfaz&lt;br /&gt;
|-&lt;br /&gt;
| connectionless&lt;br /&gt;
| No orientado a conexión&lt;br /&gt;
| No orientado a conexión&lt;br /&gt;
|&lt;br /&gt;
| conexión perdida, sin conexión&lt;br /&gt;
| No orientado a la conexión&lt;br /&gt;
|-&lt;br /&gt;
| scheduling system&lt;br /&gt;
| sistema de planificación&lt;br /&gt;
| sistema de planificación&lt;br /&gt;
|&lt;br /&gt;
| Planificación de sistema&lt;br /&gt;
| Planificador/Planificación de sistema&lt;br /&gt;
|-&lt;br /&gt;
| dynamic linker&lt;br /&gt;
| enlazador dinámico&lt;br /&gt;
| En España se utiliza linker dinámico, pero tiene sentido enlazador dinámico.&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| Enlazador dinamico tb dynamic linker(la gente de sistemas lo usa asi)&lt;br /&gt;
|-&lt;br /&gt;
| to add&lt;br /&gt;
| añadir&lt;br /&gt;
| añadir (raramente se utiliza agregar aunque se entiende)&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| agregar,añadir&lt;br /&gt;
|-&lt;br /&gt;
| legacy&lt;br /&gt;
| legacy&lt;br /&gt;
| Se suele utilizar legacy en España...&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| legacy&lt;br /&gt;
|-&lt;br /&gt;
| keys&lt;br /&gt;
| clave&lt;br /&gt;
| clave, llave no se suele utilizar&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| llave&lt;br /&gt;
|-&lt;br /&gt;
| crypt&lt;br /&gt;
| cifrar&lt;br /&gt;
| cifrar (encriptar se utiliza pero está mal dicho)&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| cifrar (tambien encriptar pero esta mal dicho)&lt;br /&gt;
|-&lt;br /&gt;
| locale configuration&lt;br /&gt;
| configuración regional&lt;br /&gt;
| configuración regional (a veces configuración local aunque probablemente sea más correcto regional)&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| configuración regional,local&lt;br /&gt;
|-&lt;br /&gt;
| gateway&lt;br /&gt;
| puerta de enlace&lt;br /&gt;
| puerta de enlace&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| puerta de enlace&lt;br /&gt;
|-&lt;br /&gt;
| default&lt;br /&gt;
| por defecto&lt;br /&gt;
| por defecto (se entiende tb. predeterminada)&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| predeterminada, tb.default,por defecto&lt;br /&gt;
|-&lt;br /&gt;
| password&lt;br /&gt;
| clave&lt;br /&gt;
| clave, contraseña&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| contraseña, clave&lt;br /&gt;
|-&lt;br /&gt;
| newline&lt;br /&gt;
| salto de línea&lt;br /&gt;
| salto de línea&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| salto de línea&lt;br /&gt;
|-&lt;br /&gt;
| carriage return&lt;br /&gt;
| retorno de carro&lt;br /&gt;
| retorno de carro&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| retorno de carro&lt;br /&gt;
|-&lt;br /&gt;
| runlevel&lt;br /&gt;
| runlevel&lt;br /&gt;
| nivel de ejecución&lt;br /&gt;
| &lt;br /&gt;
| nivel de inicio, nivel de arranque, runlevel&lt;br /&gt;
|-&lt;br /&gt;
| daemon&lt;br /&gt;
| demonio&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| demonio, daemon tambien&lt;br /&gt;
|-&lt;br /&gt;
| login shell&lt;br /&gt;
| intérprete de comandos&lt;br /&gt;
| intérprete de comandos&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| intérprete de ordenes, interprete de inicio, shell de inicio, intréprete de comandos&lt;br /&gt;
|-&lt;br /&gt;
| background&lt;br /&gt;
| segundo plano&lt;br /&gt;
| segundo plano&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| segundo plano&lt;br /&gt;
|-&lt;br /&gt;
| sub-shell/s&lt;br /&gt;
| sub-shell&lt;br /&gt;
| sub-shell&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| sub-shell/s&lt;br /&gt;
|-&lt;br /&gt;
| buffer&lt;br /&gt;
| buffer&lt;br /&gt;
| Tb. buffer&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| buffer&lt;br /&gt;
|-&lt;br /&gt;
| Swap&lt;br /&gt;
| Área de intercambio&lt;br /&gt;
| Área de intercambio&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| Área de intercambio&lt;br /&gt;
|-&lt;br /&gt;
| Paging&lt;br /&gt;
| Paginación&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| Paginación&lt;br /&gt;
|-&lt;br /&gt;
| login&lt;br /&gt;
| firmarse/iniciar sesión&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Inode&lt;br /&gt;
| Inodo&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| Inodo&lt;br /&gt;
|-&lt;br /&gt;
| Archiving format&lt;br /&gt;
| &lt;br /&gt;
| Formato de empaquetado&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| Empaquetado&lt;br /&gt;
|-&lt;br /&gt;
| kernel source tree&lt;br /&gt;
| codigo fuente del núcleo&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| codigo fuente del núcleo&lt;br /&gt;
|-&lt;br /&gt;
| firewall&lt;br /&gt;
|&lt;br /&gt;
| cortafuegos&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|servidor de seguridad, firewall&lt;br /&gt;
|-&lt;br /&gt;
|volume group&lt;br /&gt;
|grupo de volúmenes&lt;br /&gt;
|grupo de volúmenes&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|grupo de volumenes&lt;br /&gt;
|-&lt;br /&gt;
|physical volume&lt;br /&gt;
|volumen físico&lt;br /&gt;
|volumen físico&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|volumen fisico&lt;br /&gt;
|-&lt;br /&gt;
|router&lt;br /&gt;
|enrutador&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|enrutador,ruta&lt;br /&gt;
|-&lt;br /&gt;
|stack fingerprinting&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|network for forensics&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|kernel buffer ring&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| anillo de buffer del nucelo&lt;br /&gt;
|-&lt;br /&gt;
| make target&lt;br /&gt;
| &lt;br /&gt;
| objetivo de make&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| patch&lt;br /&gt;
| &lt;br /&gt;
| parche&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| home directory&lt;br /&gt;
| &lt;br /&gt;
| directorio home (no se suele traducir)&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| initramfs&lt;br /&gt;
| &lt;br /&gt;
| initramfs (no se suele traducir)&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| boot time&lt;br /&gt;
| &lt;br /&gt;
| tiempo de arranque (boot time), o inicio de sistema (boot time), creo que es más claro incluir el término sin traducir tb. entre paréntesis&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| single user mode&lt;br /&gt;
| &lt;br /&gt;
| modo monousuario, aunque le añadiría entre paréntesis el término en inglés (single user mode)&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| shared library&lt;br /&gt;
| &lt;br /&gt;
| librería dinámica&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| routed&lt;br /&gt;
| &lt;br /&gt;
| enrutada&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Active Directory&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| bridge&lt;br /&gt;
| &lt;br /&gt;
| Puente&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| hardening&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| backup&lt;br /&gt;
| &lt;br /&gt;
| copia de respaldo, copia de seguridad&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Spanish conventions===&lt;br /&gt;
&lt;br /&gt;
This could go into policy. But I think this is just a discussion point.&lt;br /&gt;
&lt;br /&gt;
* Usage of the first person, verbal time, ..., so that the exam looks consistent. See the different translations of could -&amp;gt; podría, podía, puede... Mi opinión es utilizar el presente siempre. Si utiliza, si hace, si borra, cuando crea, ...&lt;br /&gt;
&lt;br /&gt;
* Uso de Usted. En España suena muy, muy raro, intentemos usar tercera persona, o impersonal. Usted borra-&amp;gt; Se borra.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Uso de artículos determinados para los boot loaders, el arranque &#039;&#039;&#039;de&#039;&#039;&#039; lilo vs el arranque &#039;&#039;&#039;del&#039;&#039;&#039; lilo&lt;br /&gt;
&lt;br /&gt;
* Uo de artículos determinados para &#039;&#039;&#039;la shell&#039;&#039;&#039;, &#039;&#039;&#039;la bash&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4358</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4358"/>
		<updated>2017-12-12T15:38:28Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* 391.2 Integración de LDAP con Active Directory y Kerberos (Peso: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: Configuración de OpenLDAP&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Replicación de OpenLDAP (Pesot: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con la replicación del servidor disponible con OpenLDAP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conceptos de replicación&lt;br /&gt;
* Configurar la replicación de OpenLDAP&lt;br /&gt;
* Analizar archivos de registro de replicación&lt;br /&gt;
* Comprender los centros de réplica&lt;br /&gt;
* Referencias de LDAP&lt;br /&gt;
* Replicación de sincronización LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* servidor maestro / esclavo&lt;br /&gt;
* replicación multi-master&lt;br /&gt;
* consumer&lt;br /&gt;
* hub de réplica&lt;br /&gt;
* modo one-shot&lt;br /&gt;
* referral&lt;br /&gt;
* syncrepl&lt;br /&gt;
* sincronización basada en pull / basado en push&lt;br /&gt;
* refreshOnly and refreshAndPersist&lt;br /&gt;
* replog&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.2  Asegurar el directorio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder configurar el acceso codificado al directorio LDAP y restringir el acceso al nivel del firewall.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Asegurar el directorio con SSL y TLS&lt;br /&gt;
* Consideraciones de firewall&lt;br /&gt;
* Métodos de acceso no autenticado&lt;br /&gt;
* Métodos de autenticación de usuario / contraseña&lt;br /&gt;
* Mantenimiento del usuario SASL DB&lt;br /&gt;
* Certificados de cliente / servidor&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL / TLS&lt;br /&gt;
* Factores de fortaleza de seguridad (SSF)&lt;br /&gt;
* SASL&lt;br /&gt;
* autorización de proxy&lt;br /&gt;
* StartTLS&lt;br /&gt;
* iptables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.3  Ajuste del rendimiento del servidor OpenLDAP (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de medir el rendimiento de un servidor LDAP y ajustar las directivas de configuración.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Medir el rendimiento de OpenLDAP&lt;br /&gt;
* Ajuste la configuración del software para aumentar el rendimiento&lt;br /&gt;
* Comprender los índices&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* index&lt;br /&gt;
* DB_CONFIG&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 391: OpenLDAP como un backend de autenticación&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.1 Integración LDAP con PAM y NSS (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar PAM y NSS para recuperar información de un directorio LDAP.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar PAM para usar LDAP para autenticación&lt;br /&gt;
* Configurar NSS para recuperar información de LDAP&lt;br /&gt;
* Configurar módulos PAM en varios entornos Unix&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM&lt;br /&gt;
* NSS&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
* /etc/nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.2 Integración de LDAP con Active Directory y Kerberos (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder integrar LDAP con los Servicios de Active Directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Integración de Kerberos con LDAP&lt;br /&gt;
* Autenticación multiplataforma&lt;br /&gt;
* Conceptos de inicio de sesión único&lt;br /&gt;
* Limitaciones de integración y compatibilidad entre OpenLDAP y Active Directory&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos&lt;br /&gt;
* Active Directory &lt;br /&gt;
* inicio de sesión único&lt;br /&gt;
* DNS&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 392: Conceptos básicos de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.1 Arquitectura y conceptos de Samba  (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben entender los conceptos esenciales de Samba. Además, las principales diferencias entre Samba3 y Samba4 deberían conocerse.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender los roles de los demonios y componentes de Samba&lt;br /&gt;
* Comprender los problemas clave relacionados con las redes heterogéneas&lt;br /&gt;
* Identificar los puertos clave TCP / UDP utilizados con SMB / CIFS&lt;br /&gt;
* Conocimiento de las diferencias entre Samba3 y Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
* Samba daemons: smbd, nmbd, samba, winbindd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.2 Configurar Samba (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar los demonios Samba para una amplia variedad de propósitos.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento de la estructura del archivo de configuración del servidor Samba&lt;br /&gt;
* Conocimiento de variables de Samba y parámetros de configuración&lt;br /&gt;
* Solucionar problemas y depurar problemas de configuración con Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smb.conf parameters&lt;br /&gt;
* smb.conf variables&lt;br /&gt;
* testparm&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.3 Mantenimiento regular de samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben conocer las diversas herramientas y utilidades que forman parte de una instalación de Samba.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Controla e interactúa con los daemons de Samba mientras estan en ejecución&lt;br /&gt;
* Realizar copias de seguridad periódicas de la configuración de Samba y sus datos de estado&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smbcontrol&lt;br /&gt;
* smbstatus&lt;br /&gt;
* tdbbackup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.4 Solución de problemas de Samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender la estructura de los archivos triviales de la base de datos y saber cómo solucionar los problemas.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar el registro de Samba&lt;br /&gt;
* Copia de seguridad de archivos TDB&lt;br /&gt;
* Restaurar archivos TDB&lt;br /&gt;
* Identifica los corrupción del archivo TDB&lt;br /&gt;
* Editar / listar contenido del archivo TDB&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/log/samba/&lt;br /&gt;
* log level&lt;br /&gt;
* debuglevel&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* pdbedit&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
* tdbbackup&lt;br /&gt;
* tdbdump&lt;br /&gt;
* tdbrestore&lt;br /&gt;
* tdbtool&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.5 Internacionalización (Peso: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder trabajar con códigos de caracteres de internacionalización y páginas de códigos.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender códigos de caracteres de internacionalización y páginas de códigos&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a compartir, archivos y nombres de directorios en un entorno que no sea inglés&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a los nombres de usuarios y grupos en un entorno que no es inglés&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a la denominación de la computadora en un entorno que no sea inglés&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* internacionalización&lt;br /&gt;
* códigos de caracteres&lt;br /&gt;
* páginas de códigos&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dos charset, display charset y unix charset&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 393: Configuración de Samba Share&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.1 Servicios de archivo (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de crear y configurar archivos compartidos en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Crear y configurar archivos compartidos&lt;br /&gt;
* Plan de migración del servicio de archivos&lt;br /&gt;
* Limite el acceso a IPC $&lt;br /&gt;
* Crear scripts para el manejo de usuarios y grupos de archivos compartidos&lt;br /&gt;
* Parámetros de configuración de acceso de Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [homes]&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* smbsh&lt;br /&gt;
* browseable, writeable, valid users, write list, read list, read only and guest ok&lt;br /&gt;
* IPC$&lt;br /&gt;
* mount, smbmount&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.2 Sistema de archivos Linux y permisos de Compartir / Servicio(Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender los permisos de archivos en un sistema de archivos Linux en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento del control de permisos de archivos / directorios&lt;br /&gt;
* Comprender cómo interactúa Samba con los permisos del sistema de archivos de Linux y las ACL&lt;br /&gt;
* Utilice Samba VFS para almacenar las ACL de Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* chmod, chown&lt;br /&gt;
* create mask, directory mask, force create mode, force directory mode&lt;br /&gt;
* smbcacls&lt;br /&gt;
* getfacl, setfacl&lt;br /&gt;
* vfs_acl_xattr, vfs_acl_tdb and vfs objects&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.3 Servicios de impresión (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían ser capaces de crear y administrar recursos compartidos de impresión en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Crear y configurar el uso compartido de impresoras&lt;br /&gt;
* Configurar la integración entre Samba y CUPS&lt;br /&gt;
* Administrar los controladores de impresión de Windows y configurar la descarga de los controladores de impresión&lt;br /&gt;
* Configurar [imprimir $]&lt;br /&gt;
* Comprender las preocupaciones de seguridad con el uso compartido de impresoras&lt;br /&gt;
* Carga de controladores de impresora para la instalación del controlador Point&#039;n&#039;Print con &#039;Asistente para Agregar controlador de impresora&#039; en Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [print$]&lt;br /&gt;
* CUPS&lt;br /&gt;
* cupsd.conf&lt;br /&gt;
* /var/spool/samba/&lt;br /&gt;
* smbspool&lt;br /&gt;
* rpcclient&lt;br /&gt;
* net&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 394: Gestion de Usuarios y Grupos de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.1 Gestión de cuentas y grupos de usuarios  (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de administrar cuentas de usuarios y grupos en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Administrador de cuentas de usuarios y grupos&lt;br /&gt;
* Comprender el mapeo de usuarios y grupos&lt;br /&gt;
* Conocimiento de herramientas de administración de cuentas de usuario&lt;br /&gt;
* Uso del programa smbpasswd&lt;br /&gt;
* Forzar las propiedades de los objetos de archivos y directorios&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* pdbedit&lt;br /&gt;
* smb.conf&lt;br /&gt;
* samba-tool user (con subcomandos)&lt;br /&gt;
* samba-tool group (con subcommands)&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
* force user, force group&lt;br /&gt;
* idmap&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.2 Autenticación, autorización y Winbind (Peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender los diversos mecanismos de autenticación y configurar el control de acceso. Los candidatos deberían poder instalar y configurar el servicio Winbind.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar una base de datos de contraseñas local&lt;br /&gt;
* Realizar sincronización de contraseña&lt;br /&gt;
* Conocimiento de diferentes backends de passdb&lt;br /&gt;
* Convert between Samba passdb backends&lt;br /&gt;
* Integrar Samba con LDAP&lt;br /&gt;
* Configurar el servicio de Winbind&lt;br /&gt;
* Configurar PAM y NSS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbpasswd, tdbsam, ldapsam&lt;br /&gt;
* passdb backend&lt;br /&gt;
* libnss_winbind&lt;br /&gt;
* libpam_winbind&lt;br /&gt;
* libpam_smbpass&lt;br /&gt;
* wbinfo&lt;br /&gt;
* getent&lt;br /&gt;
* SID and foreign SID&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 395: Integración de dominios Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.1 Samba como PDC y BDC (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían ser capaces de configurar y mantener los controladores de dominio principales y de respaldo. Los candidatos deberían poder administrar el acceso de los clientes de Windows / Linux a los dominios  del estilo NT.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender y configurar membresía de dominio y relaciones de confianza&lt;br /&gt;
* Crear y mantener un controlador de dominio principal con Samba3 y Samba4&lt;br /&gt;
* Crear y mantener un controlador de dominio de respaldo con Samba3 y Samba4&lt;br /&gt;
* Agregar computadoras a un dominio existente&lt;br /&gt;
* Configurar scripts de inicio de sesión&lt;br /&gt;
* Configurar perfiles itinerantes&lt;br /&gt;
* Configurar políticas del sistema&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* security mode&lt;br /&gt;
* server role&lt;br /&gt;
* domain logons&lt;br /&gt;
* domain master&lt;br /&gt;
* logon script&lt;br /&gt;
* logon path&lt;br /&gt;
* NTConfig.pol&lt;br /&gt;
* net&lt;br /&gt;
* profiles&lt;br /&gt;
* add machine script&lt;br /&gt;
* profile acls&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.2 Samba4 como controlador de dominio compatible con AD (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder configurar Samba 4 como un controlador de dominio AD.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar y probar Samba 4 como AD DC&lt;br /&gt;
* Uso de smbclient para confirmar la operación de AD&lt;br /&gt;
* Comprender cómo se integra Samba con los servicios de AD: DNS, Kerberos, NTP, LDAP&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* samba-tool domain (with subcommands)&lt;br /&gt;
* samba&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.3 Configurar Samba como servidor de miembros de dominio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de integrar servidores Linux en un entorno donde esté presente Active Directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unirse a Samba a un dominio NT4 existente&lt;br /&gt;
* Unirse a Samba a un dominio de AD existente&lt;br /&gt;
* Capacidad de obtener un TGT de un KDC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* server security&lt;br /&gt;
* net command&lt;br /&gt;
* kinit, TGT and REALM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 396: Servicios de nombres de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.1 NetBIOS y WINS  (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con los conceptos NetBIOS / WINS y comprender la navegación de red.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Entender los conceptos de WINS&lt;br /&gt;
* Comprender los conceptos de NetBIOS&lt;br /&gt;
* Comprender el papel de un navegador maestro local&lt;br /&gt;
* Comprender el papel de un navegador maestro de dominio&lt;br /&gt;
* Comprender el papel de Samba como servidor WINS&lt;br /&gt;
* Entender la resolución del nombre&lt;br /&gt;
* Configurar Samba como un servidor WINS&lt;br /&gt;
* Configurar la replicación de WINS&lt;br /&gt;
* Comprender la navegación de NetBIOS y las elecciones de navegador&lt;br /&gt;
* Comprender los tipos de nombre NETBIOS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* nmblookup&lt;br /&gt;
* smbclient&lt;br /&gt;
* name resolve order&lt;br /&gt;
* lmhosts&lt;br /&gt;
* wins support, wins server, wins proxy, dns proxy&lt;br /&gt;
* domain master, os level, preferred master&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.2 Resolución de nombre de Active Directory  (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con el servidor DNS interno con Samba4.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender y gestionar DNS para Samba4 como un controlador de dominio AD&lt;br /&gt;
* Reenvío de DNS con el servidor DNS interno de Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba-tool dns (with subcommands)&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dns forwarder&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
* dig, host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 397: Trabajar con clientes Linux y Windows&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.1 Integración de CIFS (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben sentirse cómodos trabajando con CIFS en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Entender los conceptos SMB / CIFS&lt;br /&gt;
* Acceda y monte recursos compartidos de CIFS remotos desde un cliente de Linux&lt;br /&gt;
* Almacenamiento seguro de credenciales CIFS&lt;br /&gt;
* Comprender las características y los beneficios de CIFS&lt;br /&gt;
* Comprender los permisos y la propiedad de archivos de acciones compartidas de CIFS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SMB/CIFS&lt;br /&gt;
* mount, mount.cifs&lt;br /&gt;
* smbclient&lt;br /&gt;
* smbget&lt;br /&gt;
* smbtar&lt;br /&gt;
* smbtree&lt;br /&gt;
* findsmb&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.2 Trabajar con clientes de Windows (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder interactuar con clientes remotos de Windows y configurar estaciones de trabajo de Windows para acceder a los servicios de archivo e impresión desde servidores Linux.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento de clientes de Windows&lt;br /&gt;
* Explorar listas de exploración y clientes SMB desde Windows&lt;br /&gt;
* Compartir archivos / imprimir recursos desde Windows&lt;br /&gt;
* Uso del programa smbclient&lt;br /&gt;
* Uso de la utilidad de red de Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Windows net command&lt;br /&gt;
* smbclient&lt;br /&gt;
* control panel&lt;br /&gt;
* rdesktop&lt;br /&gt;
* workgroup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4328</id>
		<title>LPIC-303(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4328"/>
		<updated>2017-12-10T23:44:14Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
La descripción del programa completo [[LPIC-3]] figura en la lista [[LPIC-3 | aquí]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos son los objetivos  de la versión 2.0.0.&lt;br /&gt;
La versión [[LPIC-303 Objetivos V1 | 1.x objetivos]] se puede encontrar [[LPIC-303 Objetivos V1 | aquí]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traducciones de objetivos ==&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
* [[LPIC-303|Ingles]]&lt;br /&gt;
* [[LPIC-303(ES)|Español]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
===&#039;&#039;Topic 325: Criptografía&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.1 X.509 Certificados e Infraestructuras de Clave Pública (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben comprender los certificados X.509 y las infraestructuras de clave pública. Deben saber cómo configurar y usar OpenSSL para implementar las autoridades de certificación y emitir certificados SSL para diversos fines.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los certificados X.509, el ciclo de vida del certificado X.509, los campos del certificado X.509 y las extensiones de certificado X.509v3.&lt;br /&gt;
* Comprender las cadenas de confianza y las infraestructuras de clave pública.&lt;br /&gt;
* Generar y administrar claves públicas y privadas.&lt;br /&gt;
* Crear, operar y asegurar una autoridad de certificación.&lt;br /&gt;
* Solicitar, firmar y administrar certificados de servidor y cliente.&lt;br /&gt;
* Revocar certificados y autoridades de certificación.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* openssl, incluidos los subcomandos pertinentes&lt;br /&gt;
* Configuración de OpenSSL&lt;br /&gt;
* PEM, DER, PKCS&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL&lt;br /&gt;
* OCSP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt; Certificados para encriptación, firma y autenticación (peso: 4) 325.2 X.509&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber cómo usar certificados X.509 para autenticación de servidor y cliente. Los candidatos deben ser capaces de implementar la autenticación de usuario y servidor para Apache HTTPD. La versión de Apache HTTPD cubierta es 2.4 o superior.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender las versiones de los protocolos SSL y TLS.&lt;br /&gt;
* Comprender las amenazas de seguridad comunes de la capa de transporte, por ejemplo Man-in-the-Middle.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para proporcionar servicio HTTPS, incluidos SNI y HSTS.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para autenticar a los usuarios que usan certificados.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para proporcionar el engrapado OCSP.&lt;br /&gt;
* Usar OpenSSL para pruebas de servidor y cliente SSL / TLS.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Autoridades de certificación intermedias&lt;br /&gt;
* Configuración de cifrado (sin conocimiento específico de cifrado)&lt;br /&gt;
* httpd.conf&lt;br /&gt;
* mod_ssl&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.3 Sistemas de archivos encriptados (peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben ser capaces de configurar y configurar sistemas de archivos encriptados.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los dispositivo de bloque y el cifrado del sistema de archivos.&lt;br /&gt;
* Usar dm-crypt con LUKS para encriptar dispositivos de bloque.&lt;br /&gt;
* Usar eCryptfs para cifrar sistemas de archivos, incluidos directorios personales e integración de PAM.&lt;br /&gt;
* Conocer y tener en cuenta dm-crypt simple y EncFS.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* cryptsetup&lt;br /&gt;
* cryptmount&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
* ecryptfsd&lt;br /&gt;
* comandos ecryptfs-* &lt;br /&gt;
* mount.ecryptfs, umount.ecryptfs&lt;br /&gt;
* pam_ecryptfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.4 DNS y criptografía (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener experiencia y conocimiento de la criptografía en el contexto del DNS y su implementación utilizando BIND. La versión de BIND cubierta es 9.7 o superior.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprensión de DNSSEC y DANE.&lt;br /&gt;
* Configure y solucione problemas BIND con un servidor de nombres autorizado que sirve zonas seguras de DNSSEC.&lt;br /&gt;
* Configure BIND con un servidor de nombres recursivo que realiza la validación de DNSSEC en nombre de sus clientes.&lt;br /&gt;
* Key Signing Key, Zone Signing Key, Key Tag&lt;br /&gt;
* Generación de claves, almacenamiento de claves, gestión de claves y renovación de claves&lt;br /&gt;
* Mantenimiento y nueva firma de zonas&lt;br /&gt;
* Usar DANE para publicar información del certificado X.509 en DNS.&lt;br /&gt;
* Usar TSIG para una comunicación segura con BIND.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* DNS, EDNS, Zones, Resource Records&lt;br /&gt;
* DNS resource records: DS, DNSKEY, RRSIG, NSEC, NSEC3, NSEC3PARAM, TLSA&lt;br /&gt;
* DO-Bit, AD-Bit&lt;br /&gt;
* TSIG&lt;br /&gt;
* named.conf&lt;br /&gt;
* dnssec-keygen&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
* dnssec-settime&lt;br /&gt;
* dnssec-dsfromkey&lt;br /&gt;
* rndc&lt;br /&gt;
* dig&lt;br /&gt;
* delv&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 326: Seguridad del host&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.1 Hardening del host (peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben poder proteger las computadoras que ejecutan Linux contra amenazas comunes. Esto incluye kernel y configuración de software.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configurar la seguridad del BIOS y del gestor de arranque (GRUB 2).&lt;br /&gt;
* Deshabilitar software y servicios inútiles.&lt;br /&gt;
* Use sysctl para la configuración del kernel relacionada con la seguridad, particularmente ASLR, Exec-Shield y la configuración de IP / ICMP.&lt;br /&gt;
* Limitar el uso de recursos.&lt;br /&gt;
* Trabajar con entornos chroot.&lt;br /&gt;
* Eliminar capacidades innecesarias.&lt;br /&gt;
* Tenga en cuenta las ventajas de seguridad de la virtualización.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* grub.cfg&lt;br /&gt;
* chkconfig, systemctl&lt;br /&gt;
* ulimit&lt;br /&gt;
* /etc/security/limits.conf&lt;br /&gt;
* pam_limits.so&lt;br /&gt;
* chroot&lt;br /&gt;
* sysctl&lt;br /&gt;
* /etc/sysctl.conf&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.2 Detecion de Intrusos en Host (peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben estar familiarizados con el uso y la configuración del software común de detección de intrusión de host. Esto incluye actualizaciones y mantenimiento, así como escaneos de host automatizados.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Usar y configurar el sistema de auditoría de Linux.&lt;br /&gt;
* Utiliza chkrootkit.&lt;br /&gt;
* Utiliza y configura rkhunter, incluidas las actualizaciones.&lt;br /&gt;
* Use Linux Malware Detect.&lt;br /&gt;
* Automatice las exploraciones de host usando cron.&lt;br /&gt;
* Configure y use AIDE, incluida la administración de reglas.&lt;br /&gt;
* Tenga en cuenta OpenSCAP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* auditd&lt;br /&gt;
* auditctl&lt;br /&gt;
* ausearch, aureport&lt;br /&gt;
* auditd.conf&lt;br /&gt;
* audit.rules&lt;br /&gt;
* pam_tty_audit.so&lt;br /&gt;
* chkrootkit&lt;br /&gt;
* rkhunter&lt;br /&gt;
* /etc/rkhunter.conf&lt;br /&gt;
* maldet&lt;br /&gt;
* conf.maldet&lt;br /&gt;
* aide&lt;br /&gt;
* /etc/aide/aide.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.3 Gestión y autenticación de usuarios (peso: 5) &amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben estar familiarizados con la gestión y la autenticación de cuentas de usuario. Esto incluye la configuración y el uso de NSS, PAM, SSSD y Kerberos para los directorios locales y remotos y los mecanismos de autenticación, así como la aplicación de una política de contraseñas.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender y configurar NSS.&lt;br /&gt;
* Comprender y configurar PAM.&lt;br /&gt;
* Aplicar políticas de complejidad de contraseña y cambios de contraseña periódicos.&lt;br /&gt;
* Bloquee cuentas automáticamente después de intentos fallidos de inicio de sesión.&lt;br /&gt;
* Configurar y usar SSSD.&lt;br /&gt;
* Configure NSS y PAM para usar con SSSD.&lt;br /&gt;
* Configure la autenticación SSSD contra Active Directory, IPA, LDAP, Kerberos y dominios locales.&lt;br /&gt;
* Obtenga y administre tickets de Kerberos.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* /etc/login.defs&lt;br /&gt;
* pam_cracklib.so&lt;br /&gt;
* chage&lt;br /&gt;
* pam_tally.so, pam_tally2.so&lt;br /&gt;
* faillog&lt;br /&gt;
* pam_sss.so&lt;br /&gt;
* sssd&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.4  Instalación de FreeIPA e integración de Samba (peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben estar familiarizados con FreeIPA v4.x. Esto incluye la instalación y el mantenimiento de una instancia de servidor con un dominio FreeIPA, así como la integración de FreeIPA con Active Directory.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender FreeIPA, incluida su arquitectura y componentes.&lt;br /&gt;
* Comprender los requisitos previos del sistema y la configuración para instalar FreeIPA.&lt;br /&gt;
* Instalar y administrar un servidor y dominio FreeIPA.&lt;br /&gt;
* Comprender y configurar la replicación de Active Directory y los cross-realm trusts de Kerberos.&lt;br /&gt;
* Tenga en cuenta la integración de sudo, autofs, SSH y SELinux en FreeIPA.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* 389 Directory Server, MIT Kerberos, Dogtag Certificate System, NTP, DNS, SSSD, certmonger&lt;br /&gt;
* ipa, including relevant subcommands&lt;br /&gt;
* ipa-server-install, ipa-client-install, ipa-replica-install&lt;br /&gt;
* ipa-replica-prepare, ipa-replica-manage&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 327: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.1 Control de acceso discrecional (peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben comprender el Control de acceso discrecional y saber cómo implementarlo usando las Listas de control de acceso. Además, los candidatos deben comprender y saber cómo utilizar atributos extendidos.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender y administrar la propiedad y los permisos del archivo, incluidos SUID y SGID.&lt;br /&gt;
* Comprender y administrar las listas de control de acceso.&lt;br /&gt;
* Entender y administrar atributos extendidos y clases de atributos.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.2 Control de acceso obligatorio (MAC) (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben estar familiarizados con los sistemas de control de acceso obligatorio para Linux. Específicamente, los candidatos deben tener un conocimiento profundo de SELinux. Además, los candidatos deben conocer otros sistemas de control de acceso obligatorio para Linux. Esto incluye las principales características de estos sistemas, pero no la configuración y el uso.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los conceptos de TE, RBAC, MAC y DAC.&lt;br /&gt;
* Configurar, administrar y usar SELinux.&lt;br /&gt;
* Conocer de AppArmor y Smack.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* getenforce, setenforce, selinuxenabled&lt;br /&gt;
* getsebool, setsebool, togglesebool&lt;br /&gt;
* fixfiles, restorecon, setfiles&lt;br /&gt;
* newrole, runcon&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus, seinfo&lt;br /&gt;
* apol&lt;br /&gt;
* seaudit, seaudit-report, audit2why, audit2allow&lt;br /&gt;
* /etc/selinux/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.3 Sistemas de archivos de red (peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener experiencia y conocimiento de los problemas de seguridad en el uso y la configuración de los clientes y servidores NFSv4, así como los servicios del cliente CIFS. Las versiones anteriores de NFS no estan dentro del conocimiento requerido.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender los problemas y las mejoras de seguridad de NFSv4.&lt;br /&gt;
* Configurar el servidor y los clientes de NFSv4.&lt;br /&gt;
* Comprender y configurar los mecanismos de autenticación de NFSv4 (LIPKEY, SPKM, Kerberos).&lt;br /&gt;
* Comprender y usar el sistema de pseudoarchivo NFSv4.&lt;br /&gt;
* Comprender y usar NFSv4 ACL.&lt;br /&gt;
* Configurar clientes CIFS.&lt;br /&gt;
* Comprender y usar extensiones CIFS Unix.&lt;br /&gt;
* Comprender y configurar los modos de seguridad CIFS (NTLM, Kerberos).&lt;br /&gt;
* Comprender y gestionar la asignación y el manejo de CIFS ACL y SID en un sistema Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* /etc/exports &lt;br /&gt;
* /etc/idmap.conf&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* parámetros mount.cifs relacionados con los permisos y los modos de seguridad* winbind&lt;br /&gt;
* getcifsacl, setcifsacl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 328: Seguridad de red&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.1  Hardening de Red(peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben poder proteger las redes contra amenazas comunes. Esto incluye la verificación de la efectividad de las medidas de seguridad.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure FreeRADIUS para autenticar los nodos de la red.&lt;br /&gt;
* Use nmap para escanear redes y hosts, incluidos diferentes métodos de escaneo.&lt;br /&gt;
* Use Wireshark para analizar el tráfico de la red, incluidos los filtros y las estadísticas.&lt;br /&gt;
* Identificar y tratar con anuncios de enrutadores maliciosos y mensajes DHCP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* radiusd&lt;br /&gt;
* radmin&lt;br /&gt;
* radtest, radclient&lt;br /&gt;
* radlast, radwho&lt;br /&gt;
* radiusd.conf&lt;br /&gt;
* /etc/raddb/*&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* ndpmon&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.2 Detección de intrusión de red (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben estar familiarizados con el uso y la configuración de la exploración de seguridad de red, el monitoreo de red y el software de detección de intrusos de red. Esto incluye la actualización y el mantenimiento de los escáneres de seguridad.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Implementar monitoreo de uso de ancho de banda.&lt;br /&gt;
* Configure y use Snort, incluida la administración de reglas.&lt;br /&gt;
* Configure y use OpenVAS, incluido NASL.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* Cacti&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/*&lt;br /&gt;
* openvas-adduser, openvas-rmuser&lt;br /&gt;
* openvas-nvt-sync&lt;br /&gt;
* openvassd&lt;br /&gt;
* openvas-mkcert&lt;br /&gt;
* /etc/openvas/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.3 Filtrado de paquetes (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben estar familiarizados con el uso y la configuración de los filtros de paquetes. Esto incluye netfilter, iptables e ip6tables, así como el conocimiento básico de nftables, nft y ebtables.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender las arquitecturas de firewall comunes, incluida DMZ.&lt;br /&gt;
* Comprender y usar netfilter, iptables e ip6tables, incluidos los módulos estándar, pruebas y objetivos.&lt;br /&gt;
* Implementar el filtrado de paquetes para IPv4 e IPv6.&lt;br /&gt;
* Implementar el seguimiento de la conexión y la traducción de direcciones de red.&lt;br /&gt;
* Definir conjuntos de IP y usarlos en las reglas de netfilter.&lt;br /&gt;
* Tener conocimientos básicos de nftables y nft.&lt;br /&gt;
* Tener conocimientos básicos de ebtables.&lt;br /&gt;
* Conocer conntrackd.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* ip6tables&lt;br /&gt;
* iptables-save, iptables-restore &lt;br /&gt;
* ip6tables-save, ip6tables-restore &lt;br /&gt;
* ipset&lt;br /&gt;
* nft&lt;br /&gt;
* ebtables&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.4 Redes privadas virtuales (peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |  Los candidatos deben estar familiarizados con el uso de OpenVPN e IPsec.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure y maneje el servidor OpenVPN y los clientes para las redes VPN enrutadas y puente.&lt;br /&gt;
* Configure y maneje el servidor IPsec y los clientes para las redes VPN enrutadas usando IPsec-Tools / racoon.&lt;br /&gt;
* Conocimientos sobre L2TP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/*&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
* setkey&lt;br /&gt;
* /etc/ipsec-tools.conf&lt;br /&gt;
* /etc/racoon/racoon.conf&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4327</id>
		<title>LPIC-303(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4327"/>
		<updated>2017-12-10T23:42:55Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* Topic 328: Network Security */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
La descripción del programa completo [[LPIC-3]] figura en la lista [[LPIC-3 | aquí]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos son los objetivos  de la versión 2.0.0.&lt;br /&gt;
La versión [[LPIC-303 Objetivos V1 | 1.x objetivos]] se puede encontrar [[LPIC-303 Objetivos V1 | aquí]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traducciones de objetivos ==&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
* [[LPIC-303|Ingles]]&lt;br /&gt;
* [[LPIC-303(ES)|Español]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
===&#039;&#039;Topic 325: Criptografía&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.1 X.509 Certificados e Infraestructuras de Clave Pública (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben comprender los certificados X.509 y las infraestructuras de clave pública. Deben saber cómo configurar y usar OpenSSL para implementar las autoridades de certificación y emitir certificados SSL para diversos fines.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los certificados X.509, el ciclo de vida del certificado X.509, los campos del certificado X.509 y las extensiones de certificado X.509v3.&lt;br /&gt;
* Comprender las cadenas de confianza y las infraestructuras de clave pública.&lt;br /&gt;
* Generar y administrar claves públicas y privadas.&lt;br /&gt;
* Crear, operar y asegurar una autoridad de certificación.&lt;br /&gt;
* Solicitar, firmar y administrar certificados de servidor y cliente.&lt;br /&gt;
* Revocar certificados y autoridades de certificación.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* openssl, incluidos los subcomandos pertinentes&lt;br /&gt;
* Configuración de OpenSSL&lt;br /&gt;
* PEM, DER, PKCS&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL&lt;br /&gt;
* OCSP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt; Certificados para encriptación, firma y autenticación (peso: 4) 325.2 X.509&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber cómo usar certificados X.509 para autenticación de servidor y cliente. Los candidatos deben ser capaces de implementar la autenticación de usuario y servidor para Apache HTTPD. La versión de Apache HTTPD cubierta es 2.4 o superior.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender las versiones de los protocolos SSL y TLS.&lt;br /&gt;
* Comprender las amenazas de seguridad comunes de la capa de transporte, por ejemplo Man-in-the-Middle.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para proporcionar servicio HTTPS, incluidos SNI y HSTS.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para autenticar a los usuarios que usan certificados.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para proporcionar el engrapado OCSP.&lt;br /&gt;
* Usar OpenSSL para pruebas de servidor y cliente SSL / TLS.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Autoridades de certificación intermedias&lt;br /&gt;
* Configuración de cifrado (sin conocimiento específico de cifrado)&lt;br /&gt;
* httpd.conf&lt;br /&gt;
* mod_ssl&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.3 Sistemas de archivos encriptados (peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben ser capaces de configurar y configurar sistemas de archivos encriptados.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los dispositivo de bloque y el cifrado del sistema de archivos.&lt;br /&gt;
* Usar dm-crypt con LUKS para encriptar dispositivos de bloque.&lt;br /&gt;
* Usar eCryptfs para cifrar sistemas de archivos, incluidos directorios personales e integración de PAM.&lt;br /&gt;
* Conocer y tener en cuenta dm-crypt simple y EncFS.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* cryptsetup&lt;br /&gt;
* cryptmount&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
* ecryptfsd&lt;br /&gt;
* comandos ecryptfs-* &lt;br /&gt;
* mount.ecryptfs, umount.ecryptfs&lt;br /&gt;
* pam_ecryptfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.4 DNS y criptografía (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener experiencia y conocimiento de la criptografía en el contexto del DNS y su implementación utilizando BIND. La versión de BIND cubierta es 9.7 o superior.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprensión de DNSSEC y DANE.&lt;br /&gt;
* Configure y solucione problemas BIND con un servidor de nombres autorizado que sirve zonas seguras de DNSSEC.&lt;br /&gt;
* Configure BIND con un servidor de nombres recursivo que realiza la validación de DNSSEC en nombre de sus clientes.&lt;br /&gt;
* Key Signing Key, Zone Signing Key, Key Tag&lt;br /&gt;
* Generación de claves, almacenamiento de claves, gestión de claves y renovación de claves&lt;br /&gt;
* Mantenimiento y nueva firma de zonas&lt;br /&gt;
* Usar DANE para publicar información del certificado X.509 en DNS.&lt;br /&gt;
* Usar TSIG para una comunicación segura con BIND.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* DNS, EDNS, Zones, Resource Records&lt;br /&gt;
* DNS resource records: DS, DNSKEY, RRSIG, NSEC, NSEC3, NSEC3PARAM, TLSA&lt;br /&gt;
* DO-Bit, AD-Bit&lt;br /&gt;
* TSIG&lt;br /&gt;
* named.conf&lt;br /&gt;
* dnssec-keygen&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
* dnssec-settime&lt;br /&gt;
* dnssec-dsfromkey&lt;br /&gt;
* rndc&lt;br /&gt;
* dig&lt;br /&gt;
* delv&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 326: Seguridad del host&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.1 Hardening del host (peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben poder proteger las computadoras que ejecutan Linux contra amenazas comunes. Esto incluye kernel y configuración de software.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configurar la seguridad del BIOS y del gestor de arranque (GRUB 2).&lt;br /&gt;
* Deshabilitar software y servicios inútiles.&lt;br /&gt;
* Use sysctl para la configuración del kernel relacionada con la seguridad, particularmente ASLR, Exec-Shield y la configuración de IP / ICMP.&lt;br /&gt;
* Limitar el uso de recursos.&lt;br /&gt;
* Trabajar con entornos chroot.&lt;br /&gt;
* Eliminar capacidades innecesarias.&lt;br /&gt;
* Tenga en cuenta las ventajas de seguridad de la virtualización.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* grub.cfg&lt;br /&gt;
* chkconfig, systemctl&lt;br /&gt;
* ulimit&lt;br /&gt;
* /etc/security/limits.conf&lt;br /&gt;
* pam_limits.so&lt;br /&gt;
* chroot&lt;br /&gt;
* sysctl&lt;br /&gt;
* /etc/sysctl.conf&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.2 Detecion de Intrusos en Host (peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben estar familiarizados con el uso y la configuración del software común de detección de intrusión de host. Esto incluye actualizaciones y mantenimiento, así como escaneos de host automatizados.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Usar y configurar el sistema de auditoría de Linux.&lt;br /&gt;
* Utiliza chkrootkit.&lt;br /&gt;
* Utiliza y configura rkhunter, incluidas las actualizaciones.&lt;br /&gt;
* Use Linux Malware Detect.&lt;br /&gt;
* Automatice las exploraciones de host usando cron.&lt;br /&gt;
* Configure y use AIDE, incluida la administración de reglas.&lt;br /&gt;
* Tenga en cuenta OpenSCAP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* auditd&lt;br /&gt;
* auditctl&lt;br /&gt;
* ausearch, aureport&lt;br /&gt;
* auditd.conf&lt;br /&gt;
* audit.rules&lt;br /&gt;
* pam_tty_audit.so&lt;br /&gt;
* chkrootkit&lt;br /&gt;
* rkhunter&lt;br /&gt;
* /etc/rkhunter.conf&lt;br /&gt;
* maldet&lt;br /&gt;
* conf.maldet&lt;br /&gt;
* aide&lt;br /&gt;
* /etc/aide/aide.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.3 Gestión y autenticación de usuarios (peso: 5) &amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben estar familiarizados con la gestión y la autenticación de cuentas de usuario. Esto incluye la configuración y el uso de NSS, PAM, SSSD y Kerberos para los directorios locales y remotos y los mecanismos de autenticación, así como la aplicación de una política de contraseñas.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender y configurar NSS.&lt;br /&gt;
* Comprender y configurar PAM.&lt;br /&gt;
* Aplicar políticas de complejidad de contraseña y cambios de contraseña periódicos.&lt;br /&gt;
* Bloquee cuentas automáticamente después de intentos fallidos de inicio de sesión.&lt;br /&gt;
* Configurar y usar SSSD.&lt;br /&gt;
* Configure NSS y PAM para usar con SSSD.&lt;br /&gt;
* Configure la autenticación SSSD contra Active Directory, IPA, LDAP, Kerberos y dominios locales.&lt;br /&gt;
* Obtenga y administre tickets de Kerberos.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* /etc/login.defs&lt;br /&gt;
* pam_cracklib.so&lt;br /&gt;
* chage&lt;br /&gt;
* pam_tally.so, pam_tally2.so&lt;br /&gt;
* faillog&lt;br /&gt;
* pam_sss.so&lt;br /&gt;
* sssd&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.4  Instalación de FreeIPA e integración de Samba (peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben estar familiarizados con FreeIPA v4.x. Esto incluye la instalación y el mantenimiento de una instancia de servidor con un dominio FreeIPA, así como la integración de FreeIPA con Active Directory.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender FreeIPA, incluida su arquitectura y componentes.&lt;br /&gt;
* Comprender los requisitos previos del sistema y la configuración para instalar FreeIPA.&lt;br /&gt;
* Instalar y administrar un servidor y dominio FreeIPA.&lt;br /&gt;
* Comprender y configurar la replicación de Active Directory y los cross-realm trusts de Kerberos.&lt;br /&gt;
* Tenga en cuenta la integración de sudo, autofs, SSH y SELinux en FreeIPA.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* 389 Directory Server, MIT Kerberos, Dogtag Certificate System, NTP, DNS, SSSD, certmonger&lt;br /&gt;
* ipa, including relevant subcommands&lt;br /&gt;
* ipa-server-install, ipa-client-install, ipa-replica-install&lt;br /&gt;
* ipa-replica-prepare, ipa-replica-manage&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 327: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.1 Control de acceso discrecional (peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben comprender el Control de acceso discrecional y saber cómo implementarlo usando las Listas de control de acceso. Además, los candidatos deben comprender y saber cómo utilizar atributos extendidos.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender y administrar la propiedad y los permisos del archivo, incluidos SUID y SGID.&lt;br /&gt;
* Comprender y administrar las listas de control de acceso.&lt;br /&gt;
* Entender y administrar atributos extendidos y clases de atributos.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.2 Control de acceso obligatorio (MAC) (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben estar familiarizados con los sistemas de control de acceso obligatorio para Linux. Específicamente, los candidatos deben tener un conocimiento profundo de SELinux. Además, los candidatos deben conocer otros sistemas de control de acceso obligatorio para Linux. Esto incluye las principales características de estos sistemas, pero no la configuración y el uso.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los conceptos de TE, RBAC, MAC y DAC.&lt;br /&gt;
* Configurar, administrar y usar SELinux.&lt;br /&gt;
* Conocer de AppArmor y Smack.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* getenforce, setenforce, selinuxenabled&lt;br /&gt;
* getsebool, setsebool, togglesebool&lt;br /&gt;
* fixfiles, restorecon, setfiles&lt;br /&gt;
* newrole, runcon&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus, seinfo&lt;br /&gt;
* apol&lt;br /&gt;
* seaudit, seaudit-report, audit2why, audit2allow&lt;br /&gt;
* /etc/selinux/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.3 Sistemas de archivos de red (peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener experiencia y conocimiento de los problemas de seguridad en el uso y la configuración de los clientes y servidores NFSv4, así como los servicios del cliente CIFS. Las versiones anteriores de NFS no estan dentro del conocimiento requerido.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender los problemas y las mejoras de seguridad de NFSv4.&lt;br /&gt;
* Configurar el servidor y los clientes de NFSv4.&lt;br /&gt;
* Comprender y configurar los mecanismos de autenticación de NFSv4 (LIPKEY, SPKM, Kerberos).&lt;br /&gt;
* Comprender y usar el sistema de pseudoarchivo NFSv4.&lt;br /&gt;
* Comprender y usar NFSv4 ACL.&lt;br /&gt;
* Configurar clientes CIFS.&lt;br /&gt;
* Comprender y usar extensiones CIFS Unix.&lt;br /&gt;
* Comprender y configurar los modos de seguridad CIFS (NTLM, Kerberos).&lt;br /&gt;
* Comprender y gestionar la asignación y el manejo de CIFS ACL y SID en un sistema Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* /etc/exports &lt;br /&gt;
* /etc/idmap.conf&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* parámetros mount.cifs relacionados con los permisos y los modos de seguridad* winbind&lt;br /&gt;
* getcifsacl, setcifsacl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 328: Seguridad de red&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.1  Hardening de Red(peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben poder proteger las redes contra amenazas comunes. Esto incluye la verificación de la efectividad de las medidas de seguridad.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure FreeRADIUS para autenticar los nodos de la red.&lt;br /&gt;
* Use nmap para escanear redes y hosts, incluidos diferentes métodos de escaneo.&lt;br /&gt;
* Use Wireshark para analizar el tráfico de la red, incluidos los filtros y las estadísticas.&lt;br /&gt;
* Identificar y tratar con anuncios de enrutadores maliciosos y mensajes DHCP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* radiusd&lt;br /&gt;
* radmin&lt;br /&gt;
* radtest, radclient&lt;br /&gt;
* radlast, radwho&lt;br /&gt;
* radiusd.conf&lt;br /&gt;
* /etc/raddb/*&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* ndpmon&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.2 Detección de intrusión de red (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben estar familiarizados con el uso y la configuración de la exploración de seguridad de red, el monitoreo de red y el software de detección de intrusos de red. Esto incluye la actualización y el mantenimiento de los escáneres de seguridad.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Implementar monitoreo de uso de ancho de banda.&lt;br /&gt;
* Configure y use Snort, incluida la administración de reglas.&lt;br /&gt;
* Configure y use OpenVAS, incluido NASL.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* Cacti&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/*&lt;br /&gt;
* openvas-adduser, openvas-rmuser&lt;br /&gt;
* openvas-nvt-sync&lt;br /&gt;
* openvassd&lt;br /&gt;
* openvas-mkcert&lt;br /&gt;
* /etc/openvas/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.3 Filtrado de paquetes (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben estar familiarizados con el uso y la configuración de los filtros de paquetes. Esto incluye netfilter, iptables e ip6tables, así como el conocimiento básico de nftables, nft y ebtables.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender las arquitecturas de firewall comunes, incluida DMZ.&lt;br /&gt;
* Comprender y usar netfilter, iptables e ip6tables, incluidos los módulos estándar, pruebas y objetivos.&lt;br /&gt;
* Implementar el filtrado de paquetes para IPv4 e IPv6.&lt;br /&gt;
* Implementar el seguimiento de la conexión y la traducción de direcciones de red.&lt;br /&gt;
* Definir conjuntos de IP y usarlos en las reglas de netfilter.&lt;br /&gt;
* Tener conocimientos básicos de nftables y nft.&lt;br /&gt;
* Tener conocimientos básicos de ebtables.&lt;br /&gt;
* Conocer conntrackd.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* ip6tables&lt;br /&gt;
* iptables-save, iptables-restore &lt;br /&gt;
* ip6tables-save, ip6tables-restore &lt;br /&gt;
* ipset&lt;br /&gt;
* nft&lt;br /&gt;
* ebtables&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.4 Redes privadas virtuales (peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |  Los candidatos deben estar familiarizados con el uso de OpenVPN e IPsec.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure y maneje el servidor OpenVPN y los clientes para las redes VPN enrutadas y puente.&lt;br /&gt;
* Configure y maneje el servidor IPsec y los clientes para las redes VPN enrutadas usando IPsec-Tools / racoon.&lt;br /&gt;
* Conocimientos sobre L2TP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/*&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
* setkey&lt;br /&gt;
* /etc/ipsec-tools.conf&lt;br /&gt;
* /etc/racoon/racoon.conf&lt;br /&gt;
&lt;br /&gt;
==Other Comments for consideration==&lt;br /&gt;
&lt;br /&gt;
As examples, following items are not in the current objectives:&lt;br /&gt;
&lt;br /&gt;
1) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Wireless LAN:&amp;lt;/b&amp;gt; (Note: It’s not only for Linux though, it is necessary to consider because there are many points to be taken care for configuration in terms of security measure.)&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Some aspects (i.e. Radius) are implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
2) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to IPv6:&amp;lt;/b&amp;gt; Not only IPv4, but also IPv6 should be considered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 wherever applicable (fth)&lt;br /&gt;
&lt;br /&gt;
3) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Security features in Linux:&amp;lt;/b&amp;gt; For example, ASLR and Exec-Shield (ASCII Armor) should be considered, because it causes security level lower if those are disabled.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in host hardening in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
4) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Forensics:&amp;lt;/b&amp;gt; In the survey of malware’s behavior, Sleuth Kit would be used to analyze the hard disk on Linux machine. Also in some cases, LVM commands would be used to restore the disk which became un-mountable. So that this area should be learned.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interesting topic, but it goes beyond basic security in the sense it &amp;quot;prevention and defending&amp;quot;. This is postmortal analysis. As the exam already contains a lot of topic this is postponed but up to discussion (fth)&lt;br /&gt;
&lt;br /&gt;
5) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Database (RDB, NoSQL) security:&amp;lt;/b&amp;gt; Because Application Security (bind, apache, etc.) is covered now, this item would be nice to cover. And this item is listed in the CIF, security contest almost every time. Also the counter-measure in server side is necessary.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As the other software / service aspects beyond Linux system security have been dropped this is considered out of scope for now too (fth)&lt;br /&gt;
&lt;br /&gt;
6) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to OpenFlow:&amp;lt;/b&amp;gt; There are several points to be considered in terms of security measure about the configuration of OpenFlow.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is considered as an application aspect which seems to be beyond the scope for not (fth).&lt;br /&gt;
&lt;br /&gt;
7) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;RADIUS:&amp;lt;/b&amp;gt; This was covered in 301 though, this is not covered now. This should be covered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
8) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;DNS:&amp;lt;/b&amp;gt; More DNSSEC and DANE.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
9) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Secure development, hardening&amp;lt;/b&amp;gt;&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hardening has been implemented for both hosts and networks in V2 (fth), Secure development is considered out of scope for now (fth)&lt;br /&gt;
&lt;br /&gt;
10) Certificate Transparency&lt;br /&gt;
&lt;br /&gt;
==Changes since version 1==&lt;br /&gt;
&lt;br /&gt;
===321.3===&lt;br /&gt;
The following aspects have been removed from objective 321.3 User Management and Authentication:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Kerberos Key Distribution Centre&lt;br /&gt;
* Kerberos Principals&lt;br /&gt;
* Kerberos Tickets&lt;br /&gt;
* password cracking  &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* krb5kdc/kdc.conf&lt;br /&gt;
* kdb5_util&lt;br /&gt;
* rb5kdc/kadm5.acl&lt;br /&gt;
* kadmin, kadmin.local&lt;br /&gt;
* john&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to key servers. Managing multiple private keys and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Use GPG for encryption and signing.&lt;br /&gt;
* Configure GPG.&lt;br /&gt;
* Manage private and public keys.&lt;br /&gt;
* Interact with GPG key servers to publish and retrieve public keys. &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.6 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure and use OpenSSH.&lt;br /&gt;
* Manage OpenSSH keys and access control.&lt;br /&gt;
* Be aware of SSH protocol v1 and v2 security issues.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&lt;br /&gt;
* /etc/ssh/*&lt;br /&gt;
* ~/.ssh/*&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=SpanishTranslationNotes&amp;diff=4326</id>
		<title>SpanishTranslationNotes</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=SpanishTranslationNotes&amp;diff=4326"/>
		<updated>2017-12-10T23:42:34Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Using OmegaT for Group Translations==&lt;br /&gt;
&lt;br /&gt;
First be sure to read the [[Translation_Instructions]].&lt;br /&gt;
&lt;br /&gt;
==Managing Translation Memories==&lt;br /&gt;
&lt;br /&gt;
Read this post: [[http://www.proz.com/forum/omegat_support/146666-importing_a_translation_memory_into_omegat.html#1226038]]&lt;br /&gt;
&lt;br /&gt;
We need to decide on how to share translations.&lt;br /&gt;
&lt;br /&gt;
Possibilities:&lt;br /&gt;
* share them as project_save_name.tmx and share them (con: one person will have to do a final translation with everyone&#039;s translation memories)&lt;br /&gt;
* have a master and pass it around as a token (con: no parallel translations)&lt;br /&gt;
* other ideas? (let&#039;s keep it simple, though)&lt;br /&gt;
&lt;br /&gt;
==Common Terms==&lt;br /&gt;
&lt;br /&gt;
===Current Glossary===&lt;br /&gt;
&lt;br /&gt;
The current glossary in Spanish is available in [[Media:Glossary-es.pdf|PDF]] and [[Media:Glossary-es.jpg|JPG]] formats.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, the wiki doesn&#039;t allow for upload of OOo or other editable formats.&lt;br /&gt;
&lt;br /&gt;
===Words agreed===&lt;br /&gt;
&lt;br /&gt;
 Note: By using OmegaT and sharing translation memories, technical terms should naturally stabilise (or cause a dialect war ;)).&lt;br /&gt;
&lt;br /&gt;
Meanwhile, while the OmegaT/TM &amp;quot;standard&amp;quot; is happening, here is a jargon list:&lt;br /&gt;
&lt;br /&gt;
Mark in bold words that should go in the exam glossary.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please indicate which version you use (es_ES, es_AR, es_CL, ...)&lt;br /&gt;
{|border=&amp;quot;1&amp;quot;&lt;br /&gt;
|+ Proposed spanish terms&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;English&#039;&#039;&#039; &lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &#039;&#039;&#039;Spanish&#039;&#039;&#039;, agreed&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;es_ES&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &#039;&#039;&#039;es_MX&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;es_CO&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &#039;&#039;&#039;es_AR&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| file&lt;br /&gt;
| archivo&lt;br /&gt;
| fichero. Nota, archivo tb. se entiende&lt;br /&gt;
| &lt;br /&gt;
| archivo&lt;br /&gt;
| archivo&lt;br /&gt;
|-&lt;br /&gt;
| file system&lt;br /&gt;
| sistema de archivos&lt;br /&gt;
| sistema de ficheros&lt;br /&gt;
| &lt;br /&gt;
| sistemas de archivos&lt;br /&gt;
| sistemas de archivos&lt;br /&gt;
|-&lt;br /&gt;
| script&lt;br /&gt;
| script&lt;br /&gt;
| script, guión&lt;br /&gt;
| &lt;br /&gt;
| archivo de órdenes, programa simple&lt;br /&gt;
| script&lt;br /&gt;
|-&lt;br /&gt;
| remove,delete&lt;br /&gt;
| borrar&lt;br /&gt;
| eliminar, borrar&lt;br /&gt;
| eliminar&lt;br /&gt;
| borrar, remover&lt;br /&gt;
| borrar, eliminar&lt;br /&gt;
|-&lt;br /&gt;
| linker&lt;br /&gt;
| enlazador&lt;br /&gt;
| linker&lt;br /&gt;
|&lt;br /&gt;
| enlazador&lt;br /&gt;
| linker&lt;br /&gt;
|-&lt;br /&gt;
| library&lt;br /&gt;
| librería&lt;br /&gt;
| librería&lt;br /&gt;
|&lt;br /&gt;
| biblioteca, libreria&lt;br /&gt;
| biblioteca, libreria&lt;br /&gt;
|-&lt;br /&gt;
| stdin&lt;br /&gt;
| entrada estándar&lt;br /&gt;
| entrada estándar&lt;br /&gt;
|&lt;br /&gt;
| entrada estándar&lt;br /&gt;
| entrada estándar&lt;br /&gt;
|-&lt;br /&gt;
| stdout&lt;br /&gt;
| salida estándar&lt;br /&gt;
| salida estándar&lt;br /&gt;
|&lt;br /&gt;
| salida estándar&lt;br /&gt;
| salida estándar&lt;br /&gt;
|-&lt;br /&gt;
| stderr&lt;br /&gt;
| error estándar&lt;br /&gt;
| error estándar&lt;br /&gt;
|&lt;br /&gt;
| error estándar&lt;br /&gt;
| error estándar&lt;br /&gt;
|-&lt;br /&gt;
| environment variable&lt;br /&gt;
| Variable de entorno&lt;br /&gt;
| Variable de entorno&lt;br /&gt;
|&lt;br /&gt;
| Variable de ambiente&lt;br /&gt;
| Variable de entorno, Variable de ambiente&lt;br /&gt;
|-&lt;br /&gt;
| boot loader&lt;br /&gt;
| gestor de arranque&lt;br /&gt;
| gestor de arranque&lt;br /&gt;
|&lt;br /&gt;
| gestor de arranque, cargador de arranque&lt;br /&gt;
| gestor de arranque&lt;br /&gt;
|-&lt;br /&gt;
| image file&lt;br /&gt;
| archivo de imagen&lt;br /&gt;
| fichero de imagen&lt;br /&gt;
|&lt;br /&gt;
| archivo de imagen, fichero de imagen&lt;br /&gt;
| archivo de imagen&lt;br /&gt;
|-&lt;br /&gt;
| utility&lt;br /&gt;
| utilidad&lt;br /&gt;
| utilidad, programa&lt;br /&gt;
|&lt;br /&gt;
| utilidad&lt;br /&gt;
| utilidad, programa&lt;br /&gt;
|-&lt;br /&gt;
| /, root directory&lt;br /&gt;
| directorio raíz,&lt;br /&gt;
| en el caso del usuario &#039;root&#039; sería administrador&lt;br /&gt;
| Raíz y cuenta usuario administrador&lt;br /&gt;
| Raíz, en el caso del usuario &#039;root&#039; sería cuenta usuario administrador tb se entiende root&lt;br /&gt;
| Raíz, directorio Raiz&lt;br /&gt;
|-&lt;br /&gt;
| root user&lt;br /&gt;
| usuario raíz,&lt;br /&gt;
| en el caso del usuario &#039;root&#039; sería administrador&lt;br /&gt;
| Raíz, cuenta usuario administrador&lt;br /&gt;
| Raíz, en el caso del usuario &#039;root&#039; sería cuenta usuario administrador tb se entiende root&lt;br /&gt;
| en el caso del usuario &#039;root&#039; seria super usuario, usuario administrador, tb se entiende root&lt;br /&gt;
|-&lt;br /&gt;
| edit files&lt;br /&gt;
| editar archivos&lt;br /&gt;
| editar ficheros, modificar ficheros&lt;br /&gt;
|&lt;br /&gt;
| editar archivos&lt;br /&gt;
| modificar archivos, modificar ficheros&lt;br /&gt;
|-&lt;br /&gt;
| network locations&lt;br /&gt;
| localización de red&lt;br /&gt;
| localización de red&lt;br /&gt;
|&lt;br /&gt;
| localización, ubicación de red&lt;br /&gt;
| ubicaciones de red&lt;br /&gt;
|-&lt;br /&gt;
| PATH&lt;br /&gt;
| ruta&lt;br /&gt;
| camino (en España no se utiliza), ruta &lt;br /&gt;
|&lt;br /&gt;
| ruta, paso&lt;br /&gt;
| ruta, path (tambien se usa termino en Ingles)&lt;br /&gt;
|-&lt;br /&gt;
| hard link&lt;br /&gt;
| enlace fuerte&lt;br /&gt;
| enlace duro (en España no se utiliza)&lt;br /&gt;
|&lt;br /&gt;
| vínculo, enlace fuerte&lt;br /&gt;
| Enlace duro tb hard link(la gente de sistemas lo usa asi)&lt;br /&gt;
|-&lt;br /&gt;
| symbolic link&lt;br /&gt;
| enlace simbólico&lt;br /&gt;
| enlace simbólico (en España sin embargo sí se utiliza... ¿?)&lt;br /&gt;
|&lt;br /&gt;
| enlace simbólico&lt;br /&gt;
| link simbólico&lt;br /&gt;
|-&lt;br /&gt;
| kernel&lt;br /&gt;
| núcleo&lt;br /&gt;
| núcleo, aunque en España se utiliza de forma común kernel.&lt;br /&gt;
|&lt;br /&gt;
| Parte importante de un sistema operativo, núcleo del mismo&lt;br /&gt;
| kernel, núcleo&lt;br /&gt;
|-&lt;br /&gt;
| Window manager&lt;br /&gt;
| Gestor de ventanas&lt;br /&gt;
| Gestor de ventanas&lt;br /&gt;
|&lt;br /&gt;
| Gestor de ventanas&lt;br /&gt;
| Gestor de ventanas&lt;br /&gt;
|-&lt;br /&gt;
| X Display Manager&lt;br /&gt;
| Administrador de Pantalla (X Display Manager)&lt;br /&gt;
| Gestor de Visualización X, aunque nadie lo utiliza, yo pondría X Display Manager. Administrador de pantalla.&lt;br /&gt;
|&lt;br /&gt;
| Gestor de pantalla&lt;br /&gt;
| Administrador de Pantalla&lt;br /&gt;
|-&lt;br /&gt;
| log&lt;br /&gt;
| Registro de eventos&lt;br /&gt;
| log, registro&lt;br /&gt;
| bitácora&lt;br /&gt;
| Registro de eventos&lt;br /&gt;
| log/registro/evento&lt;br /&gt;
|-&lt;br /&gt;
| log priority&lt;br /&gt;
| prioridad de registro&lt;br /&gt;
| prioridad de registro&lt;br /&gt;
| prioridad de bitácora&lt;br /&gt;
| prioridad de eventos&lt;br /&gt;
| prioridad de eventos/registros/log&lt;br /&gt;
|-&lt;br /&gt;
| log facility&lt;br /&gt;
| canal de registro, tipo de registro&lt;br /&gt;
|&lt;br /&gt;
| canal/tipo de registro/bitácora&lt;br /&gt;
| Eventos mensajes de registro de syslog&lt;br /&gt;
| Eventos del sistema de registro/log&lt;br /&gt;
|-&lt;br /&gt;
| network address&lt;br /&gt;
| dirección de red&lt;br /&gt;
| dirección de red&lt;br /&gt;
| dirección de red&lt;br /&gt;
| dirección de red&lt;br /&gt;
| dirección de red&lt;br /&gt;
|-&lt;br /&gt;
| interface&lt;br /&gt;
| interfaz&lt;br /&gt;
| interfaz&lt;br /&gt;
|&lt;br /&gt;
| interface&lt;br /&gt;
| interface,interfaz&lt;br /&gt;
|-&lt;br /&gt;
| connectionless&lt;br /&gt;
| No orientado a conexión&lt;br /&gt;
| No orientado a conexión&lt;br /&gt;
|&lt;br /&gt;
| conexión perdida, sin conexión&lt;br /&gt;
| No orientado a la conexión&lt;br /&gt;
|-&lt;br /&gt;
| scheduling system&lt;br /&gt;
| sistema de planificación&lt;br /&gt;
| sistema de planificación&lt;br /&gt;
|&lt;br /&gt;
| Planificación de sistema&lt;br /&gt;
| Planificador/Planificación de sistema&lt;br /&gt;
|-&lt;br /&gt;
| dynamic linker&lt;br /&gt;
| enlazador dinámico&lt;br /&gt;
| En España se utiliza linker dinámico, pero tiene sentido enlazador dinámico.&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| Enlazador dinamico tb dynamic linker(la gente de sistemas lo usa asi)&lt;br /&gt;
|-&lt;br /&gt;
| to add&lt;br /&gt;
| añadir&lt;br /&gt;
| añadir (raramente se utiliza agregar aunque se entiende)&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| agregar,añadir&lt;br /&gt;
|-&lt;br /&gt;
| legacy&lt;br /&gt;
| legacy&lt;br /&gt;
| Se suele utilizar legacy en España...&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| legacy&lt;br /&gt;
|-&lt;br /&gt;
| keys&lt;br /&gt;
| clave&lt;br /&gt;
| clave, llave no se suele utilizar&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| llave&lt;br /&gt;
|-&lt;br /&gt;
| crypt&lt;br /&gt;
| cifrar&lt;br /&gt;
| cifrar (encriptar se utiliza pero está mal dicho)&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| cifrar (tambien encriptar pero esta mal dicho)&lt;br /&gt;
|-&lt;br /&gt;
| locale configuration&lt;br /&gt;
| configuración regional&lt;br /&gt;
| configuración regional (a veces configuración local aunque probablemente sea más correcto regional)&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| configuración regional,local&lt;br /&gt;
|-&lt;br /&gt;
| gateway&lt;br /&gt;
| puerta de enlace&lt;br /&gt;
| puerta de enlace&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| puerta de enlace&lt;br /&gt;
|-&lt;br /&gt;
| default&lt;br /&gt;
| por defecto&lt;br /&gt;
| por defecto (se entiende tb. predeterminada)&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| predeterminada, tb.default,por defecto&lt;br /&gt;
|-&lt;br /&gt;
| password&lt;br /&gt;
| clave&lt;br /&gt;
| clave, contraseña&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| contraseña, clave&lt;br /&gt;
|-&lt;br /&gt;
| newline&lt;br /&gt;
| salto de línea&lt;br /&gt;
| salto de línea&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| salto de línea&lt;br /&gt;
|-&lt;br /&gt;
| carriage return&lt;br /&gt;
| retorno de carro&lt;br /&gt;
| retorno de carro&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| retorno de carro&lt;br /&gt;
|-&lt;br /&gt;
| runlevel&lt;br /&gt;
| runlevel&lt;br /&gt;
| nivel de ejecución&lt;br /&gt;
| &lt;br /&gt;
| nivel de inicio, nivel de arranque, runlevel&lt;br /&gt;
|-&lt;br /&gt;
| daemon&lt;br /&gt;
| demonio&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| demonio, daemon tambien&lt;br /&gt;
|-&lt;br /&gt;
| login shell&lt;br /&gt;
| intérprete de comandos&lt;br /&gt;
| intérprete de comandos&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| intérprete de ordenes, interprete de inicio, shell de inicio, intréprete de comandos&lt;br /&gt;
|-&lt;br /&gt;
| background&lt;br /&gt;
| segundo plano&lt;br /&gt;
| segundo plano&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| segundo plano&lt;br /&gt;
|-&lt;br /&gt;
| sub-shell/s&lt;br /&gt;
| sub-shell&lt;br /&gt;
| sub-shell&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| sub-shell/s&lt;br /&gt;
|-&lt;br /&gt;
| buffer&lt;br /&gt;
| buffer&lt;br /&gt;
| Tb. buffer&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| buffer&lt;br /&gt;
|-&lt;br /&gt;
| Swap&lt;br /&gt;
| Área de intercambio&lt;br /&gt;
| Área de intercambio&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| Área de intercambio&lt;br /&gt;
|-&lt;br /&gt;
| Paging&lt;br /&gt;
| Paginación&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| Paginación&lt;br /&gt;
|-&lt;br /&gt;
| login&lt;br /&gt;
| firmarse/iniciar sesión&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Inode&lt;br /&gt;
| Inodo&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| Inodo&lt;br /&gt;
|-&lt;br /&gt;
| Archiving format&lt;br /&gt;
| &lt;br /&gt;
| Formato de empaquetado&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| Empaquetado&lt;br /&gt;
|-&lt;br /&gt;
| kernel source tree&lt;br /&gt;
| codigo fuente del núcleo&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| codigo fuente del núcleo&lt;br /&gt;
|-&lt;br /&gt;
| firewall&lt;br /&gt;
|&lt;br /&gt;
| cortafuegos&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|servidor de seguridad, firewall&lt;br /&gt;
|-&lt;br /&gt;
|volume group&lt;br /&gt;
|grupo de volúmenes&lt;br /&gt;
|grupo de volúmenes&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|grupo de volumenes&lt;br /&gt;
|-&lt;br /&gt;
|physical volume&lt;br /&gt;
|volumen físico&lt;br /&gt;
|volumen físico&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|volumen fisico&lt;br /&gt;
|-&lt;br /&gt;
|router&lt;br /&gt;
|enrutador&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|enrutador,ruta&lt;br /&gt;
|-&lt;br /&gt;
|stack fingerprinting&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|network for forensics&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|kernel buffer ring&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| anillo de buffer del nucelo&lt;br /&gt;
|-&lt;br /&gt;
| make target&lt;br /&gt;
| &lt;br /&gt;
| objetivo de make&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| patch&lt;br /&gt;
| &lt;br /&gt;
| parche&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| home directory&lt;br /&gt;
| &lt;br /&gt;
| directorio home (no se suele traducir)&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| initramfs&lt;br /&gt;
| &lt;br /&gt;
| initramfs (no se suele traducir)&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| boot time&lt;br /&gt;
| &lt;br /&gt;
| tiempo de arranque (boot time), o inicio de sistema (boot time), creo que es más claro incluir el término sin traducir tb. entre paréntesis&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| single user mode&lt;br /&gt;
| &lt;br /&gt;
| modo monousuario, aunque le añadiría entre paréntesis el término en inglés (single user mode)&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| shared library&lt;br /&gt;
| &lt;br /&gt;
| librería dinámica&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| routed&lt;br /&gt;
| &lt;br /&gt;
| enlutada&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| bridge&lt;br /&gt;
| &lt;br /&gt;
| Puente&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| hardening&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| backup&lt;br /&gt;
| &lt;br /&gt;
| copia de respaldo, copia de seguridad&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Spanish conventions===&lt;br /&gt;
&lt;br /&gt;
This could go into policy. But I think this is just a discussion point.&lt;br /&gt;
&lt;br /&gt;
* Usage of the first person, verbal time, ..., so that the exam looks consistent. See the different translations of could -&amp;gt; podría, podía, puede... Mi opinión es utilizar el presente siempre. Si utiliza, si hace, si borra, cuando crea, ...&lt;br /&gt;
&lt;br /&gt;
* Uso de Usted. En España suena muy, muy raro, intentemos usar tercera persona, o impersonal. Usted borra-&amp;gt; Se borra.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Uso de artículos determinados para los boot loaders, el arranque &#039;&#039;&#039;de&#039;&#039;&#039; lilo vs el arranque &#039;&#039;&#039;del&#039;&#039;&#039; lilo&lt;br /&gt;
&lt;br /&gt;
* Uo de artículos determinados para &#039;&#039;&#039;la shell&#039;&#039;&#039;, &#039;&#039;&#039;la bash&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=SpanishTranslationNotes&amp;diff=4325</id>
		<title>SpanishTranslationNotes</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=SpanishTranslationNotes&amp;diff=4325"/>
		<updated>2017-12-10T23:34:49Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Using OmegaT for Group Translations==&lt;br /&gt;
&lt;br /&gt;
First be sure to read the [[Translation_Instructions]].&lt;br /&gt;
&lt;br /&gt;
==Managing Translation Memories==&lt;br /&gt;
&lt;br /&gt;
Read this post: [[http://www.proz.com/forum/omegat_support/146666-importing_a_translation_memory_into_omegat.html#1226038]]&lt;br /&gt;
&lt;br /&gt;
We need to decide on how to share translations.&lt;br /&gt;
&lt;br /&gt;
Possibilities:&lt;br /&gt;
* share them as project_save_name.tmx and share them (con: one person will have to do a final translation with everyone&#039;s translation memories)&lt;br /&gt;
* have a master and pass it around as a token (con: no parallel translations)&lt;br /&gt;
* other ideas? (let&#039;s keep it simple, though)&lt;br /&gt;
&lt;br /&gt;
==Common Terms==&lt;br /&gt;
&lt;br /&gt;
===Current Glossary===&lt;br /&gt;
&lt;br /&gt;
The current glossary in Spanish is available in [[Media:Glossary-es.pdf|PDF]] and [[Media:Glossary-es.jpg|JPG]] formats.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, the wiki doesn&#039;t allow for upload of OOo or other editable formats.&lt;br /&gt;
&lt;br /&gt;
===Words agreed===&lt;br /&gt;
&lt;br /&gt;
 Note: By using OmegaT and sharing translation memories, technical terms should naturally stabilise (or cause a dialect war ;)).&lt;br /&gt;
&lt;br /&gt;
Meanwhile, while the OmegaT/TM &amp;quot;standard&amp;quot; is happening, here is a jargon list:&lt;br /&gt;
&lt;br /&gt;
Mark in bold words that should go in the exam glossary.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please indicate which version you use (es_ES, es_AR, es_CL, ...)&lt;br /&gt;
{|border=&amp;quot;1&amp;quot;&lt;br /&gt;
|+ Proposed spanish terms&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;English&#039;&#039;&#039; &lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &#039;&#039;&#039;Spanish&#039;&#039;&#039;, agreed&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;es_ES&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &#039;&#039;&#039;es_MX&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;es_CO&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &#039;&#039;&#039;es_AR&#039;&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| file&lt;br /&gt;
| archivo&lt;br /&gt;
| fichero. Nota, archivo tb. se entiende&lt;br /&gt;
| &lt;br /&gt;
| archivo&lt;br /&gt;
| archivo&lt;br /&gt;
|-&lt;br /&gt;
| file system&lt;br /&gt;
| sistema de archivos&lt;br /&gt;
| sistema de ficheros&lt;br /&gt;
| &lt;br /&gt;
| sistemas de archivos&lt;br /&gt;
| sistemas de archivos&lt;br /&gt;
|-&lt;br /&gt;
| script&lt;br /&gt;
| script&lt;br /&gt;
| script, guión&lt;br /&gt;
| &lt;br /&gt;
| archivo de órdenes, programa simple&lt;br /&gt;
| script&lt;br /&gt;
|-&lt;br /&gt;
| remove,delete&lt;br /&gt;
| borrar&lt;br /&gt;
| eliminar, borrar&lt;br /&gt;
| eliminar&lt;br /&gt;
| borrar, remover&lt;br /&gt;
| borrar, eliminar&lt;br /&gt;
|-&lt;br /&gt;
| linker&lt;br /&gt;
| enlazador&lt;br /&gt;
| linker&lt;br /&gt;
|&lt;br /&gt;
| enlazador&lt;br /&gt;
| linker&lt;br /&gt;
|-&lt;br /&gt;
| library&lt;br /&gt;
| librería&lt;br /&gt;
| librería&lt;br /&gt;
|&lt;br /&gt;
| biblioteca, libreria&lt;br /&gt;
| biblioteca, libreria&lt;br /&gt;
|-&lt;br /&gt;
| stdin&lt;br /&gt;
| entrada estándar&lt;br /&gt;
| entrada estándar&lt;br /&gt;
|&lt;br /&gt;
| entrada estándar&lt;br /&gt;
| entrada estándar&lt;br /&gt;
|-&lt;br /&gt;
| stdout&lt;br /&gt;
| salida estándar&lt;br /&gt;
| salida estándar&lt;br /&gt;
|&lt;br /&gt;
| salida estándar&lt;br /&gt;
| salida estándar&lt;br /&gt;
|-&lt;br /&gt;
| stderr&lt;br /&gt;
| error estándar&lt;br /&gt;
| error estándar&lt;br /&gt;
|&lt;br /&gt;
| error estándar&lt;br /&gt;
| error estándar&lt;br /&gt;
|-&lt;br /&gt;
| environment variable&lt;br /&gt;
| Variable de entorno&lt;br /&gt;
| Variable de entorno&lt;br /&gt;
|&lt;br /&gt;
| Variable de ambiente&lt;br /&gt;
| Variable de entorno, Variable de ambiente&lt;br /&gt;
|-&lt;br /&gt;
| boot loader&lt;br /&gt;
| gestor de arranque&lt;br /&gt;
| gestor de arranque&lt;br /&gt;
|&lt;br /&gt;
| gestor de arranque, cargador de arranque&lt;br /&gt;
| gestor de arranque&lt;br /&gt;
|-&lt;br /&gt;
| image file&lt;br /&gt;
| archivo de imagen&lt;br /&gt;
| fichero de imagen&lt;br /&gt;
|&lt;br /&gt;
| archivo de imagen, fichero de imagen&lt;br /&gt;
| archivo de imagen&lt;br /&gt;
|-&lt;br /&gt;
| utility&lt;br /&gt;
| utilidad&lt;br /&gt;
| utilidad, programa&lt;br /&gt;
|&lt;br /&gt;
| utilidad&lt;br /&gt;
| utilidad, programa&lt;br /&gt;
|-&lt;br /&gt;
| /, root directory&lt;br /&gt;
| directorio raíz,&lt;br /&gt;
| en el caso del usuario &#039;root&#039; sería administrador&lt;br /&gt;
| Raíz y cuenta usuario administrador&lt;br /&gt;
| Raíz, en el caso del usuario &#039;root&#039; sería cuenta usuario administrador tb se entiende root&lt;br /&gt;
| Raíz, directorio Raiz&lt;br /&gt;
|-&lt;br /&gt;
| root user&lt;br /&gt;
| usuario raíz,&lt;br /&gt;
| en el caso del usuario &#039;root&#039; sería administrador&lt;br /&gt;
| Raíz, cuenta usuario administrador&lt;br /&gt;
| Raíz, en el caso del usuario &#039;root&#039; sería cuenta usuario administrador tb se entiende root&lt;br /&gt;
| en el caso del usuario &#039;root&#039; seria super usuario, usuario administrador, tb se entiende root&lt;br /&gt;
|-&lt;br /&gt;
| edit files&lt;br /&gt;
| editar archivos&lt;br /&gt;
| editar ficheros, modificar ficheros&lt;br /&gt;
|&lt;br /&gt;
| editar archivos&lt;br /&gt;
| modificar archivos, modificar ficheros&lt;br /&gt;
|-&lt;br /&gt;
| network locations&lt;br /&gt;
| localización de red&lt;br /&gt;
| localización de red&lt;br /&gt;
|&lt;br /&gt;
| localización, ubicación de red&lt;br /&gt;
| ubicaciones de red&lt;br /&gt;
|-&lt;br /&gt;
| PATH&lt;br /&gt;
| ruta&lt;br /&gt;
| camino (en España no se utiliza), ruta &lt;br /&gt;
|&lt;br /&gt;
| ruta, paso&lt;br /&gt;
| ruta, path (tambien se usa termino en Ingles)&lt;br /&gt;
|-&lt;br /&gt;
| hard link&lt;br /&gt;
| enlace fuerte&lt;br /&gt;
| enlace duro (en España no se utiliza)&lt;br /&gt;
|&lt;br /&gt;
| vínculo, enlace fuerte&lt;br /&gt;
| Enlace duro tb hard link(la gente de sistemas lo usa asi)&lt;br /&gt;
|-&lt;br /&gt;
| symbolic link&lt;br /&gt;
| enlace simbólico&lt;br /&gt;
| enlace simbólico (en España sin embargo sí se utiliza... ¿?)&lt;br /&gt;
|&lt;br /&gt;
| enlace simbólico&lt;br /&gt;
| link simbólico&lt;br /&gt;
|-&lt;br /&gt;
| kernel&lt;br /&gt;
| núcleo&lt;br /&gt;
| núcleo, aunque en España se utiliza de forma común kernel.&lt;br /&gt;
|&lt;br /&gt;
| Parte importante de un sistema operativo, núcleo del mismo&lt;br /&gt;
| kernel, núcleo&lt;br /&gt;
|-&lt;br /&gt;
| Window manager&lt;br /&gt;
| Gestor de ventanas&lt;br /&gt;
| Gestor de ventanas&lt;br /&gt;
|&lt;br /&gt;
| Gestor de ventanas&lt;br /&gt;
| Gestor de ventanas&lt;br /&gt;
|-&lt;br /&gt;
| X Display Manager&lt;br /&gt;
| Administrador de Pantalla (X Display Manager)&lt;br /&gt;
| Gestor de Visualización X, aunque nadie lo utiliza, yo pondría X Display Manager. Administrador de pantalla.&lt;br /&gt;
|&lt;br /&gt;
| Gestor de pantalla&lt;br /&gt;
| Administrador de Pantalla&lt;br /&gt;
|-&lt;br /&gt;
| log&lt;br /&gt;
| Registro de eventos&lt;br /&gt;
| log, registro&lt;br /&gt;
| bitácora&lt;br /&gt;
| Registro de eventos&lt;br /&gt;
| log/registro/evento&lt;br /&gt;
|-&lt;br /&gt;
| log priority&lt;br /&gt;
| prioridad de registro&lt;br /&gt;
| prioridad de registro&lt;br /&gt;
| prioridad de bitácora&lt;br /&gt;
| prioridad de eventos&lt;br /&gt;
| prioridad de eventos/registros/log&lt;br /&gt;
|-&lt;br /&gt;
| log facility&lt;br /&gt;
| canal de registro, tipo de registro&lt;br /&gt;
|&lt;br /&gt;
| canal/tipo de registro/bitácora&lt;br /&gt;
| Eventos mensajes de registro de syslog&lt;br /&gt;
| Eventos del sistema de registro/log&lt;br /&gt;
|-&lt;br /&gt;
| network address&lt;br /&gt;
| dirección de red&lt;br /&gt;
| dirección de red&lt;br /&gt;
| dirección de red&lt;br /&gt;
| dirección de red&lt;br /&gt;
| dirección de red&lt;br /&gt;
|-&lt;br /&gt;
| interface&lt;br /&gt;
| interfaz&lt;br /&gt;
| interfaz&lt;br /&gt;
|&lt;br /&gt;
| interface&lt;br /&gt;
| interface,interfaz&lt;br /&gt;
|-&lt;br /&gt;
| connectionless&lt;br /&gt;
| No orientado a conexión&lt;br /&gt;
| No orientado a conexión&lt;br /&gt;
|&lt;br /&gt;
| conexión perdida, sin conexión&lt;br /&gt;
| No orientado a la conexión&lt;br /&gt;
|-&lt;br /&gt;
| scheduling system&lt;br /&gt;
| sistema de planificación&lt;br /&gt;
| sistema de planificación&lt;br /&gt;
|&lt;br /&gt;
| Planificación de sistema&lt;br /&gt;
| Planificador/Planificación de sistema&lt;br /&gt;
|-&lt;br /&gt;
| dynamic linker&lt;br /&gt;
| enlazador dinámico&lt;br /&gt;
| En España se utiliza linker dinámico, pero tiene sentido enlazador dinámico.&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| Enlazador dinamico tb dynamic linker(la gente de sistemas lo usa asi)&lt;br /&gt;
|-&lt;br /&gt;
| to add&lt;br /&gt;
| añadir&lt;br /&gt;
| añadir (raramente se utiliza agregar aunque se entiende)&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| agregar,añadir&lt;br /&gt;
|-&lt;br /&gt;
| legacy&lt;br /&gt;
| legacy&lt;br /&gt;
| Se suele utilizar legacy en España...&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| legacy&lt;br /&gt;
|-&lt;br /&gt;
| keys&lt;br /&gt;
| clave&lt;br /&gt;
| clave, llave no se suele utilizar&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| llave&lt;br /&gt;
|-&lt;br /&gt;
| crypt&lt;br /&gt;
| cifrar&lt;br /&gt;
| cifrar (encriptar se utiliza pero está mal dicho)&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| cifrar (tambien encriptar pero esta mal dicho)&lt;br /&gt;
|-&lt;br /&gt;
| locale configuration&lt;br /&gt;
| configuración regional&lt;br /&gt;
| configuración regional (a veces configuración local aunque probablemente sea más correcto regional)&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| configuración regional,local&lt;br /&gt;
|-&lt;br /&gt;
| gateway&lt;br /&gt;
| puerta de enlace&lt;br /&gt;
| puerta de enlace&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| puerta de enlace&lt;br /&gt;
|-&lt;br /&gt;
| default&lt;br /&gt;
| por defecto&lt;br /&gt;
| por defecto (se entiende tb. predeterminada)&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| predeterminada, tb.default,por defecto&lt;br /&gt;
|-&lt;br /&gt;
| password&lt;br /&gt;
| clave&lt;br /&gt;
| clave, contraseña&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| contraseña, clave&lt;br /&gt;
|-&lt;br /&gt;
| newline&lt;br /&gt;
| salto de línea&lt;br /&gt;
| salto de línea&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| salto de línea&lt;br /&gt;
|-&lt;br /&gt;
| carriage return&lt;br /&gt;
| retorno de carro&lt;br /&gt;
| retorno de carro&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
| retorno de carro&lt;br /&gt;
|-&lt;br /&gt;
| runlevel&lt;br /&gt;
| runlevel&lt;br /&gt;
| nivel de ejecución&lt;br /&gt;
| &lt;br /&gt;
| nivel de inicio, nivel de arranque, runlevel&lt;br /&gt;
|-&lt;br /&gt;
| daemon&lt;br /&gt;
| demonio&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| demonio, daemon tambien&lt;br /&gt;
|-&lt;br /&gt;
| login shell&lt;br /&gt;
| intérprete de comandos&lt;br /&gt;
| intérprete de comandos&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| intérprete de ordenes, interprete de inicio, shell de inicio, intréprete de comandos&lt;br /&gt;
|-&lt;br /&gt;
| background&lt;br /&gt;
| segundo plano&lt;br /&gt;
| segundo plano&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| segundo plano&lt;br /&gt;
|-&lt;br /&gt;
| sub-shell/s&lt;br /&gt;
| sub-shell&lt;br /&gt;
| sub-shell&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| sub-shell/s&lt;br /&gt;
|-&lt;br /&gt;
| buffer&lt;br /&gt;
| buffer&lt;br /&gt;
| Tb. buffer&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| buffer&lt;br /&gt;
|-&lt;br /&gt;
| Swap&lt;br /&gt;
| Área de intercambio&lt;br /&gt;
| Área de intercambio&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| Área de intercambio&lt;br /&gt;
|-&lt;br /&gt;
| Paging&lt;br /&gt;
| Paginación&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| Paginación&lt;br /&gt;
|-&lt;br /&gt;
| login&lt;br /&gt;
| firmarse/iniciar sesión&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| Inode&lt;br /&gt;
| Inodo&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
| Inodo&lt;br /&gt;
|-&lt;br /&gt;
| Archiving format&lt;br /&gt;
| &lt;br /&gt;
| Formato de empaquetado&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| Empaquetado&lt;br /&gt;
|-&lt;br /&gt;
| kernel source tree&lt;br /&gt;
| codigo fuente del núcleo&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| codigo fuente del núcleo&lt;br /&gt;
|-&lt;br /&gt;
| firewall&lt;br /&gt;
|&lt;br /&gt;
| cortafuegos&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|servidor de seguridad, firewall&lt;br /&gt;
|-&lt;br /&gt;
|volume group&lt;br /&gt;
|grupo de volúmenes&lt;br /&gt;
|grupo de volúmenes&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|grupo de volumenes&lt;br /&gt;
|-&lt;br /&gt;
|physical volume&lt;br /&gt;
|volumen físico&lt;br /&gt;
|volumen físico&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|volumen fisico&lt;br /&gt;
|-&lt;br /&gt;
|router&lt;br /&gt;
|enrutador&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|enrutador,ruta&lt;br /&gt;
|-&lt;br /&gt;
|stack fingerprinting&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|network for forensics&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|kernel buffer ring&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| anillo de buffer del nucelo&lt;br /&gt;
|-&lt;br /&gt;
| make target&lt;br /&gt;
| &lt;br /&gt;
| objetivo de make&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| patch&lt;br /&gt;
| &lt;br /&gt;
| parche&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| home directory&lt;br /&gt;
| &lt;br /&gt;
| directorio home (no se suele traducir)&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| initramfs&lt;br /&gt;
| &lt;br /&gt;
| initramfs (no se suele traducir)&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| boot time&lt;br /&gt;
| &lt;br /&gt;
| tiempo de arranque (boot time), o inicio de sistema (boot time), creo que es más claro incluir el término sin traducir tb. entre paréntesis&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| single user mode&lt;br /&gt;
| &lt;br /&gt;
| modo monousuario, aunque le añadiría entre paréntesis el término en inglés (single user mode)&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| shared library&lt;br /&gt;
| &lt;br /&gt;
| librería dinámica&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| hardening&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| backup&lt;br /&gt;
| &lt;br /&gt;
| copia de respaldo, copia de seguridad&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Spanish conventions===&lt;br /&gt;
&lt;br /&gt;
This could go into policy. But I think this is just a discussion point.&lt;br /&gt;
&lt;br /&gt;
* Usage of the first person, verbal time, ..., so that the exam looks consistent. See the different translations of could -&amp;gt; podría, podía, puede... Mi opinión es utilizar el presente siempre. Si utiliza, si hace, si borra, cuando crea, ...&lt;br /&gt;
&lt;br /&gt;
* Uso de Usted. En España suena muy, muy raro, intentemos usar tercera persona, o impersonal. Usted borra-&amp;gt; Se borra.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Uso de artículos determinados para los boot loaders, el arranque &#039;&#039;&#039;de&#039;&#039;&#039; lilo vs el arranque &#039;&#039;&#039;del&#039;&#039;&#039; lilo&lt;br /&gt;
&lt;br /&gt;
* Uo de artículos determinados para &#039;&#039;&#039;la shell&#039;&#039;&#039;, &#039;&#039;&#039;la bash&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4324</id>
		<title>LPIC-303(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4324"/>
		<updated>2017-12-10T23:28:37Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* Topic 327: Access Control */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
La descripción del programa completo [[LPIC-3]] figura en la lista [[LPIC-3 | aquí]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos son los objetivos  de la versión 2.0.0.&lt;br /&gt;
La versión [[LPIC-303 Objetivos V1 | 1.x objetivos]] se puede encontrar [[LPIC-303 Objetivos V1 | aquí]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traducciones de objetivos ==&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
* [[LPIC-303|Ingles]]&lt;br /&gt;
* [[LPIC-303(ES)|Español]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
===&#039;&#039;Topic 325: Criptografía&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.1 X.509 Certificados e Infraestructuras de Clave Pública (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben comprender los certificados X.509 y las infraestructuras de clave pública. Deben saber cómo configurar y usar OpenSSL para implementar las autoridades de certificación y emitir certificados SSL para diversos fines.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los certificados X.509, el ciclo de vida del certificado X.509, los campos del certificado X.509 y las extensiones de certificado X.509v3.&lt;br /&gt;
* Comprender las cadenas de confianza y las infraestructuras de clave pública.&lt;br /&gt;
* Generar y administrar claves públicas y privadas.&lt;br /&gt;
* Crear, operar y asegurar una autoridad de certificación.&lt;br /&gt;
* Solicitar, firmar y administrar certificados de servidor y cliente.&lt;br /&gt;
* Revocar certificados y autoridades de certificación.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* openssl, incluidos los subcomandos pertinentes&lt;br /&gt;
* Configuración de OpenSSL&lt;br /&gt;
* PEM, DER, PKCS&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL&lt;br /&gt;
* OCSP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt; Certificados para encriptación, firma y autenticación (peso: 4) 325.2 X.509&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber cómo usar certificados X.509 para autenticación de servidor y cliente. Los candidatos deben ser capaces de implementar la autenticación de usuario y servidor para Apache HTTPD. La versión de Apache HTTPD cubierta es 2.4 o superior.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender las versiones de los protocolos SSL y TLS.&lt;br /&gt;
* Comprender las amenazas de seguridad comunes de la capa de transporte, por ejemplo Man-in-the-Middle.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para proporcionar servicio HTTPS, incluidos SNI y HSTS.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para autenticar a los usuarios que usan certificados.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para proporcionar el engrapado OCSP.&lt;br /&gt;
* Usar OpenSSL para pruebas de servidor y cliente SSL / TLS.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Autoridades de certificación intermedias&lt;br /&gt;
* Configuración de cifrado (sin conocimiento específico de cifrado)&lt;br /&gt;
* httpd.conf&lt;br /&gt;
* mod_ssl&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.3 Sistemas de archivos encriptados (peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben ser capaces de configurar y configurar sistemas de archivos encriptados.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los dispositivo de bloque y el cifrado del sistema de archivos.&lt;br /&gt;
* Usar dm-crypt con LUKS para encriptar dispositivos de bloque.&lt;br /&gt;
* Usar eCryptfs para cifrar sistemas de archivos, incluidos directorios personales e integración de PAM.&lt;br /&gt;
* Conocer y tener en cuenta dm-crypt simple y EncFS.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* cryptsetup&lt;br /&gt;
* cryptmount&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
* ecryptfsd&lt;br /&gt;
* comandos ecryptfs-* &lt;br /&gt;
* mount.ecryptfs, umount.ecryptfs&lt;br /&gt;
* pam_ecryptfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.4 DNS y criptografía (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener experiencia y conocimiento de la criptografía en el contexto del DNS y su implementación utilizando BIND. La versión de BIND cubierta es 9.7 o superior.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprensión de DNSSEC y DANE.&lt;br /&gt;
* Configure y solucione problemas BIND con un servidor de nombres autorizado que sirve zonas seguras de DNSSEC.&lt;br /&gt;
* Configure BIND con un servidor de nombres recursivo que realiza la validación de DNSSEC en nombre de sus clientes.&lt;br /&gt;
* Key Signing Key, Zone Signing Key, Key Tag&lt;br /&gt;
* Generación de claves, almacenamiento de claves, gestión de claves y renovación de claves&lt;br /&gt;
* Mantenimiento y nueva firma de zonas&lt;br /&gt;
* Usar DANE para publicar información del certificado X.509 en DNS.&lt;br /&gt;
* Usar TSIG para una comunicación segura con BIND.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* DNS, EDNS, Zones, Resource Records&lt;br /&gt;
* DNS resource records: DS, DNSKEY, RRSIG, NSEC, NSEC3, NSEC3PARAM, TLSA&lt;br /&gt;
* DO-Bit, AD-Bit&lt;br /&gt;
* TSIG&lt;br /&gt;
* named.conf&lt;br /&gt;
* dnssec-keygen&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
* dnssec-settime&lt;br /&gt;
* dnssec-dsfromkey&lt;br /&gt;
* rndc&lt;br /&gt;
* dig&lt;br /&gt;
* delv&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 326: Seguridad del host&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.1 Hardening del host (peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben poder proteger las computadoras que ejecutan Linux contra amenazas comunes. Esto incluye kernel y configuración de software.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configurar la seguridad del BIOS y del gestor de arranque (GRUB 2).&lt;br /&gt;
* Deshabilitar software y servicios inútiles.&lt;br /&gt;
* Use sysctl para la configuración del kernel relacionada con la seguridad, particularmente ASLR, Exec-Shield y la configuración de IP / ICMP.&lt;br /&gt;
* Limitar el uso de recursos.&lt;br /&gt;
* Trabajar con entornos chroot.&lt;br /&gt;
* Eliminar capacidades innecesarias.&lt;br /&gt;
* Tenga en cuenta las ventajas de seguridad de la virtualización.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* grub.cfg&lt;br /&gt;
* chkconfig, systemctl&lt;br /&gt;
* ulimit&lt;br /&gt;
* /etc/security/limits.conf&lt;br /&gt;
* pam_limits.so&lt;br /&gt;
* chroot&lt;br /&gt;
* sysctl&lt;br /&gt;
* /etc/sysctl.conf&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.2 Detecion de Intrusos en Host (peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben estar familiarizados con el uso y la configuración del software común de detección de intrusión de host. Esto incluye actualizaciones y mantenimiento, así como escaneos de host automatizados.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Usar y configurar el sistema de auditoría de Linux.&lt;br /&gt;
* Utiliza chkrootkit.&lt;br /&gt;
* Utiliza y configura rkhunter, incluidas las actualizaciones.&lt;br /&gt;
* Use Linux Malware Detect.&lt;br /&gt;
* Automatice las exploraciones de host usando cron.&lt;br /&gt;
* Configure y use AIDE, incluida la administración de reglas.&lt;br /&gt;
* Tenga en cuenta OpenSCAP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* auditd&lt;br /&gt;
* auditctl&lt;br /&gt;
* ausearch, aureport&lt;br /&gt;
* auditd.conf&lt;br /&gt;
* audit.rules&lt;br /&gt;
* pam_tty_audit.so&lt;br /&gt;
* chkrootkit&lt;br /&gt;
* rkhunter&lt;br /&gt;
* /etc/rkhunter.conf&lt;br /&gt;
* maldet&lt;br /&gt;
* conf.maldet&lt;br /&gt;
* aide&lt;br /&gt;
* /etc/aide/aide.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.3 Gestión y autenticación de usuarios (peso: 5) &amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben estar familiarizados con la gestión y la autenticación de cuentas de usuario. Esto incluye la configuración y el uso de NSS, PAM, SSSD y Kerberos para los directorios locales y remotos y los mecanismos de autenticación, así como la aplicación de una política de contraseñas.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender y configurar NSS.&lt;br /&gt;
* Comprender y configurar PAM.&lt;br /&gt;
* Aplicar políticas de complejidad de contraseña y cambios de contraseña periódicos.&lt;br /&gt;
* Bloquee cuentas automáticamente después de intentos fallidos de inicio de sesión.&lt;br /&gt;
* Configurar y usar SSSD.&lt;br /&gt;
* Configure NSS y PAM para usar con SSSD.&lt;br /&gt;
* Configure la autenticación SSSD contra Active Directory, IPA, LDAP, Kerberos y dominios locales.&lt;br /&gt;
* Obtenga y administre tickets de Kerberos.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* /etc/login.defs&lt;br /&gt;
* pam_cracklib.so&lt;br /&gt;
* chage&lt;br /&gt;
* pam_tally.so, pam_tally2.so&lt;br /&gt;
* faillog&lt;br /&gt;
* pam_sss.so&lt;br /&gt;
* sssd&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.4  Instalación de FreeIPA e integración de Samba (peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben estar familiarizados con FreeIPA v4.x. Esto incluye la instalación y el mantenimiento de una instancia de servidor con un dominio FreeIPA, así como la integración de FreeIPA con Active Directory.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender FreeIPA, incluida su arquitectura y componentes.&lt;br /&gt;
* Comprender los requisitos previos del sistema y la configuración para instalar FreeIPA.&lt;br /&gt;
* Instalar y administrar un servidor y dominio FreeIPA.&lt;br /&gt;
* Comprender y configurar la replicación de Active Directory y los cross-realm trusts de Kerberos.&lt;br /&gt;
* Tenga en cuenta la integración de sudo, autofs, SSH y SELinux en FreeIPA.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* 389 Directory Server, MIT Kerberos, Dogtag Certificate System, NTP, DNS, SSSD, certmonger&lt;br /&gt;
* ipa, including relevant subcommands&lt;br /&gt;
* ipa-server-install, ipa-client-install, ipa-replica-install&lt;br /&gt;
* ipa-replica-prepare, ipa-replica-manage&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 327: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.1 Control de acceso discrecional (peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben comprender el Control de acceso discrecional y saber cómo implementarlo usando las Listas de control de acceso. Además, los candidatos deben comprender y saber cómo utilizar atributos extendidos.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender y administrar la propiedad y los permisos del archivo, incluidos SUID y SGID.&lt;br /&gt;
* Comprender y administrar las listas de control de acceso.&lt;br /&gt;
* Entender y administrar atributos extendidos y clases de atributos.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.2 Control de acceso obligatorio (MAC) (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben estar familiarizados con los sistemas de control de acceso obligatorio para Linux. Específicamente, los candidatos deben tener un conocimiento profundo de SELinux. Además, los candidatos deben conocer otros sistemas de control de acceso obligatorio para Linux. Esto incluye las principales características de estos sistemas, pero no la configuración y el uso.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los conceptos de TE, RBAC, MAC y DAC.&lt;br /&gt;
* Configurar, administrar y usar SELinux.&lt;br /&gt;
* Conocer de AppArmor y Smack.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* getenforce, setenforce, selinuxenabled&lt;br /&gt;
* getsebool, setsebool, togglesebool&lt;br /&gt;
* fixfiles, restorecon, setfiles&lt;br /&gt;
* newrole, runcon&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus, seinfo&lt;br /&gt;
* apol&lt;br /&gt;
* seaudit, seaudit-report, audit2why, audit2allow&lt;br /&gt;
* /etc/selinux/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.3 Sistemas de archivos de red (peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener experiencia y conocimiento de los problemas de seguridad en el uso y la configuración de los clientes y servidores NFSv4, así como los servicios del cliente CIFS. Las versiones anteriores de NFS no estan dentro del conocimiento requerido.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender los problemas y las mejoras de seguridad de NFSv4.&lt;br /&gt;
* Configurar el servidor y los clientes de NFSv4.&lt;br /&gt;
* Comprender y configurar los mecanismos de autenticación de NFSv4 (LIPKEY, SPKM, Kerberos).&lt;br /&gt;
* Comprender y usar el sistema de pseudoarchivo NFSv4.&lt;br /&gt;
* Comprender y usar NFSv4 ACL.&lt;br /&gt;
* Configurar clientes CIFS.&lt;br /&gt;
* Comprender y usar extensiones CIFS Unix.&lt;br /&gt;
* Comprender y configurar los modos de seguridad CIFS (NTLM, Kerberos).&lt;br /&gt;
* Comprender y gestionar la asignación y el manejo de CIFS ACL y SID en un sistema Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* /etc/exports &lt;br /&gt;
* /etc/idmap.conf&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* parámetros mount.cifs relacionados con los permisos y los modos de seguridad* winbind&lt;br /&gt;
* getcifsacl, setcifsacl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 328: Network Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.1 Network Hardening (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure networks against common threats. This includes verification of the effectiveness of security measures.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure FreeRADIUS to authenticate network nodes.&lt;br /&gt;
* Use nmap to scan networks and hosts, including different scan methods.&lt;br /&gt;
* Use Wireshark to analyze network traffic, including filters and statistics.&lt;br /&gt;
* Identify and deal with rogue router advertisements and DHCP messages.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* radiusd&lt;br /&gt;
* radmin&lt;br /&gt;
* radtest, radclient&lt;br /&gt;
* radlast, radwho&lt;br /&gt;
* radiusd.conf&lt;br /&gt;
* /etc/raddb/*&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* ndpmon&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.2 Network Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Implement bandwidth usage monitoring.&lt;br /&gt;
* Configure and use Snort, including rule management.&lt;br /&gt;
* Configure and use OpenVAS, including NASL.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* Cacti&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/*&lt;br /&gt;
* openvas-adduser, openvas-rmuser&lt;br /&gt;
* openvas-nvt-sync&lt;br /&gt;
* openvassd&lt;br /&gt;
* openvas-mkcert&lt;br /&gt;
* /etc/openvas/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.3 Packet Filtering (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of packet filters. This includes netfilter, iptables and ip6tables as well as basic knowledge of nftables, nft and ebtables.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand common firewall architectures, including DMZ.&lt;br /&gt;
* Understand and use netfilter, iptables and ip6tables, including standard modules, tests and targets.&lt;br /&gt;
* Implement packet filtering for both IPv4 and IPv6.&lt;br /&gt;
* Implement connection tracking and network address translation.&lt;br /&gt;
* Define IP sets and use them in netfilter rules.&lt;br /&gt;
* Have basic knowledge of nftables and nft.&lt;br /&gt;
* Have basic knowledge of ebtables.&lt;br /&gt;
* Be aware of conntrackd.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* ip6tables&lt;br /&gt;
* iptables-save, iptables-restore &lt;br /&gt;
* ip6tables-save, ip6tables-restore &lt;br /&gt;
* ipset&lt;br /&gt;
* nft&lt;br /&gt;
* ebtables&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.4 Virtual Private Networks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of OpenVPN and IPsec.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure and operate OpenVPN server and clients for both bridged and routed VPN networks.&lt;br /&gt;
* Configure and operate IPsec server and clients for routed VPN networks using IPsec-Tools / racoon.&lt;br /&gt;
* Awareness of L2TP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/*&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
* setkey&lt;br /&gt;
* /etc/ipsec-tools.conf&lt;br /&gt;
* /etc/racoon/racoon.conf&lt;br /&gt;
&lt;br /&gt;
==Other Comments for consideration==&lt;br /&gt;
&lt;br /&gt;
As examples, following items are not in the current objectives:&lt;br /&gt;
&lt;br /&gt;
1) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Wireless LAN:&amp;lt;/b&amp;gt; (Note: It’s not only for Linux though, it is necessary to consider because there are many points to be taken care for configuration in terms of security measure.)&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Some aspects (i.e. Radius) are implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
2) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to IPv6:&amp;lt;/b&amp;gt; Not only IPv4, but also IPv6 should be considered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 wherever applicable (fth)&lt;br /&gt;
&lt;br /&gt;
3) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Security features in Linux:&amp;lt;/b&amp;gt; For example, ASLR and Exec-Shield (ASCII Armor) should be considered, because it causes security level lower if those are disabled.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in host hardening in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
4) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Forensics:&amp;lt;/b&amp;gt; In the survey of malware’s behavior, Sleuth Kit would be used to analyze the hard disk on Linux machine. Also in some cases, LVM commands would be used to restore the disk which became un-mountable. So that this area should be learned.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interesting topic, but it goes beyond basic security in the sense it &amp;quot;prevention and defending&amp;quot;. This is postmortal analysis. As the exam already contains a lot of topic this is postponed but up to discussion (fth)&lt;br /&gt;
&lt;br /&gt;
5) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Database (RDB, NoSQL) security:&amp;lt;/b&amp;gt; Because Application Security (bind, apache, etc.) is covered now, this item would be nice to cover. And this item is listed in the CIF, security contest almost every time. Also the counter-measure in server side is necessary.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As the other software / service aspects beyond Linux system security have been dropped this is considered out of scope for now too (fth)&lt;br /&gt;
&lt;br /&gt;
6) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to OpenFlow:&amp;lt;/b&amp;gt; There are several points to be considered in terms of security measure about the configuration of OpenFlow.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is considered as an application aspect which seems to be beyond the scope for not (fth).&lt;br /&gt;
&lt;br /&gt;
7) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;RADIUS:&amp;lt;/b&amp;gt; This was covered in 301 though, this is not covered now. This should be covered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
8) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;DNS:&amp;lt;/b&amp;gt; More DNSSEC and DANE.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
9) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Secure development, hardening&amp;lt;/b&amp;gt;&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hardening has been implemented for both hosts and networks in V2 (fth), Secure development is considered out of scope for now (fth)&lt;br /&gt;
&lt;br /&gt;
10) Certificate Transparency&lt;br /&gt;
&lt;br /&gt;
==Changes since version 1==&lt;br /&gt;
&lt;br /&gt;
===321.3===&lt;br /&gt;
The following aspects have been removed from objective 321.3 User Management and Authentication:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Kerberos Key Distribution Centre&lt;br /&gt;
* Kerberos Principals&lt;br /&gt;
* Kerberos Tickets&lt;br /&gt;
* password cracking  &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* krb5kdc/kdc.conf&lt;br /&gt;
* kdb5_util&lt;br /&gt;
* rb5kdc/kadm5.acl&lt;br /&gt;
* kadmin, kadmin.local&lt;br /&gt;
* john&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to key servers. Managing multiple private keys and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Use GPG for encryption and signing.&lt;br /&gt;
* Configure GPG.&lt;br /&gt;
* Manage private and public keys.&lt;br /&gt;
* Interact with GPG key servers to publish and retrieve public keys. &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.6 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure and use OpenSSH.&lt;br /&gt;
* Manage OpenSSH keys and access control.&lt;br /&gt;
* Be aware of SSH protocol v1 and v2 security issues.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&lt;br /&gt;
* /etc/ssh/*&lt;br /&gt;
* ~/.ssh/*&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4323</id>
		<title>LPIC-303(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4323"/>
		<updated>2017-12-10T23:13:46Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* Topic 326: Host Security */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
La descripción del programa completo [[LPIC-3]] figura en la lista [[LPIC-3 | aquí]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos son los objetivos  de la versión 2.0.0.&lt;br /&gt;
La versión [[LPIC-303 Objetivos V1 | 1.x objetivos]] se puede encontrar [[LPIC-303 Objetivos V1 | aquí]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traducciones de objetivos ==&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
* [[LPIC-303|Ingles]]&lt;br /&gt;
* [[LPIC-303(ES)|Español]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
===&#039;&#039;Topic 325: Criptografía&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.1 X.509 Certificados e Infraestructuras de Clave Pública (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben comprender los certificados X.509 y las infraestructuras de clave pública. Deben saber cómo configurar y usar OpenSSL para implementar las autoridades de certificación y emitir certificados SSL para diversos fines.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los certificados X.509, el ciclo de vida del certificado X.509, los campos del certificado X.509 y las extensiones de certificado X.509v3.&lt;br /&gt;
* Comprender las cadenas de confianza y las infraestructuras de clave pública.&lt;br /&gt;
* Generar y administrar claves públicas y privadas.&lt;br /&gt;
* Crear, operar y asegurar una autoridad de certificación.&lt;br /&gt;
* Solicitar, firmar y administrar certificados de servidor y cliente.&lt;br /&gt;
* Revocar certificados y autoridades de certificación.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* openssl, incluidos los subcomandos pertinentes&lt;br /&gt;
* Configuración de OpenSSL&lt;br /&gt;
* PEM, DER, PKCS&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL&lt;br /&gt;
* OCSP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt; Certificados para encriptación, firma y autenticación (peso: 4) 325.2 X.509&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber cómo usar certificados X.509 para autenticación de servidor y cliente. Los candidatos deben ser capaces de implementar la autenticación de usuario y servidor para Apache HTTPD. La versión de Apache HTTPD cubierta es 2.4 o superior.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender las versiones de los protocolos SSL y TLS.&lt;br /&gt;
* Comprender las amenazas de seguridad comunes de la capa de transporte, por ejemplo Man-in-the-Middle.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para proporcionar servicio HTTPS, incluidos SNI y HSTS.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para autenticar a los usuarios que usan certificados.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para proporcionar el engrapado OCSP.&lt;br /&gt;
* Usar OpenSSL para pruebas de servidor y cliente SSL / TLS.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Autoridades de certificación intermedias&lt;br /&gt;
* Configuración de cifrado (sin conocimiento específico de cifrado)&lt;br /&gt;
* httpd.conf&lt;br /&gt;
* mod_ssl&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.3 Sistemas de archivos encriptados (peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben ser capaces de configurar y configurar sistemas de archivos encriptados.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los dispositivo de bloque y el cifrado del sistema de archivos.&lt;br /&gt;
* Usar dm-crypt con LUKS para encriptar dispositivos de bloque.&lt;br /&gt;
* Usar eCryptfs para cifrar sistemas de archivos, incluidos directorios personales e integración de PAM.&lt;br /&gt;
* Conocer y tener en cuenta dm-crypt simple y EncFS.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* cryptsetup&lt;br /&gt;
* cryptmount&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
* ecryptfsd&lt;br /&gt;
* comandos ecryptfs-* &lt;br /&gt;
* mount.ecryptfs, umount.ecryptfs&lt;br /&gt;
* pam_ecryptfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.4 DNS y criptografía (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener experiencia y conocimiento de la criptografía en el contexto del DNS y su implementación utilizando BIND. La versión de BIND cubierta es 9.7 o superior.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprensión de DNSSEC y DANE.&lt;br /&gt;
* Configure y solucione problemas BIND con un servidor de nombres autorizado que sirve zonas seguras de DNSSEC.&lt;br /&gt;
* Configure BIND con un servidor de nombres recursivo que realiza la validación de DNSSEC en nombre de sus clientes.&lt;br /&gt;
* Key Signing Key, Zone Signing Key, Key Tag&lt;br /&gt;
* Generación de claves, almacenamiento de claves, gestión de claves y renovación de claves&lt;br /&gt;
* Mantenimiento y nueva firma de zonas&lt;br /&gt;
* Usar DANE para publicar información del certificado X.509 en DNS.&lt;br /&gt;
* Usar TSIG para una comunicación segura con BIND.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* DNS, EDNS, Zones, Resource Records&lt;br /&gt;
* DNS resource records: DS, DNSKEY, RRSIG, NSEC, NSEC3, NSEC3PARAM, TLSA&lt;br /&gt;
* DO-Bit, AD-Bit&lt;br /&gt;
* TSIG&lt;br /&gt;
* named.conf&lt;br /&gt;
* dnssec-keygen&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
* dnssec-settime&lt;br /&gt;
* dnssec-dsfromkey&lt;br /&gt;
* rndc&lt;br /&gt;
* dig&lt;br /&gt;
* delv&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 326: Seguridad del host&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.1 Hardening del host (peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben poder proteger las computadoras que ejecutan Linux contra amenazas comunes. Esto incluye kernel y configuración de software.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configurar la seguridad del BIOS y del gestor de arranque (GRUB 2).&lt;br /&gt;
* Deshabilitar software y servicios inútiles.&lt;br /&gt;
* Use sysctl para la configuración del kernel relacionada con la seguridad, particularmente ASLR, Exec-Shield y la configuración de IP / ICMP.&lt;br /&gt;
* Limitar el uso de recursos.&lt;br /&gt;
* Trabajar con entornos chroot.&lt;br /&gt;
* Eliminar capacidades innecesarias.&lt;br /&gt;
* Tenga en cuenta las ventajas de seguridad de la virtualización.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* grub.cfg&lt;br /&gt;
* chkconfig, systemctl&lt;br /&gt;
* ulimit&lt;br /&gt;
* /etc/security/limits.conf&lt;br /&gt;
* pam_limits.so&lt;br /&gt;
* chroot&lt;br /&gt;
* sysctl&lt;br /&gt;
* /etc/sysctl.conf&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.2 Detecion de Intrusos en Host (peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben estar familiarizados con el uso y la configuración del software común de detección de intrusión de host. Esto incluye actualizaciones y mantenimiento, así como escaneos de host automatizados.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Usar y configurar el sistema de auditoría de Linux.&lt;br /&gt;
* Utiliza chkrootkit.&lt;br /&gt;
* Utiliza y configura rkhunter, incluidas las actualizaciones.&lt;br /&gt;
* Use Linux Malware Detect.&lt;br /&gt;
* Automatice las exploraciones de host usando cron.&lt;br /&gt;
* Configure y use AIDE, incluida la administración de reglas.&lt;br /&gt;
* Tenga en cuenta OpenSCAP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* auditd&lt;br /&gt;
* auditctl&lt;br /&gt;
* ausearch, aureport&lt;br /&gt;
* auditd.conf&lt;br /&gt;
* audit.rules&lt;br /&gt;
* pam_tty_audit.so&lt;br /&gt;
* chkrootkit&lt;br /&gt;
* rkhunter&lt;br /&gt;
* /etc/rkhunter.conf&lt;br /&gt;
* maldet&lt;br /&gt;
* conf.maldet&lt;br /&gt;
* aide&lt;br /&gt;
* /etc/aide/aide.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.3 Gestión y autenticación de usuarios (peso: 5) &amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben estar familiarizados con la gestión y la autenticación de cuentas de usuario. Esto incluye la configuración y el uso de NSS, PAM, SSSD y Kerberos para los directorios locales y remotos y los mecanismos de autenticación, así como la aplicación de una política de contraseñas.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender y configurar NSS.&lt;br /&gt;
* Comprender y configurar PAM.&lt;br /&gt;
* Aplicar políticas de complejidad de contraseña y cambios de contraseña periódicos.&lt;br /&gt;
* Bloquee cuentas automáticamente después de intentos fallidos de inicio de sesión.&lt;br /&gt;
* Configurar y usar SSSD.&lt;br /&gt;
* Configure NSS y PAM para usar con SSSD.&lt;br /&gt;
* Configure la autenticación SSSD contra Active Directory, IPA, LDAP, Kerberos y dominios locales.&lt;br /&gt;
* Obtenga y administre tickets de Kerberos.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* /etc/login.defs&lt;br /&gt;
* pam_cracklib.so&lt;br /&gt;
* chage&lt;br /&gt;
* pam_tally.so, pam_tally2.so&lt;br /&gt;
* faillog&lt;br /&gt;
* pam_sss.so&lt;br /&gt;
* sssd&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.4  Instalación de FreeIPA e integración de Samba (peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben estar familiarizados con FreeIPA v4.x. Esto incluye la instalación y el mantenimiento de una instancia de servidor con un dominio FreeIPA, así como la integración de FreeIPA con Active Directory.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender FreeIPA, incluida su arquitectura y componentes.&lt;br /&gt;
* Comprender los requisitos previos del sistema y la configuración para instalar FreeIPA.&lt;br /&gt;
* Instalar y administrar un servidor y dominio FreeIPA.&lt;br /&gt;
* Comprender y configurar la replicación de Active Directory y los cross-realm trusts de Kerberos.&lt;br /&gt;
* Tenga en cuenta la integración de sudo, autofs, SSH y SELinux en FreeIPA.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* 389 Directory Server, MIT Kerberos, Dogtag Certificate System, NTP, DNS, SSSD, certmonger&lt;br /&gt;
* ipa, including relevant subcommands&lt;br /&gt;
* ipa-server-install, ipa-client-install, ipa-replica-install&lt;br /&gt;
* ipa-replica-prepare, ipa-replica-manage&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 327: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.1 Discretionary Access Control (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are required to understand Discretionary Access Control and know how to implement it using Access Control Lists. Additionally, candidates are required to understand and know how to use Extended Attributes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand and manage file ownership and permissions, including SUID and SGID.&lt;br /&gt;
* Understand and manage access control lists.&lt;br /&gt;
* Understand and manage extended attributes and attribute classes.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.2 Mandatory Access Control (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with Mandatory Access Control systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the concepts of TE, RBAC, MAC and DAC.&lt;br /&gt;
* Configure, manage and use SELinux.&lt;br /&gt;
* Be aware of AppArmor and Smack.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* getenforce, setenforce, selinuxenabled&lt;br /&gt;
* getsebool, setsebool, togglesebool&lt;br /&gt;
* fixfiles, restorecon, setfiles&lt;br /&gt;
* newrole, runcon&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus, seinfo&lt;br /&gt;
* apol&lt;br /&gt;
* seaudit, seaudit-report, audit2why, audit2allow&lt;br /&gt;
* /etc/selinux/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.3 Network File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 clients and servers as well as CIFS client services. Earlier versions of NFS are not required knowledge.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand NFSv4 security issues and improvements.&lt;br /&gt;
* Configure NFSv4 server and clients.&lt;br /&gt;
* Understand and configure NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos).&lt;br /&gt;
* Understand and use NFSv4 pseudo file system.&lt;br /&gt;
* Understand and use NFSv4 ACLs.&lt;br /&gt;
* Configure CIFS clients.&lt;br /&gt;
* Understand and use CIFS Unix Extensions.&lt;br /&gt;
* Understand and configure CIFS security modes (NTLM, Kerberos).&lt;br /&gt;
* Understand and manage mapping and handling of CIFS ACLs and SIDs in a Linux system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* /etc/exports &lt;br /&gt;
* /etc/idmap.conf&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* mount.cifs parameters related to ownership, permissions and security modes&lt;br /&gt;
* winbind&lt;br /&gt;
* getcifsacl, setcifsacl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 328: Network Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.1 Network Hardening (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure networks against common threats. This includes verification of the effectiveness of security measures.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure FreeRADIUS to authenticate network nodes.&lt;br /&gt;
* Use nmap to scan networks and hosts, including different scan methods.&lt;br /&gt;
* Use Wireshark to analyze network traffic, including filters and statistics.&lt;br /&gt;
* Identify and deal with rogue router advertisements and DHCP messages.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* radiusd&lt;br /&gt;
* radmin&lt;br /&gt;
* radtest, radclient&lt;br /&gt;
* radlast, radwho&lt;br /&gt;
* radiusd.conf&lt;br /&gt;
* /etc/raddb/*&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* ndpmon&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.2 Network Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Implement bandwidth usage monitoring.&lt;br /&gt;
* Configure and use Snort, including rule management.&lt;br /&gt;
* Configure and use OpenVAS, including NASL.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* Cacti&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/*&lt;br /&gt;
* openvas-adduser, openvas-rmuser&lt;br /&gt;
* openvas-nvt-sync&lt;br /&gt;
* openvassd&lt;br /&gt;
* openvas-mkcert&lt;br /&gt;
* /etc/openvas/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.3 Packet Filtering (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of packet filters. This includes netfilter, iptables and ip6tables as well as basic knowledge of nftables, nft and ebtables.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand common firewall architectures, including DMZ.&lt;br /&gt;
* Understand and use netfilter, iptables and ip6tables, including standard modules, tests and targets.&lt;br /&gt;
* Implement packet filtering for both IPv4 and IPv6.&lt;br /&gt;
* Implement connection tracking and network address translation.&lt;br /&gt;
* Define IP sets and use them in netfilter rules.&lt;br /&gt;
* Have basic knowledge of nftables and nft.&lt;br /&gt;
* Have basic knowledge of ebtables.&lt;br /&gt;
* Be aware of conntrackd.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* ip6tables&lt;br /&gt;
* iptables-save, iptables-restore &lt;br /&gt;
* ip6tables-save, ip6tables-restore &lt;br /&gt;
* ipset&lt;br /&gt;
* nft&lt;br /&gt;
* ebtables&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.4 Virtual Private Networks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of OpenVPN and IPsec.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure and operate OpenVPN server and clients for both bridged and routed VPN networks.&lt;br /&gt;
* Configure and operate IPsec server and clients for routed VPN networks using IPsec-Tools / racoon.&lt;br /&gt;
* Awareness of L2TP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/*&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
* setkey&lt;br /&gt;
* /etc/ipsec-tools.conf&lt;br /&gt;
* /etc/racoon/racoon.conf&lt;br /&gt;
&lt;br /&gt;
==Other Comments for consideration==&lt;br /&gt;
&lt;br /&gt;
As examples, following items are not in the current objectives:&lt;br /&gt;
&lt;br /&gt;
1) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Wireless LAN:&amp;lt;/b&amp;gt; (Note: It’s not only for Linux though, it is necessary to consider because there are many points to be taken care for configuration in terms of security measure.)&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Some aspects (i.e. Radius) are implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
2) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to IPv6:&amp;lt;/b&amp;gt; Not only IPv4, but also IPv6 should be considered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 wherever applicable (fth)&lt;br /&gt;
&lt;br /&gt;
3) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Security features in Linux:&amp;lt;/b&amp;gt; For example, ASLR and Exec-Shield (ASCII Armor) should be considered, because it causes security level lower if those are disabled.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in host hardening in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
4) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Forensics:&amp;lt;/b&amp;gt; In the survey of malware’s behavior, Sleuth Kit would be used to analyze the hard disk on Linux machine. Also in some cases, LVM commands would be used to restore the disk which became un-mountable. So that this area should be learned.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interesting topic, but it goes beyond basic security in the sense it &amp;quot;prevention and defending&amp;quot;. This is postmortal analysis. As the exam already contains a lot of topic this is postponed but up to discussion (fth)&lt;br /&gt;
&lt;br /&gt;
5) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Database (RDB, NoSQL) security:&amp;lt;/b&amp;gt; Because Application Security (bind, apache, etc.) is covered now, this item would be nice to cover. And this item is listed in the CIF, security contest almost every time. Also the counter-measure in server side is necessary.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As the other software / service aspects beyond Linux system security have been dropped this is considered out of scope for now too (fth)&lt;br /&gt;
&lt;br /&gt;
6) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to OpenFlow:&amp;lt;/b&amp;gt; There are several points to be considered in terms of security measure about the configuration of OpenFlow.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is considered as an application aspect which seems to be beyond the scope for not (fth).&lt;br /&gt;
&lt;br /&gt;
7) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;RADIUS:&amp;lt;/b&amp;gt; This was covered in 301 though, this is not covered now. This should be covered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
8) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;DNS:&amp;lt;/b&amp;gt; More DNSSEC and DANE.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
9) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Secure development, hardening&amp;lt;/b&amp;gt;&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hardening has been implemented for both hosts and networks in V2 (fth), Secure development is considered out of scope for now (fth)&lt;br /&gt;
&lt;br /&gt;
10) Certificate Transparency&lt;br /&gt;
&lt;br /&gt;
==Changes since version 1==&lt;br /&gt;
&lt;br /&gt;
===321.3===&lt;br /&gt;
The following aspects have been removed from objective 321.3 User Management and Authentication:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Kerberos Key Distribution Centre&lt;br /&gt;
* Kerberos Principals&lt;br /&gt;
* Kerberos Tickets&lt;br /&gt;
* password cracking  &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* krb5kdc/kdc.conf&lt;br /&gt;
* kdb5_util&lt;br /&gt;
* rb5kdc/kadm5.acl&lt;br /&gt;
* kadmin, kadmin.local&lt;br /&gt;
* john&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to key servers. Managing multiple private keys and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Use GPG for encryption and signing.&lt;br /&gt;
* Configure GPG.&lt;br /&gt;
* Manage private and public keys.&lt;br /&gt;
* Interact with GPG key servers to publish and retrieve public keys. &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.6 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure and use OpenSSH.&lt;br /&gt;
* Manage OpenSSH keys and access control.&lt;br /&gt;
* Be aware of SSH protocol v1 and v2 security issues.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&lt;br /&gt;
* /etc/ssh/*&lt;br /&gt;
* ~/.ssh/*&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4322</id>
		<title>LPIC-303(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4322"/>
		<updated>2017-12-10T22:46:28Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* 325.4 DNS and Cryptography (weight: 5) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
La descripción del programa completo [[LPIC-3]] figura en la lista [[LPIC-3 | aquí]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos son los objetivos  de la versión 2.0.0.&lt;br /&gt;
La versión [[LPIC-303 Objetivos V1 | 1.x objetivos]] se puede encontrar [[LPIC-303 Objetivos V1 | aquí]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traducciones de objetivos ==&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
* [[LPIC-303|Ingles]]&lt;br /&gt;
* [[LPIC-303(ES)|Español]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
===&#039;&#039;Topic 325: Criptografía&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.1 X.509 Certificados e Infraestructuras de Clave Pública (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben comprender los certificados X.509 y las infraestructuras de clave pública. Deben saber cómo configurar y usar OpenSSL para implementar las autoridades de certificación y emitir certificados SSL para diversos fines.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los certificados X.509, el ciclo de vida del certificado X.509, los campos del certificado X.509 y las extensiones de certificado X.509v3.&lt;br /&gt;
* Comprender las cadenas de confianza y las infraestructuras de clave pública.&lt;br /&gt;
* Generar y administrar claves públicas y privadas.&lt;br /&gt;
* Crear, operar y asegurar una autoridad de certificación.&lt;br /&gt;
* Solicitar, firmar y administrar certificados de servidor y cliente.&lt;br /&gt;
* Revocar certificados y autoridades de certificación.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* openssl, incluidos los subcomandos pertinentes&lt;br /&gt;
* Configuración de OpenSSL&lt;br /&gt;
* PEM, DER, PKCS&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL&lt;br /&gt;
* OCSP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt; Certificados para encriptación, firma y autenticación (peso: 4) 325.2 X.509&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber cómo usar certificados X.509 para autenticación de servidor y cliente. Los candidatos deben ser capaces de implementar la autenticación de usuario y servidor para Apache HTTPD. La versión de Apache HTTPD cubierta es 2.4 o superior.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender las versiones de los protocolos SSL y TLS.&lt;br /&gt;
* Comprender las amenazas de seguridad comunes de la capa de transporte, por ejemplo Man-in-the-Middle.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para proporcionar servicio HTTPS, incluidos SNI y HSTS.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para autenticar a los usuarios que usan certificados.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para proporcionar el engrapado OCSP.&lt;br /&gt;
* Usar OpenSSL para pruebas de servidor y cliente SSL / TLS.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Autoridades de certificación intermedias&lt;br /&gt;
* Configuración de cifrado (sin conocimiento específico de cifrado)&lt;br /&gt;
* httpd.conf&lt;br /&gt;
* mod_ssl&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.3 Sistemas de archivos encriptados (peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben ser capaces de configurar y configurar sistemas de archivos encriptados.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los dispositivo de bloque y el cifrado del sistema de archivos.&lt;br /&gt;
* Usar dm-crypt con LUKS para encriptar dispositivos de bloque.&lt;br /&gt;
* Usar eCryptfs para cifrar sistemas de archivos, incluidos directorios personales e integración de PAM.&lt;br /&gt;
* Conocer y tener en cuenta dm-crypt simple y EncFS.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* cryptsetup&lt;br /&gt;
* cryptmount&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
* ecryptfsd&lt;br /&gt;
* comandos ecryptfs-* &lt;br /&gt;
* mount.ecryptfs, umount.ecryptfs&lt;br /&gt;
* pam_ecryptfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.4 DNS y criptografía (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener experiencia y conocimiento de la criptografía en el contexto del DNS y su implementación utilizando BIND. La versión de BIND cubierta es 9.7 o superior.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprensión de DNSSEC y DANE.&lt;br /&gt;
* Configure y solucione problemas BIND con un servidor de nombres autorizado que sirve zonas seguras de DNSSEC.&lt;br /&gt;
* Configure BIND con un servidor de nombres recursivo que realiza la validación de DNSSEC en nombre de sus clientes.&lt;br /&gt;
* Key Signing Key, Zone Signing Key, Key Tag&lt;br /&gt;
* Generación de claves, almacenamiento de claves, gestión de claves y renovación de claves&lt;br /&gt;
* Mantenimiento y nueva firma de zonas&lt;br /&gt;
* Usar DANE para publicar información del certificado X.509 en DNS.&lt;br /&gt;
* Usar TSIG para una comunicación segura con BIND.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* DNS, EDNS, Zones, Resource Records&lt;br /&gt;
* DNS resource records: DS, DNSKEY, RRSIG, NSEC, NSEC3, NSEC3PARAM, TLSA&lt;br /&gt;
* DO-Bit, AD-Bit&lt;br /&gt;
* TSIG&lt;br /&gt;
* named.conf&lt;br /&gt;
* dnssec-keygen&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
* dnssec-settime&lt;br /&gt;
* dnssec-dsfromkey&lt;br /&gt;
* rndc&lt;br /&gt;
* dig&lt;br /&gt;
* delv&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 326: Host Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.1 Host Hardening (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure computers running Linux against common threats. This includes kernel and software configuration.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure BIOS and boot loader (GRUB 2) security.&lt;br /&gt;
* Disable useless software and services.&lt;br /&gt;
* Use sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration.&lt;br /&gt;
* Limit resource usage.&lt;br /&gt;
* Work with chroot environments.&lt;br /&gt;
* Drop unnecessary capabilities.&lt;br /&gt;
* Be aware of the security advantages of virtualization.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* grub.cfg&lt;br /&gt;
* chkconfig, systemctl&lt;br /&gt;
* ulimit&lt;br /&gt;
* /etc/security/limits.conf&lt;br /&gt;
* pam_limits.so&lt;br /&gt;
* chroot&lt;br /&gt;
* sysctl&lt;br /&gt;
* /etc/sysctl.conf&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.2 Host Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes updates and maintenance as well as automated host scans.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Use and configure the Linux Audit system.&lt;br /&gt;
* Use chkrootkit.&lt;br /&gt;
* Use and configure rkhunter, including updates.&lt;br /&gt;
* Use Linux Malware Detect.&lt;br /&gt;
* Automate host scans using cron.&lt;br /&gt;
* Configure and use AIDE, including rule management.&lt;br /&gt;
* Be aware of OpenSCAP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* auditd&lt;br /&gt;
* auditctl&lt;br /&gt;
* ausearch, aureport&lt;br /&gt;
* auditd.conf&lt;br /&gt;
* audit.rules&lt;br /&gt;
* pam_tty_audit.so&lt;br /&gt;
* chkrootkit&lt;br /&gt;
* rkhunter&lt;br /&gt;
* /etc/rkhunter.conf&lt;br /&gt;
* maldet&lt;br /&gt;
* conf.maldet&lt;br /&gt;
* aide&lt;br /&gt;
* /etc/aide/aide.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.3 User Management and Authentication (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with management and authentication of user accounts. This includes configuration and use of NSS, PAM, SSSD and Kerberos for both local and remote directories and authentication mechanisms as well as enforcing a password policy. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand and configure NSS.&lt;br /&gt;
* Understand and configure PAM.&lt;br /&gt;
* Enforce password complexity policies and periodic password changes.&lt;br /&gt;
* Lock accounts automatically after failed login attempts.&lt;br /&gt;
* Configure and use SSSD.&lt;br /&gt;
* Configure NSS and PAM for use with SSSD.&lt;br /&gt;
* Configure SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains.&lt;br /&gt;
* Obtain and manage Kerberos tickets.&lt;br /&gt;
&#039;&#039;&#039;TLa siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* /etc/login.defs&lt;br /&gt;
* pam_cracklib.so&lt;br /&gt;
* chage&lt;br /&gt;
* pam_tally.so, pam_tally2.so&lt;br /&gt;
* faillog&lt;br /&gt;
* pam_sss.so&lt;br /&gt;
* sssd&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.4 FreeIPA Installation and Samba Integration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with FreeIPA v4.x. This includes installation and maintenance of a server instance with a FreeIPA domain as well as integration of FreeIPA with Active Directory.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand FreeIPA, including its architecture and components.&lt;br /&gt;
* Understand system and configuration prerequisites for installing FreeIPA.&lt;br /&gt;
* Install and manage a FreeIPA server and domain.&lt;br /&gt;
* Understand and configure Active Directory replication and Kerberos cross-realm trusts.&lt;br /&gt;
* Be aware of sudo, autofs, SSH and SELinux integration in FreeIPA.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* 389 Directory Server, MIT Kerberos, Dogtag Certificate System, NTP, DNS, SSSD, certmonger&lt;br /&gt;
* ipa, including relevant subcommands&lt;br /&gt;
* ipa-server-install, ipa-client-install, ipa-replica-install&lt;br /&gt;
* ipa-replica-prepare, ipa-replica-manage&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 327: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.1 Discretionary Access Control (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are required to understand Discretionary Access Control and know how to implement it using Access Control Lists. Additionally, candidates are required to understand and know how to use Extended Attributes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand and manage file ownership and permissions, including SUID and SGID.&lt;br /&gt;
* Understand and manage access control lists.&lt;br /&gt;
* Understand and manage extended attributes and attribute classes.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.2 Mandatory Access Control (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with Mandatory Access Control systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the concepts of TE, RBAC, MAC and DAC.&lt;br /&gt;
* Configure, manage and use SELinux.&lt;br /&gt;
* Be aware of AppArmor and Smack.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* getenforce, setenforce, selinuxenabled&lt;br /&gt;
* getsebool, setsebool, togglesebool&lt;br /&gt;
* fixfiles, restorecon, setfiles&lt;br /&gt;
* newrole, runcon&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus, seinfo&lt;br /&gt;
* apol&lt;br /&gt;
* seaudit, seaudit-report, audit2why, audit2allow&lt;br /&gt;
* /etc/selinux/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.3 Network File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 clients and servers as well as CIFS client services. Earlier versions of NFS are not required knowledge.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand NFSv4 security issues and improvements.&lt;br /&gt;
* Configure NFSv4 server and clients.&lt;br /&gt;
* Understand and configure NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos).&lt;br /&gt;
* Understand and use NFSv4 pseudo file system.&lt;br /&gt;
* Understand and use NFSv4 ACLs.&lt;br /&gt;
* Configure CIFS clients.&lt;br /&gt;
* Understand and use CIFS Unix Extensions.&lt;br /&gt;
* Understand and configure CIFS security modes (NTLM, Kerberos).&lt;br /&gt;
* Understand and manage mapping and handling of CIFS ACLs and SIDs in a Linux system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* /etc/exports &lt;br /&gt;
* /etc/idmap.conf&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* mount.cifs parameters related to ownership, permissions and security modes&lt;br /&gt;
* winbind&lt;br /&gt;
* getcifsacl, setcifsacl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 328: Network Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.1 Network Hardening (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure networks against common threats. This includes verification of the effectiveness of security measures.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure FreeRADIUS to authenticate network nodes.&lt;br /&gt;
* Use nmap to scan networks and hosts, including different scan methods.&lt;br /&gt;
* Use Wireshark to analyze network traffic, including filters and statistics.&lt;br /&gt;
* Identify and deal with rogue router advertisements and DHCP messages.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* radiusd&lt;br /&gt;
* radmin&lt;br /&gt;
* radtest, radclient&lt;br /&gt;
* radlast, radwho&lt;br /&gt;
* radiusd.conf&lt;br /&gt;
* /etc/raddb/*&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* ndpmon&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.2 Network Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Implement bandwidth usage monitoring.&lt;br /&gt;
* Configure and use Snort, including rule management.&lt;br /&gt;
* Configure and use OpenVAS, including NASL.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* Cacti&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/*&lt;br /&gt;
* openvas-adduser, openvas-rmuser&lt;br /&gt;
* openvas-nvt-sync&lt;br /&gt;
* openvassd&lt;br /&gt;
* openvas-mkcert&lt;br /&gt;
* /etc/openvas/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.3 Packet Filtering (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of packet filters. This includes netfilter, iptables and ip6tables as well as basic knowledge of nftables, nft and ebtables.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand common firewall architectures, including DMZ.&lt;br /&gt;
* Understand and use netfilter, iptables and ip6tables, including standard modules, tests and targets.&lt;br /&gt;
* Implement packet filtering for both IPv4 and IPv6.&lt;br /&gt;
* Implement connection tracking and network address translation.&lt;br /&gt;
* Define IP sets and use them in netfilter rules.&lt;br /&gt;
* Have basic knowledge of nftables and nft.&lt;br /&gt;
* Have basic knowledge of ebtables.&lt;br /&gt;
* Be aware of conntrackd.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* ip6tables&lt;br /&gt;
* iptables-save, iptables-restore &lt;br /&gt;
* ip6tables-save, ip6tables-restore &lt;br /&gt;
* ipset&lt;br /&gt;
* nft&lt;br /&gt;
* ebtables&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.4 Virtual Private Networks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of OpenVPN and IPsec.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure and operate OpenVPN server and clients for both bridged and routed VPN networks.&lt;br /&gt;
* Configure and operate IPsec server and clients for routed VPN networks using IPsec-Tools / racoon.&lt;br /&gt;
* Awareness of L2TP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/*&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
* setkey&lt;br /&gt;
* /etc/ipsec-tools.conf&lt;br /&gt;
* /etc/racoon/racoon.conf&lt;br /&gt;
&lt;br /&gt;
==Other Comments for consideration==&lt;br /&gt;
&lt;br /&gt;
As examples, following items are not in the current objectives:&lt;br /&gt;
&lt;br /&gt;
1) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Wireless LAN:&amp;lt;/b&amp;gt; (Note: It’s not only for Linux though, it is necessary to consider because there are many points to be taken care for configuration in terms of security measure.)&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Some aspects (i.e. Radius) are implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
2) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to IPv6:&amp;lt;/b&amp;gt; Not only IPv4, but also IPv6 should be considered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 wherever applicable (fth)&lt;br /&gt;
&lt;br /&gt;
3) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Security features in Linux:&amp;lt;/b&amp;gt; For example, ASLR and Exec-Shield (ASCII Armor) should be considered, because it causes security level lower if those are disabled.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in host hardening in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
4) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Forensics:&amp;lt;/b&amp;gt; In the survey of malware’s behavior, Sleuth Kit would be used to analyze the hard disk on Linux machine. Also in some cases, LVM commands would be used to restore the disk which became un-mountable. So that this area should be learned.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interesting topic, but it goes beyond basic security in the sense it &amp;quot;prevention and defending&amp;quot;. This is postmortal analysis. As the exam already contains a lot of topic this is postponed but up to discussion (fth)&lt;br /&gt;
&lt;br /&gt;
5) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Database (RDB, NoSQL) security:&amp;lt;/b&amp;gt; Because Application Security (bind, apache, etc.) is covered now, this item would be nice to cover. And this item is listed in the CIF, security contest almost every time. Also the counter-measure in server side is necessary.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As the other software / service aspects beyond Linux system security have been dropped this is considered out of scope for now too (fth)&lt;br /&gt;
&lt;br /&gt;
6) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to OpenFlow:&amp;lt;/b&amp;gt; There are several points to be considered in terms of security measure about the configuration of OpenFlow.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is considered as an application aspect which seems to be beyond the scope for not (fth).&lt;br /&gt;
&lt;br /&gt;
7) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;RADIUS:&amp;lt;/b&amp;gt; This was covered in 301 though, this is not covered now. This should be covered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
8) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;DNS:&amp;lt;/b&amp;gt; More DNSSEC and DANE.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
9) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Secure development, hardening&amp;lt;/b&amp;gt;&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hardening has been implemented for both hosts and networks in V2 (fth), Secure development is considered out of scope for now (fth)&lt;br /&gt;
&lt;br /&gt;
10) Certificate Transparency&lt;br /&gt;
&lt;br /&gt;
==Changes since version 1==&lt;br /&gt;
&lt;br /&gt;
===321.3===&lt;br /&gt;
The following aspects have been removed from objective 321.3 User Management and Authentication:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Kerberos Key Distribution Centre&lt;br /&gt;
* Kerberos Principals&lt;br /&gt;
* Kerberos Tickets&lt;br /&gt;
* password cracking  &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* krb5kdc/kdc.conf&lt;br /&gt;
* kdb5_util&lt;br /&gt;
* rb5kdc/kadm5.acl&lt;br /&gt;
* kadmin, kadmin.local&lt;br /&gt;
* john&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to key servers. Managing multiple private keys and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Use GPG for encryption and signing.&lt;br /&gt;
* Configure GPG.&lt;br /&gt;
* Manage private and public keys.&lt;br /&gt;
* Interact with GPG key servers to publish and retrieve public keys. &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.6 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure and use OpenSSH.&lt;br /&gt;
* Manage OpenSSH keys and access control.&lt;br /&gt;
* Be aware of SSH protocol v1 and v2 security issues.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&lt;br /&gt;
* /etc/ssh/*&lt;br /&gt;
* ~/.ssh/*&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4321</id>
		<title>LPIC-303(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4321"/>
		<updated>2017-12-10T22:43:34Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* 325.3 Encrypted File Systems (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
La descripción del programa completo [[LPIC-3]] figura en la lista [[LPIC-3 | aquí]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos son los objetivos  de la versión 2.0.0.&lt;br /&gt;
La versión [[LPIC-303 Objetivos V1 | 1.x objetivos]] se puede encontrar [[LPIC-303 Objetivos V1 | aquí]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traducciones de objetivos ==&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
* [[LPIC-303|Ingles]]&lt;br /&gt;
* [[LPIC-303(ES)|Español]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
===&#039;&#039;Topic 325: Criptografía&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.1 X.509 Certificados e Infraestructuras de Clave Pública (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben comprender los certificados X.509 y las infraestructuras de clave pública. Deben saber cómo configurar y usar OpenSSL para implementar las autoridades de certificación y emitir certificados SSL para diversos fines.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los certificados X.509, el ciclo de vida del certificado X.509, los campos del certificado X.509 y las extensiones de certificado X.509v3.&lt;br /&gt;
* Comprender las cadenas de confianza y las infraestructuras de clave pública.&lt;br /&gt;
* Generar y administrar claves públicas y privadas.&lt;br /&gt;
* Crear, operar y asegurar una autoridad de certificación.&lt;br /&gt;
* Solicitar, firmar y administrar certificados de servidor y cliente.&lt;br /&gt;
* Revocar certificados y autoridades de certificación.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* openssl, incluidos los subcomandos pertinentes&lt;br /&gt;
* Configuración de OpenSSL&lt;br /&gt;
* PEM, DER, PKCS&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL&lt;br /&gt;
* OCSP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt; Certificados para encriptación, firma y autenticación (peso: 4) 325.2 X.509&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber cómo usar certificados X.509 para autenticación de servidor y cliente. Los candidatos deben ser capaces de implementar la autenticación de usuario y servidor para Apache HTTPD. La versión de Apache HTTPD cubierta es 2.4 o superior.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender las versiones de los protocolos SSL y TLS.&lt;br /&gt;
* Comprender las amenazas de seguridad comunes de la capa de transporte, por ejemplo Man-in-the-Middle.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para proporcionar servicio HTTPS, incluidos SNI y HSTS.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para autenticar a los usuarios que usan certificados.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para proporcionar el engrapado OCSP.&lt;br /&gt;
* Usar OpenSSL para pruebas de servidor y cliente SSL / TLS.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Autoridades de certificación intermedias&lt;br /&gt;
* Configuración de cifrado (sin conocimiento específico de cifrado)&lt;br /&gt;
* httpd.conf&lt;br /&gt;
* mod_ssl&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.3 Sistemas de archivos encriptados (peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben ser capaces de configurar y configurar sistemas de archivos encriptados.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los dispositivo de bloque y el cifrado del sistema de archivos.&lt;br /&gt;
* Usar dm-crypt con LUKS para encriptar dispositivos de bloque.&lt;br /&gt;
* Usar eCryptfs para cifrar sistemas de archivos, incluidos directorios personales e integración de PAM.&lt;br /&gt;
* Conocer y tener en cuenta dm-crypt simple y EncFS.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* cryptsetup&lt;br /&gt;
* cryptmount&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
* ecryptfsd&lt;br /&gt;
* comandos ecryptfs-* &lt;br /&gt;
* mount.ecryptfs, umount.ecryptfs&lt;br /&gt;
* pam_ecryptfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.4 DNS and Cryptography (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND. The version of BIND covered is 9.7 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DNSSEC and DANE.&lt;br /&gt;
* Configure and troubleshoot BIND as an authoritative name server serving DNSSEC secured zones.&lt;br /&gt;
* Configure BIND as an recursive name server that performs DNSSEC validation on behalf of its clients. &lt;br /&gt;
* Key Signing Key, Zone Signing Key, Key Tag&lt;br /&gt;
* Key generation, key storage, key management and key rollover&lt;br /&gt;
* Maintenance and re-signing of zones&lt;br /&gt;
* Use DANE to publish X.509 certificate information in DNS.&lt;br /&gt;
* Use TSIG for secure communication with BIND.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* DNS, EDNS, Zones, Resource Records&lt;br /&gt;
* DNS resource records: DS, DNSKEY, RRSIG, NSEC, NSEC3, NSEC3PARAM, TLSA&lt;br /&gt;
* DO-Bit, AD-Bit&lt;br /&gt;
* TSIG&lt;br /&gt;
* named.conf&lt;br /&gt;
* dnssec-keygen&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
* dnssec-settime&lt;br /&gt;
* dnssec-dsfromkey&lt;br /&gt;
* rndc&lt;br /&gt;
* dig&lt;br /&gt;
* delv&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 326: Host Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.1 Host Hardening (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure computers running Linux against common threats. This includes kernel and software configuration.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure BIOS and boot loader (GRUB 2) security.&lt;br /&gt;
* Disable useless software and services.&lt;br /&gt;
* Use sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration.&lt;br /&gt;
* Limit resource usage.&lt;br /&gt;
* Work with chroot environments.&lt;br /&gt;
* Drop unnecessary capabilities.&lt;br /&gt;
* Be aware of the security advantages of virtualization.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* grub.cfg&lt;br /&gt;
* chkconfig, systemctl&lt;br /&gt;
* ulimit&lt;br /&gt;
* /etc/security/limits.conf&lt;br /&gt;
* pam_limits.so&lt;br /&gt;
* chroot&lt;br /&gt;
* sysctl&lt;br /&gt;
* /etc/sysctl.conf&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.2 Host Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes updates and maintenance as well as automated host scans.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Use and configure the Linux Audit system.&lt;br /&gt;
* Use chkrootkit.&lt;br /&gt;
* Use and configure rkhunter, including updates.&lt;br /&gt;
* Use Linux Malware Detect.&lt;br /&gt;
* Automate host scans using cron.&lt;br /&gt;
* Configure and use AIDE, including rule management.&lt;br /&gt;
* Be aware of OpenSCAP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* auditd&lt;br /&gt;
* auditctl&lt;br /&gt;
* ausearch, aureport&lt;br /&gt;
* auditd.conf&lt;br /&gt;
* audit.rules&lt;br /&gt;
* pam_tty_audit.so&lt;br /&gt;
* chkrootkit&lt;br /&gt;
* rkhunter&lt;br /&gt;
* /etc/rkhunter.conf&lt;br /&gt;
* maldet&lt;br /&gt;
* conf.maldet&lt;br /&gt;
* aide&lt;br /&gt;
* /etc/aide/aide.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.3 User Management and Authentication (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with management and authentication of user accounts. This includes configuration and use of NSS, PAM, SSSD and Kerberos for both local and remote directories and authentication mechanisms as well as enforcing a password policy. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand and configure NSS.&lt;br /&gt;
* Understand and configure PAM.&lt;br /&gt;
* Enforce password complexity policies and periodic password changes.&lt;br /&gt;
* Lock accounts automatically after failed login attempts.&lt;br /&gt;
* Configure and use SSSD.&lt;br /&gt;
* Configure NSS and PAM for use with SSSD.&lt;br /&gt;
* Configure SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains.&lt;br /&gt;
* Obtain and manage Kerberos tickets.&lt;br /&gt;
&#039;&#039;&#039;TLa siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* /etc/login.defs&lt;br /&gt;
* pam_cracklib.so&lt;br /&gt;
* chage&lt;br /&gt;
* pam_tally.so, pam_tally2.so&lt;br /&gt;
* faillog&lt;br /&gt;
* pam_sss.so&lt;br /&gt;
* sssd&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.4 FreeIPA Installation and Samba Integration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with FreeIPA v4.x. This includes installation and maintenance of a server instance with a FreeIPA domain as well as integration of FreeIPA with Active Directory.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand FreeIPA, including its architecture and components.&lt;br /&gt;
* Understand system and configuration prerequisites for installing FreeIPA.&lt;br /&gt;
* Install and manage a FreeIPA server and domain.&lt;br /&gt;
* Understand and configure Active Directory replication and Kerberos cross-realm trusts.&lt;br /&gt;
* Be aware of sudo, autofs, SSH and SELinux integration in FreeIPA.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* 389 Directory Server, MIT Kerberos, Dogtag Certificate System, NTP, DNS, SSSD, certmonger&lt;br /&gt;
* ipa, including relevant subcommands&lt;br /&gt;
* ipa-server-install, ipa-client-install, ipa-replica-install&lt;br /&gt;
* ipa-replica-prepare, ipa-replica-manage&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 327: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.1 Discretionary Access Control (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are required to understand Discretionary Access Control and know how to implement it using Access Control Lists. Additionally, candidates are required to understand and know how to use Extended Attributes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand and manage file ownership and permissions, including SUID and SGID.&lt;br /&gt;
* Understand and manage access control lists.&lt;br /&gt;
* Understand and manage extended attributes and attribute classes.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.2 Mandatory Access Control (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with Mandatory Access Control systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the concepts of TE, RBAC, MAC and DAC.&lt;br /&gt;
* Configure, manage and use SELinux.&lt;br /&gt;
* Be aware of AppArmor and Smack.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* getenforce, setenforce, selinuxenabled&lt;br /&gt;
* getsebool, setsebool, togglesebool&lt;br /&gt;
* fixfiles, restorecon, setfiles&lt;br /&gt;
* newrole, runcon&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus, seinfo&lt;br /&gt;
* apol&lt;br /&gt;
* seaudit, seaudit-report, audit2why, audit2allow&lt;br /&gt;
* /etc/selinux/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.3 Network File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 clients and servers as well as CIFS client services. Earlier versions of NFS are not required knowledge.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand NFSv4 security issues and improvements.&lt;br /&gt;
* Configure NFSv4 server and clients.&lt;br /&gt;
* Understand and configure NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos).&lt;br /&gt;
* Understand and use NFSv4 pseudo file system.&lt;br /&gt;
* Understand and use NFSv4 ACLs.&lt;br /&gt;
* Configure CIFS clients.&lt;br /&gt;
* Understand and use CIFS Unix Extensions.&lt;br /&gt;
* Understand and configure CIFS security modes (NTLM, Kerberos).&lt;br /&gt;
* Understand and manage mapping and handling of CIFS ACLs and SIDs in a Linux system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* /etc/exports &lt;br /&gt;
* /etc/idmap.conf&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* mount.cifs parameters related to ownership, permissions and security modes&lt;br /&gt;
* winbind&lt;br /&gt;
* getcifsacl, setcifsacl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 328: Network Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.1 Network Hardening (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure networks against common threats. This includes verification of the effectiveness of security measures.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure FreeRADIUS to authenticate network nodes.&lt;br /&gt;
* Use nmap to scan networks and hosts, including different scan methods.&lt;br /&gt;
* Use Wireshark to analyze network traffic, including filters and statistics.&lt;br /&gt;
* Identify and deal with rogue router advertisements and DHCP messages.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* radiusd&lt;br /&gt;
* radmin&lt;br /&gt;
* radtest, radclient&lt;br /&gt;
* radlast, radwho&lt;br /&gt;
* radiusd.conf&lt;br /&gt;
* /etc/raddb/*&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* ndpmon&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.2 Network Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Implement bandwidth usage monitoring.&lt;br /&gt;
* Configure and use Snort, including rule management.&lt;br /&gt;
* Configure and use OpenVAS, including NASL.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* Cacti&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/*&lt;br /&gt;
* openvas-adduser, openvas-rmuser&lt;br /&gt;
* openvas-nvt-sync&lt;br /&gt;
* openvassd&lt;br /&gt;
* openvas-mkcert&lt;br /&gt;
* /etc/openvas/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.3 Packet Filtering (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of packet filters. This includes netfilter, iptables and ip6tables as well as basic knowledge of nftables, nft and ebtables.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand common firewall architectures, including DMZ.&lt;br /&gt;
* Understand and use netfilter, iptables and ip6tables, including standard modules, tests and targets.&lt;br /&gt;
* Implement packet filtering for both IPv4 and IPv6.&lt;br /&gt;
* Implement connection tracking and network address translation.&lt;br /&gt;
* Define IP sets and use them in netfilter rules.&lt;br /&gt;
* Have basic knowledge of nftables and nft.&lt;br /&gt;
* Have basic knowledge of ebtables.&lt;br /&gt;
* Be aware of conntrackd.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* ip6tables&lt;br /&gt;
* iptables-save, iptables-restore &lt;br /&gt;
* ip6tables-save, ip6tables-restore &lt;br /&gt;
* ipset&lt;br /&gt;
* nft&lt;br /&gt;
* ebtables&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.4 Virtual Private Networks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of OpenVPN and IPsec.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure and operate OpenVPN server and clients for both bridged and routed VPN networks.&lt;br /&gt;
* Configure and operate IPsec server and clients for routed VPN networks using IPsec-Tools / racoon.&lt;br /&gt;
* Awareness of L2TP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/*&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
* setkey&lt;br /&gt;
* /etc/ipsec-tools.conf&lt;br /&gt;
* /etc/racoon/racoon.conf&lt;br /&gt;
&lt;br /&gt;
==Other Comments for consideration==&lt;br /&gt;
&lt;br /&gt;
As examples, following items are not in the current objectives:&lt;br /&gt;
&lt;br /&gt;
1) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Wireless LAN:&amp;lt;/b&amp;gt; (Note: It’s not only for Linux though, it is necessary to consider because there are many points to be taken care for configuration in terms of security measure.)&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Some aspects (i.e. Radius) are implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
2) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to IPv6:&amp;lt;/b&amp;gt; Not only IPv4, but also IPv6 should be considered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 wherever applicable (fth)&lt;br /&gt;
&lt;br /&gt;
3) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Security features in Linux:&amp;lt;/b&amp;gt; For example, ASLR and Exec-Shield (ASCII Armor) should be considered, because it causes security level lower if those are disabled.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in host hardening in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
4) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Forensics:&amp;lt;/b&amp;gt; In the survey of malware’s behavior, Sleuth Kit would be used to analyze the hard disk on Linux machine. Also in some cases, LVM commands would be used to restore the disk which became un-mountable. So that this area should be learned.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interesting topic, but it goes beyond basic security in the sense it &amp;quot;prevention and defending&amp;quot;. This is postmortal analysis. As the exam already contains a lot of topic this is postponed but up to discussion (fth)&lt;br /&gt;
&lt;br /&gt;
5) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Database (RDB, NoSQL) security:&amp;lt;/b&amp;gt; Because Application Security (bind, apache, etc.) is covered now, this item would be nice to cover. And this item is listed in the CIF, security contest almost every time. Also the counter-measure in server side is necessary.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As the other software / service aspects beyond Linux system security have been dropped this is considered out of scope for now too (fth)&lt;br /&gt;
&lt;br /&gt;
6) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to OpenFlow:&amp;lt;/b&amp;gt; There are several points to be considered in terms of security measure about the configuration of OpenFlow.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is considered as an application aspect which seems to be beyond the scope for not (fth).&lt;br /&gt;
&lt;br /&gt;
7) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;RADIUS:&amp;lt;/b&amp;gt; This was covered in 301 though, this is not covered now. This should be covered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
8) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;DNS:&amp;lt;/b&amp;gt; More DNSSEC and DANE.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
9) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Secure development, hardening&amp;lt;/b&amp;gt;&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hardening has been implemented for both hosts and networks in V2 (fth), Secure development is considered out of scope for now (fth)&lt;br /&gt;
&lt;br /&gt;
10) Certificate Transparency&lt;br /&gt;
&lt;br /&gt;
==Changes since version 1==&lt;br /&gt;
&lt;br /&gt;
===321.3===&lt;br /&gt;
The following aspects have been removed from objective 321.3 User Management and Authentication:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Kerberos Key Distribution Centre&lt;br /&gt;
* Kerberos Principals&lt;br /&gt;
* Kerberos Tickets&lt;br /&gt;
* password cracking  &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* krb5kdc/kdc.conf&lt;br /&gt;
* kdb5_util&lt;br /&gt;
* rb5kdc/kadm5.acl&lt;br /&gt;
* kadmin, kadmin.local&lt;br /&gt;
* john&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to key servers. Managing multiple private keys and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Use GPG for encryption and signing.&lt;br /&gt;
* Configure GPG.&lt;br /&gt;
* Manage private and public keys.&lt;br /&gt;
* Interact with GPG key servers to publish and retrieve public keys. &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.6 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure and use OpenSSH.&lt;br /&gt;
* Manage OpenSSH keys and access control.&lt;br /&gt;
* Be aware of SSH protocol v1 and v2 security issues.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&lt;br /&gt;
* /etc/ssh/*&lt;br /&gt;
* ~/.ssh/*&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4320</id>
		<title>LPIC-303(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4320"/>
		<updated>2017-12-10T22:40:59Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
La descripción del programa completo [[LPIC-3]] figura en la lista [[LPIC-3 | aquí]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos son los objetivos  de la versión 2.0.0.&lt;br /&gt;
La versión [[LPIC-303 Objetivos V1 | 1.x objetivos]] se puede encontrar [[LPIC-303 Objetivos V1 | aquí]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traducciones de objetivos ==&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
* [[LPIC-303|Ingles]]&lt;br /&gt;
* [[LPIC-303(ES)|Español]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
===&#039;&#039;Topic 325: Criptografía&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.1 X.509 Certificados e Infraestructuras de Clave Pública (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben comprender los certificados X.509 y las infraestructuras de clave pública. Deben saber cómo configurar y usar OpenSSL para implementar las autoridades de certificación y emitir certificados SSL para diversos fines.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los certificados X.509, el ciclo de vida del certificado X.509, los campos del certificado X.509 y las extensiones de certificado X.509v3.&lt;br /&gt;
* Comprender las cadenas de confianza y las infraestructuras de clave pública.&lt;br /&gt;
* Generar y administrar claves públicas y privadas.&lt;br /&gt;
* Crear, operar y asegurar una autoridad de certificación.&lt;br /&gt;
* Solicitar, firmar y administrar certificados de servidor y cliente.&lt;br /&gt;
* Revocar certificados y autoridades de certificación.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* openssl, incluidos los subcomandos pertinentes&lt;br /&gt;
* Configuración de OpenSSL&lt;br /&gt;
* PEM, DER, PKCS&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL&lt;br /&gt;
* OCSP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt; Certificados para encriptación, firma y autenticación (peso: 4) 325.2 X.509&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber cómo usar certificados X.509 para autenticación de servidor y cliente. Los candidatos deben ser capaces de implementar la autenticación de usuario y servidor para Apache HTTPD. La versión de Apache HTTPD cubierta es 2.4 o superior.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Comprender las versiones de los protocolos SSL y TLS.&lt;br /&gt;
* Comprender las amenazas de seguridad comunes de la capa de transporte, por ejemplo Man-in-the-Middle.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para proporcionar servicio HTTPS, incluidos SNI y HSTS.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para autenticar a los usuarios que usan certificados.&lt;br /&gt;
* Configurar Apache HTTPD con mod_ssl para proporcionar el engrapado OCSP.&lt;br /&gt;
* Usar OpenSSL para pruebas de servidor y cliente SSL / TLS.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Autoridades de certificación intermedias&lt;br /&gt;
* Configuración de cifrado (sin conocimiento específico de cifrado)&lt;br /&gt;
* httpd.conf&lt;br /&gt;
* mod_ssl&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.3 Encrypted File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up and configure encrypted file systems. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand block device and file system encryption.&lt;br /&gt;
* Use dm-crypt with LUKS to encrypt block devices.&lt;br /&gt;
* Use eCryptfs to encrypt file systems, including home directories and PAM integration.&lt;br /&gt;
* Be aware of plain dm-crypt and EncFS.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* cryptsetup&lt;br /&gt;
* cryptmount&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
* ecryptfsd&lt;br /&gt;
* ecryptfs-* commands&lt;br /&gt;
* mount.ecryptfs, umount.ecryptfs&lt;br /&gt;
* pam_ecryptfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.4 DNS and Cryptography (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND. The version of BIND covered is 9.7 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DNSSEC and DANE.&lt;br /&gt;
* Configure and troubleshoot BIND as an authoritative name server serving DNSSEC secured zones.&lt;br /&gt;
* Configure BIND as an recursive name server that performs DNSSEC validation on behalf of its clients. &lt;br /&gt;
* Key Signing Key, Zone Signing Key, Key Tag&lt;br /&gt;
* Key generation, key storage, key management and key rollover&lt;br /&gt;
* Maintenance and re-signing of zones&lt;br /&gt;
* Use DANE to publish X.509 certificate information in DNS.&lt;br /&gt;
* Use TSIG for secure communication with BIND.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* DNS, EDNS, Zones, Resource Records&lt;br /&gt;
* DNS resource records: DS, DNSKEY, RRSIG, NSEC, NSEC3, NSEC3PARAM, TLSA&lt;br /&gt;
* DO-Bit, AD-Bit&lt;br /&gt;
* TSIG&lt;br /&gt;
* named.conf&lt;br /&gt;
* dnssec-keygen&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
* dnssec-settime&lt;br /&gt;
* dnssec-dsfromkey&lt;br /&gt;
* rndc&lt;br /&gt;
* dig&lt;br /&gt;
* delv&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 326: Host Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.1 Host Hardening (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure computers running Linux against common threats. This includes kernel and software configuration.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure BIOS and boot loader (GRUB 2) security.&lt;br /&gt;
* Disable useless software and services.&lt;br /&gt;
* Use sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration.&lt;br /&gt;
* Limit resource usage.&lt;br /&gt;
* Work with chroot environments.&lt;br /&gt;
* Drop unnecessary capabilities.&lt;br /&gt;
* Be aware of the security advantages of virtualization.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* grub.cfg&lt;br /&gt;
* chkconfig, systemctl&lt;br /&gt;
* ulimit&lt;br /&gt;
* /etc/security/limits.conf&lt;br /&gt;
* pam_limits.so&lt;br /&gt;
* chroot&lt;br /&gt;
* sysctl&lt;br /&gt;
* /etc/sysctl.conf&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.2 Host Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes updates and maintenance as well as automated host scans.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Use and configure the Linux Audit system.&lt;br /&gt;
* Use chkrootkit.&lt;br /&gt;
* Use and configure rkhunter, including updates.&lt;br /&gt;
* Use Linux Malware Detect.&lt;br /&gt;
* Automate host scans using cron.&lt;br /&gt;
* Configure and use AIDE, including rule management.&lt;br /&gt;
* Be aware of OpenSCAP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* auditd&lt;br /&gt;
* auditctl&lt;br /&gt;
* ausearch, aureport&lt;br /&gt;
* auditd.conf&lt;br /&gt;
* audit.rules&lt;br /&gt;
* pam_tty_audit.so&lt;br /&gt;
* chkrootkit&lt;br /&gt;
* rkhunter&lt;br /&gt;
* /etc/rkhunter.conf&lt;br /&gt;
* maldet&lt;br /&gt;
* conf.maldet&lt;br /&gt;
* aide&lt;br /&gt;
* /etc/aide/aide.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.3 User Management and Authentication (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with management and authentication of user accounts. This includes configuration and use of NSS, PAM, SSSD and Kerberos for both local and remote directories and authentication mechanisms as well as enforcing a password policy. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand and configure NSS.&lt;br /&gt;
* Understand and configure PAM.&lt;br /&gt;
* Enforce password complexity policies and periodic password changes.&lt;br /&gt;
* Lock accounts automatically after failed login attempts.&lt;br /&gt;
* Configure and use SSSD.&lt;br /&gt;
* Configure NSS and PAM for use with SSSD.&lt;br /&gt;
* Configure SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains.&lt;br /&gt;
* Obtain and manage Kerberos tickets.&lt;br /&gt;
&#039;&#039;&#039;TLa siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* /etc/login.defs&lt;br /&gt;
* pam_cracklib.so&lt;br /&gt;
* chage&lt;br /&gt;
* pam_tally.so, pam_tally2.so&lt;br /&gt;
* faillog&lt;br /&gt;
* pam_sss.so&lt;br /&gt;
* sssd&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.4 FreeIPA Installation and Samba Integration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with FreeIPA v4.x. This includes installation and maintenance of a server instance with a FreeIPA domain as well as integration of FreeIPA with Active Directory.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand FreeIPA, including its architecture and components.&lt;br /&gt;
* Understand system and configuration prerequisites for installing FreeIPA.&lt;br /&gt;
* Install and manage a FreeIPA server and domain.&lt;br /&gt;
* Understand and configure Active Directory replication and Kerberos cross-realm trusts.&lt;br /&gt;
* Be aware of sudo, autofs, SSH and SELinux integration in FreeIPA.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* 389 Directory Server, MIT Kerberos, Dogtag Certificate System, NTP, DNS, SSSD, certmonger&lt;br /&gt;
* ipa, including relevant subcommands&lt;br /&gt;
* ipa-server-install, ipa-client-install, ipa-replica-install&lt;br /&gt;
* ipa-replica-prepare, ipa-replica-manage&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 327: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.1 Discretionary Access Control (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are required to understand Discretionary Access Control and know how to implement it using Access Control Lists. Additionally, candidates are required to understand and know how to use Extended Attributes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand and manage file ownership and permissions, including SUID and SGID.&lt;br /&gt;
* Understand and manage access control lists.&lt;br /&gt;
* Understand and manage extended attributes and attribute classes.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.2 Mandatory Access Control (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with Mandatory Access Control systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the concepts of TE, RBAC, MAC and DAC.&lt;br /&gt;
* Configure, manage and use SELinux.&lt;br /&gt;
* Be aware of AppArmor and Smack.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* getenforce, setenforce, selinuxenabled&lt;br /&gt;
* getsebool, setsebool, togglesebool&lt;br /&gt;
* fixfiles, restorecon, setfiles&lt;br /&gt;
* newrole, runcon&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus, seinfo&lt;br /&gt;
* apol&lt;br /&gt;
* seaudit, seaudit-report, audit2why, audit2allow&lt;br /&gt;
* /etc/selinux/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.3 Network File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 clients and servers as well as CIFS client services. Earlier versions of NFS are not required knowledge.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand NFSv4 security issues and improvements.&lt;br /&gt;
* Configure NFSv4 server and clients.&lt;br /&gt;
* Understand and configure NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos).&lt;br /&gt;
* Understand and use NFSv4 pseudo file system.&lt;br /&gt;
* Understand and use NFSv4 ACLs.&lt;br /&gt;
* Configure CIFS clients.&lt;br /&gt;
* Understand and use CIFS Unix Extensions.&lt;br /&gt;
* Understand and configure CIFS security modes (NTLM, Kerberos).&lt;br /&gt;
* Understand and manage mapping and handling of CIFS ACLs and SIDs in a Linux system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* /etc/exports &lt;br /&gt;
* /etc/idmap.conf&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* mount.cifs parameters related to ownership, permissions and security modes&lt;br /&gt;
* winbind&lt;br /&gt;
* getcifsacl, setcifsacl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 328: Network Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.1 Network Hardening (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure networks against common threats. This includes verification of the effectiveness of security measures.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure FreeRADIUS to authenticate network nodes.&lt;br /&gt;
* Use nmap to scan networks and hosts, including different scan methods.&lt;br /&gt;
* Use Wireshark to analyze network traffic, including filters and statistics.&lt;br /&gt;
* Identify and deal with rogue router advertisements and DHCP messages.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* radiusd&lt;br /&gt;
* radmin&lt;br /&gt;
* radtest, radclient&lt;br /&gt;
* radlast, radwho&lt;br /&gt;
* radiusd.conf&lt;br /&gt;
* /etc/raddb/*&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* ndpmon&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.2 Network Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Implement bandwidth usage monitoring.&lt;br /&gt;
* Configure and use Snort, including rule management.&lt;br /&gt;
* Configure and use OpenVAS, including NASL.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* Cacti&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/*&lt;br /&gt;
* openvas-adduser, openvas-rmuser&lt;br /&gt;
* openvas-nvt-sync&lt;br /&gt;
* openvassd&lt;br /&gt;
* openvas-mkcert&lt;br /&gt;
* /etc/openvas/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.3 Packet Filtering (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of packet filters. This includes netfilter, iptables and ip6tables as well as basic knowledge of nftables, nft and ebtables.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand common firewall architectures, including DMZ.&lt;br /&gt;
* Understand and use netfilter, iptables and ip6tables, including standard modules, tests and targets.&lt;br /&gt;
* Implement packet filtering for both IPv4 and IPv6.&lt;br /&gt;
* Implement connection tracking and network address translation.&lt;br /&gt;
* Define IP sets and use them in netfilter rules.&lt;br /&gt;
* Have basic knowledge of nftables and nft.&lt;br /&gt;
* Have basic knowledge of ebtables.&lt;br /&gt;
* Be aware of conntrackd.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* ip6tables&lt;br /&gt;
* iptables-save, iptables-restore &lt;br /&gt;
* ip6tables-save, ip6tables-restore &lt;br /&gt;
* ipset&lt;br /&gt;
* nft&lt;br /&gt;
* ebtables&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.4 Virtual Private Networks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of OpenVPN and IPsec.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure and operate OpenVPN server and clients for both bridged and routed VPN networks.&lt;br /&gt;
* Configure and operate IPsec server and clients for routed VPN networks using IPsec-Tools / racoon.&lt;br /&gt;
* Awareness of L2TP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/*&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
* setkey&lt;br /&gt;
* /etc/ipsec-tools.conf&lt;br /&gt;
* /etc/racoon/racoon.conf&lt;br /&gt;
&lt;br /&gt;
==Other Comments for consideration==&lt;br /&gt;
&lt;br /&gt;
As examples, following items are not in the current objectives:&lt;br /&gt;
&lt;br /&gt;
1) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Wireless LAN:&amp;lt;/b&amp;gt; (Note: It’s not only for Linux though, it is necessary to consider because there are many points to be taken care for configuration in terms of security measure.)&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Some aspects (i.e. Radius) are implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
2) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to IPv6:&amp;lt;/b&amp;gt; Not only IPv4, but also IPv6 should be considered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 wherever applicable (fth)&lt;br /&gt;
&lt;br /&gt;
3) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Security features in Linux:&amp;lt;/b&amp;gt; For example, ASLR and Exec-Shield (ASCII Armor) should be considered, because it causes security level lower if those are disabled.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in host hardening in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
4) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Forensics:&amp;lt;/b&amp;gt; In the survey of malware’s behavior, Sleuth Kit would be used to analyze the hard disk on Linux machine. Also in some cases, LVM commands would be used to restore the disk which became un-mountable. So that this area should be learned.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interesting topic, but it goes beyond basic security in the sense it &amp;quot;prevention and defending&amp;quot;. This is postmortal analysis. As the exam already contains a lot of topic this is postponed but up to discussion (fth)&lt;br /&gt;
&lt;br /&gt;
5) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Database (RDB, NoSQL) security:&amp;lt;/b&amp;gt; Because Application Security (bind, apache, etc.) is covered now, this item would be nice to cover. And this item is listed in the CIF, security contest almost every time. Also the counter-measure in server side is necessary.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As the other software / service aspects beyond Linux system security have been dropped this is considered out of scope for now too (fth)&lt;br /&gt;
&lt;br /&gt;
6) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to OpenFlow:&amp;lt;/b&amp;gt; There are several points to be considered in terms of security measure about the configuration of OpenFlow.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is considered as an application aspect which seems to be beyond the scope for not (fth).&lt;br /&gt;
&lt;br /&gt;
7) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;RADIUS:&amp;lt;/b&amp;gt; This was covered in 301 though, this is not covered now. This should be covered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
8) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;DNS:&amp;lt;/b&amp;gt; More DNSSEC and DANE.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
9) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Secure development, hardening&amp;lt;/b&amp;gt;&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hardening has been implemented for both hosts and networks in V2 (fth), Secure development is considered out of scope for now (fth)&lt;br /&gt;
&lt;br /&gt;
10) Certificate Transparency&lt;br /&gt;
&lt;br /&gt;
==Changes since version 1==&lt;br /&gt;
&lt;br /&gt;
===321.3===&lt;br /&gt;
The following aspects have been removed from objective 321.3 User Management and Authentication:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Kerberos Key Distribution Centre&lt;br /&gt;
* Kerberos Principals&lt;br /&gt;
* Kerberos Tickets&lt;br /&gt;
* password cracking  &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* krb5kdc/kdc.conf&lt;br /&gt;
* kdb5_util&lt;br /&gt;
* rb5kdc/kadm5.acl&lt;br /&gt;
* kadmin, kadmin.local&lt;br /&gt;
* john&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to key servers. Managing multiple private keys and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Use GPG for encryption and signing.&lt;br /&gt;
* Configure GPG.&lt;br /&gt;
* Manage private and public keys.&lt;br /&gt;
* Interact with GPG key servers to publish and retrieve public keys. &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.6 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure and use OpenSSH.&lt;br /&gt;
* Manage OpenSSH keys and access control.&lt;br /&gt;
* Be aware of SSH protocol v1 and v2 security issues.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&lt;br /&gt;
* /etc/ssh/*&lt;br /&gt;
* ~/.ssh/*&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4319</id>
		<title>LPIC-303(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4319"/>
		<updated>2017-12-10T22:31:51Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
La descripción del programa completo [[LPIC-3]] figura en la lista [[LPIC-3 | aquí]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos son los objetivos  de la versión 2.0.0.&lt;br /&gt;
La versión [[LPIC-303 Objetivos V1 | 1.x objetivos]] se puede encontrar [[LPIC-303 Objetivos V1 | aquí]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traducciones de objetivos ==&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
* [[LPIC-303|Ingles]]&lt;br /&gt;
* [[LPIC-303(ES)|Español]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
===&#039;&#039;Topic 325: Criptografía&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.1 X.509 Certificados e Infraestructuras de Clave Pública (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand X.509 certificates and public key infrastructures. They should know how to configure and use OpenSSL to implement certification authorities and issue SSL certificates for various purposes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand X.509 certificates, X.509 certificate lifecycle, X.509 certificate fields and X.509v3 certificate extensions.&lt;br /&gt;
* Understand trust chains and public key infrastructures.&lt;br /&gt;
* Generate and manage public and private keys.&lt;br /&gt;
* Create, operate and secure a certification authority.&lt;br /&gt;
* Request, sign and manage server and client certificates.&lt;br /&gt;
* Revoke certificates and certification authorities.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* openssl, including relevant subcommands&lt;br /&gt;
* OpenSSL configuration&lt;br /&gt;
* PEM, DER, PKCS&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL&lt;br /&gt;
* OCSP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.2 X.509 Certificates for Encryption, Signing and Authentication (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use X.509 certificates for both server and client authentication. Candidates should be able to implement user and server authentication for Apache HTTPD. The version of Apache HTTPD covered is 2.4 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand of SSL, TLS and protocol versions.&lt;br /&gt;
* Understand common transport layer security threats, for example Man-in-the-Middle.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to provide HTTPS service, including SNI and HSTS.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to authenticate users using certificates.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to provide OCSP stapling.&lt;br /&gt;
* Use OpenSSL for SSL/TLS client and server tests. &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Intermediate certification authorities&lt;br /&gt;
* Cipher configuration (no cipher-specific knowledge)&lt;br /&gt;
* httpd.conf&lt;br /&gt;
* mod_ssl&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.3 Encrypted File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up and configure encrypted file systems. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand block device and file system encryption.&lt;br /&gt;
* Use dm-crypt with LUKS to encrypt block devices.&lt;br /&gt;
* Use eCryptfs to encrypt file systems, including home directories and PAM integration.&lt;br /&gt;
* Be aware of plain dm-crypt and EncFS.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* cryptsetup&lt;br /&gt;
* cryptmount&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
* ecryptfsd&lt;br /&gt;
* ecryptfs-* commands&lt;br /&gt;
* mount.ecryptfs, umount.ecryptfs&lt;br /&gt;
* pam_ecryptfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.4 DNS and Cryptography (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND. The version of BIND covered is 9.7 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DNSSEC and DANE.&lt;br /&gt;
* Configure and troubleshoot BIND as an authoritative name server serving DNSSEC secured zones.&lt;br /&gt;
* Configure BIND as an recursive name server that performs DNSSEC validation on behalf of its clients. &lt;br /&gt;
* Key Signing Key, Zone Signing Key, Key Tag&lt;br /&gt;
* Key generation, key storage, key management and key rollover&lt;br /&gt;
* Maintenance and re-signing of zones&lt;br /&gt;
* Use DANE to publish X.509 certificate information in DNS.&lt;br /&gt;
* Use TSIG for secure communication with BIND.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* DNS, EDNS, Zones, Resource Records&lt;br /&gt;
* DNS resource records: DS, DNSKEY, RRSIG, NSEC, NSEC3, NSEC3PARAM, TLSA&lt;br /&gt;
* DO-Bit, AD-Bit&lt;br /&gt;
* TSIG&lt;br /&gt;
* named.conf&lt;br /&gt;
* dnssec-keygen&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
* dnssec-settime&lt;br /&gt;
* dnssec-dsfromkey&lt;br /&gt;
* rndc&lt;br /&gt;
* dig&lt;br /&gt;
* delv&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 326: Host Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.1 Host Hardening (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure computers running Linux against common threats. This includes kernel and software configuration.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure BIOS and boot loader (GRUB 2) security.&lt;br /&gt;
* Disable useless software and services.&lt;br /&gt;
* Use sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration.&lt;br /&gt;
* Limit resource usage.&lt;br /&gt;
* Work with chroot environments.&lt;br /&gt;
* Drop unnecessary capabilities.&lt;br /&gt;
* Be aware of the security advantages of virtualization.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* grub.cfg&lt;br /&gt;
* chkconfig, systemctl&lt;br /&gt;
* ulimit&lt;br /&gt;
* /etc/security/limits.conf&lt;br /&gt;
* pam_limits.so&lt;br /&gt;
* chroot&lt;br /&gt;
* sysctl&lt;br /&gt;
* /etc/sysctl.conf&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.2 Host Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes updates and maintenance as well as automated host scans.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Use and configure the Linux Audit system.&lt;br /&gt;
* Use chkrootkit.&lt;br /&gt;
* Use and configure rkhunter, including updates.&lt;br /&gt;
* Use Linux Malware Detect.&lt;br /&gt;
* Automate host scans using cron.&lt;br /&gt;
* Configure and use AIDE, including rule management.&lt;br /&gt;
* Be aware of OpenSCAP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* auditd&lt;br /&gt;
* auditctl&lt;br /&gt;
* ausearch, aureport&lt;br /&gt;
* auditd.conf&lt;br /&gt;
* audit.rules&lt;br /&gt;
* pam_tty_audit.so&lt;br /&gt;
* chkrootkit&lt;br /&gt;
* rkhunter&lt;br /&gt;
* /etc/rkhunter.conf&lt;br /&gt;
* maldet&lt;br /&gt;
* conf.maldet&lt;br /&gt;
* aide&lt;br /&gt;
* /etc/aide/aide.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.3 User Management and Authentication (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with management and authentication of user accounts. This includes configuration and use of NSS, PAM, SSSD and Kerberos for both local and remote directories and authentication mechanisms as well as enforcing a password policy. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand and configure NSS.&lt;br /&gt;
* Understand and configure PAM.&lt;br /&gt;
* Enforce password complexity policies and periodic password changes.&lt;br /&gt;
* Lock accounts automatically after failed login attempts.&lt;br /&gt;
* Configure and use SSSD.&lt;br /&gt;
* Configure NSS and PAM for use with SSSD.&lt;br /&gt;
* Configure SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains.&lt;br /&gt;
* Obtain and manage Kerberos tickets.&lt;br /&gt;
&#039;&#039;&#039;TLa siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* /etc/login.defs&lt;br /&gt;
* pam_cracklib.so&lt;br /&gt;
* chage&lt;br /&gt;
* pam_tally.so, pam_tally2.so&lt;br /&gt;
* faillog&lt;br /&gt;
* pam_sss.so&lt;br /&gt;
* sssd&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.4 FreeIPA Installation and Samba Integration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with FreeIPA v4.x. This includes installation and maintenance of a server instance with a FreeIPA domain as well as integration of FreeIPA with Active Directory.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand FreeIPA, including its architecture and components.&lt;br /&gt;
* Understand system and configuration prerequisites for installing FreeIPA.&lt;br /&gt;
* Install and manage a FreeIPA server and domain.&lt;br /&gt;
* Understand and configure Active Directory replication and Kerberos cross-realm trusts.&lt;br /&gt;
* Be aware of sudo, autofs, SSH and SELinux integration in FreeIPA.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* 389 Directory Server, MIT Kerberos, Dogtag Certificate System, NTP, DNS, SSSD, certmonger&lt;br /&gt;
* ipa, including relevant subcommands&lt;br /&gt;
* ipa-server-install, ipa-client-install, ipa-replica-install&lt;br /&gt;
* ipa-replica-prepare, ipa-replica-manage&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 327: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.1 Discretionary Access Control (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are required to understand Discretionary Access Control and know how to implement it using Access Control Lists. Additionally, candidates are required to understand and know how to use Extended Attributes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand and manage file ownership and permissions, including SUID and SGID.&lt;br /&gt;
* Understand and manage access control lists.&lt;br /&gt;
* Understand and manage extended attributes and attribute classes.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.2 Mandatory Access Control (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with Mandatory Access Control systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the concepts of TE, RBAC, MAC and DAC.&lt;br /&gt;
* Configure, manage and use SELinux.&lt;br /&gt;
* Be aware of AppArmor and Smack.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* getenforce, setenforce, selinuxenabled&lt;br /&gt;
* getsebool, setsebool, togglesebool&lt;br /&gt;
* fixfiles, restorecon, setfiles&lt;br /&gt;
* newrole, runcon&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus, seinfo&lt;br /&gt;
* apol&lt;br /&gt;
* seaudit, seaudit-report, audit2why, audit2allow&lt;br /&gt;
* /etc/selinux/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.3 Network File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 clients and servers as well as CIFS client services. Earlier versions of NFS are not required knowledge.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand NFSv4 security issues and improvements.&lt;br /&gt;
* Configure NFSv4 server and clients.&lt;br /&gt;
* Understand and configure NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos).&lt;br /&gt;
* Understand and use NFSv4 pseudo file system.&lt;br /&gt;
* Understand and use NFSv4 ACLs.&lt;br /&gt;
* Configure CIFS clients.&lt;br /&gt;
* Understand and use CIFS Unix Extensions.&lt;br /&gt;
* Understand and configure CIFS security modes (NTLM, Kerberos).&lt;br /&gt;
* Understand and manage mapping and handling of CIFS ACLs and SIDs in a Linux system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* /etc/exports &lt;br /&gt;
* /etc/idmap.conf&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* mount.cifs parameters related to ownership, permissions and security modes&lt;br /&gt;
* winbind&lt;br /&gt;
* getcifsacl, setcifsacl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 328: Network Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.1 Network Hardening (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure networks against common threats. This includes verification of the effectiveness of security measures.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure FreeRADIUS to authenticate network nodes.&lt;br /&gt;
* Use nmap to scan networks and hosts, including different scan methods.&lt;br /&gt;
* Use Wireshark to analyze network traffic, including filters and statistics.&lt;br /&gt;
* Identify and deal with rogue router advertisements and DHCP messages.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* radiusd&lt;br /&gt;
* radmin&lt;br /&gt;
* radtest, radclient&lt;br /&gt;
* radlast, radwho&lt;br /&gt;
* radiusd.conf&lt;br /&gt;
* /etc/raddb/*&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* ndpmon&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.2 Network Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Implement bandwidth usage monitoring.&lt;br /&gt;
* Configure and use Snort, including rule management.&lt;br /&gt;
* Configure and use OpenVAS, including NASL.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* Cacti&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/*&lt;br /&gt;
* openvas-adduser, openvas-rmuser&lt;br /&gt;
* openvas-nvt-sync&lt;br /&gt;
* openvassd&lt;br /&gt;
* openvas-mkcert&lt;br /&gt;
* /etc/openvas/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.3 Packet Filtering (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of packet filters. This includes netfilter, iptables and ip6tables as well as basic knowledge of nftables, nft and ebtables.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand common firewall architectures, including DMZ.&lt;br /&gt;
* Understand and use netfilter, iptables and ip6tables, including standard modules, tests and targets.&lt;br /&gt;
* Implement packet filtering for both IPv4 and IPv6.&lt;br /&gt;
* Implement connection tracking and network address translation.&lt;br /&gt;
* Define IP sets and use them in netfilter rules.&lt;br /&gt;
* Have basic knowledge of nftables and nft.&lt;br /&gt;
* Have basic knowledge of ebtables.&lt;br /&gt;
* Be aware of conntrackd.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* ip6tables&lt;br /&gt;
* iptables-save, iptables-restore &lt;br /&gt;
* ip6tables-save, ip6tables-restore &lt;br /&gt;
* ipset&lt;br /&gt;
* nft&lt;br /&gt;
* ebtables&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.4 Virtual Private Networks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of OpenVPN and IPsec.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure and operate OpenVPN server and clients for both bridged and routed VPN networks.&lt;br /&gt;
* Configure and operate IPsec server and clients for routed VPN networks using IPsec-Tools / racoon.&lt;br /&gt;
* Awareness of L2TP.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/*&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
* setkey&lt;br /&gt;
* /etc/ipsec-tools.conf&lt;br /&gt;
* /etc/racoon/racoon.conf&lt;br /&gt;
&lt;br /&gt;
==Other Comments for consideration==&lt;br /&gt;
&lt;br /&gt;
As examples, following items are not in the current objectives:&lt;br /&gt;
&lt;br /&gt;
1) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Wireless LAN:&amp;lt;/b&amp;gt; (Note: It’s not only for Linux though, it is necessary to consider because there are many points to be taken care for configuration in terms of security measure.)&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Some aspects (i.e. Radius) are implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
2) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to IPv6:&amp;lt;/b&amp;gt; Not only IPv4, but also IPv6 should be considered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 wherever applicable (fth)&lt;br /&gt;
&lt;br /&gt;
3) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Security features in Linux:&amp;lt;/b&amp;gt; For example, ASLR and Exec-Shield (ASCII Armor) should be considered, because it causes security level lower if those are disabled.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in host hardening in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
4) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Forensics:&amp;lt;/b&amp;gt; In the survey of malware’s behavior, Sleuth Kit would be used to analyze the hard disk on Linux machine. Also in some cases, LVM commands would be used to restore the disk which became un-mountable. So that this area should be learned.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interesting topic, but it goes beyond basic security in the sense it &amp;quot;prevention and defending&amp;quot;. This is postmortal analysis. As the exam already contains a lot of topic this is postponed but up to discussion (fth)&lt;br /&gt;
&lt;br /&gt;
5) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Database (RDB, NoSQL) security:&amp;lt;/b&amp;gt; Because Application Security (bind, apache, etc.) is covered now, this item would be nice to cover. And this item is listed in the CIF, security contest almost every time. Also the counter-measure in server side is necessary.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As the other software / service aspects beyond Linux system security have been dropped this is considered out of scope for now too (fth)&lt;br /&gt;
&lt;br /&gt;
6) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to OpenFlow:&amp;lt;/b&amp;gt; There are several points to be considered in terms of security measure about the configuration of OpenFlow.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is considered as an application aspect which seems to be beyond the scope for not (fth).&lt;br /&gt;
&lt;br /&gt;
7) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;RADIUS:&amp;lt;/b&amp;gt; This was covered in 301 though, this is not covered now. This should be covered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
8) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;DNS:&amp;lt;/b&amp;gt; More DNSSEC and DANE.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
9) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Secure development, hardening&amp;lt;/b&amp;gt;&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hardening has been implemented for both hosts and networks in V2 (fth), Secure development is considered out of scope for now (fth)&lt;br /&gt;
&lt;br /&gt;
10) Certificate Transparency&lt;br /&gt;
&lt;br /&gt;
==Changes since version 1==&lt;br /&gt;
&lt;br /&gt;
===321.3===&lt;br /&gt;
The following aspects have been removed from objective 321.3 User Management and Authentication:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Kerberos Key Distribution Centre&lt;br /&gt;
* Kerberos Principals&lt;br /&gt;
* Kerberos Tickets&lt;br /&gt;
* password cracking  &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* krb5kdc/kdc.conf&lt;br /&gt;
* kdb5_util&lt;br /&gt;
* rb5kdc/kadm5.acl&lt;br /&gt;
* kadmin, kadmin.local&lt;br /&gt;
* john&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to key servers. Managing multiple private keys and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Use GPG for encryption and signing.&lt;br /&gt;
* Configure GPG.&lt;br /&gt;
* Manage private and public keys.&lt;br /&gt;
* Interact with GPG key servers to publish and retrieve public keys. &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.6 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure and use OpenSSH.&lt;br /&gt;
* Manage OpenSSH keys and access control.&lt;br /&gt;
* Be aware of SSH protocol v1 and v2 security issues.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&lt;br /&gt;
* /etc/ssh/*&lt;br /&gt;
* ~/.ssh/*&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4318</id>
		<title>LPIC-303(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4318"/>
		<updated>2017-12-10T22:29:19Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
La descripción del programa completo [[LPIC-3]] figura en la lista [[LPIC-3 | aquí]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos son los objetivos  de la versión 2.0.0.&lt;br /&gt;
La versión [[LPIC-303 Objetivos V1 | 1.x objetivos]] se puede encontrar [[LPIC-303 Objetivos V1 | aquí]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traducciones de objetivos ==&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
* [[LPIC-303|Ingles]]&lt;br /&gt;
* [[LPIC-303(ES)|Español]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
===&#039;&#039;Topic 325: Criptografía&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.1 X.509 Certificados e Infraestructuras de Clave Pública (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand X.509 certificates and public key infrastructures. They should know how to configure and use OpenSSL to implement certification authorities and issue SSL certificates for various purposes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand X.509 certificates, X.509 certificate lifecycle, X.509 certificate fields and X.509v3 certificate extensions.&lt;br /&gt;
* Understand trust chains and public key infrastructures.&lt;br /&gt;
* Generate and manage public and private keys.&lt;br /&gt;
* Create, operate and secure a certification authority.&lt;br /&gt;
* Request, sign and manage server and client certificates.&lt;br /&gt;
* Revoke certificates and certification authorities.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* openssl, including relevant subcommands&lt;br /&gt;
* OpenSSL configuration&lt;br /&gt;
* PEM, DER, PKCS&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL&lt;br /&gt;
* OCSP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.2 X.509 Certificates for Encryption, Signing and Authentication (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use X.509 certificates for both server and client authentication. Candidates should be able to implement user and server authentication for Apache HTTPD. The version of Apache HTTPD covered is 2.4 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand of SSL, TLS and protocol versions.&lt;br /&gt;
* Understand common transport layer security threats, for example Man-in-the-Middle.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to provide HTTPS service, including SNI and HSTS.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to authenticate users using certificates.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to provide OCSP stapling.&lt;br /&gt;
* Use OpenSSL for SSL/TLS client and server tests. &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Intermediate certification authorities&lt;br /&gt;
* Cipher configuration (no cipher-specific knowledge)&lt;br /&gt;
* httpd.conf&lt;br /&gt;
* mod_ssl&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.3 Encrypted File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up and configure encrypted file systems. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand block device and file system encryption.&lt;br /&gt;
* Use dm-crypt with LUKS to encrypt block devices.&lt;br /&gt;
* Use eCryptfs to encrypt file systems, including home directories and PAM integration.&lt;br /&gt;
* Be aware of plain dm-crypt and EncFS.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* cryptsetup&lt;br /&gt;
* cryptmount&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
* ecryptfsd&lt;br /&gt;
* ecryptfs-* commands&lt;br /&gt;
* mount.ecryptfs, umount.ecryptfs&lt;br /&gt;
* pam_ecryptfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.4 DNS and Cryptography (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND. The version of BIND covered is 9.7 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DNSSEC and DANE.&lt;br /&gt;
* Configure and troubleshoot BIND as an authoritative name server serving DNSSEC secured zones.&lt;br /&gt;
* Configure BIND as an recursive name server that performs DNSSEC validation on behalf of its clients. &lt;br /&gt;
* Key Signing Key, Zone Signing Key, Key Tag&lt;br /&gt;
* Key generation, key storage, key management and key rollover&lt;br /&gt;
* Maintenance and re-signing of zones&lt;br /&gt;
* Use DANE to publish X.509 certificate information in DNS.&lt;br /&gt;
* Use TSIG for secure communication with BIND.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* DNS, EDNS, Zones, Resource Records&lt;br /&gt;
* DNS resource records: DS, DNSKEY, RRSIG, NSEC, NSEC3, NSEC3PARAM, TLSA&lt;br /&gt;
* DO-Bit, AD-Bit&lt;br /&gt;
* TSIG&lt;br /&gt;
* named.conf&lt;br /&gt;
* dnssec-keygen&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
* dnssec-settime&lt;br /&gt;
* dnssec-dsfromkey&lt;br /&gt;
* rndc&lt;br /&gt;
* dig&lt;br /&gt;
* delv&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 326: Host Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.1 Host Hardening (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure computers running Linux against common threats. This includes kernel and software configuration.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure BIOS and boot loader (GRUB 2) security.&lt;br /&gt;
* Disable useless software and services.&lt;br /&gt;
* Use sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration.&lt;br /&gt;
* Limit resource usage.&lt;br /&gt;
* Work with chroot environments.&lt;br /&gt;
* Drop unnecessary capabilities.&lt;br /&gt;
* Be aware of the security advantages of virtualization.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* grub.cfg&lt;br /&gt;
* chkconfig, systemctl&lt;br /&gt;
* ulimit&lt;br /&gt;
* /etc/security/limits.conf&lt;br /&gt;
* pam_limits.so&lt;br /&gt;
* chroot&lt;br /&gt;
* sysctl&lt;br /&gt;
* /etc/sysctl.conf&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.2 Host Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes updates and maintenance as well as automated host scans.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Use and configure the Linux Audit system.&lt;br /&gt;
* Use chkrootkit.&lt;br /&gt;
* Use and configure rkhunter, including updates.&lt;br /&gt;
* Use Linux Malware Detect.&lt;br /&gt;
* Automate host scans using cron.&lt;br /&gt;
* Configure and use AIDE, including rule management.&lt;br /&gt;
* Be aware of OpenSCAP.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* auditd&lt;br /&gt;
* auditctl&lt;br /&gt;
* ausearch, aureport&lt;br /&gt;
* auditd.conf&lt;br /&gt;
* audit.rules&lt;br /&gt;
* pam_tty_audit.so&lt;br /&gt;
* chkrootkit&lt;br /&gt;
* rkhunter&lt;br /&gt;
* /etc/rkhunter.conf&lt;br /&gt;
* maldet&lt;br /&gt;
* conf.maldet&lt;br /&gt;
* aide&lt;br /&gt;
* /etc/aide/aide.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.3 User Management and Authentication (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with management and authentication of user accounts. This includes configuration and use of NSS, PAM, SSSD and Kerberos for both local and remote directories and authentication mechanisms as well as enforcing a password policy. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand and configure NSS.&lt;br /&gt;
* Understand and configure PAM.&lt;br /&gt;
* Enforce password complexity policies and periodic password changes.&lt;br /&gt;
* Lock accounts automatically after failed login attempts.&lt;br /&gt;
* Configure and use SSSD.&lt;br /&gt;
* Configure NSS and PAM for use with SSSD.&lt;br /&gt;
* Configure SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains.&lt;br /&gt;
* Obtain and manage Kerberos tickets.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* /etc/login.defs&lt;br /&gt;
* pam_cracklib.so&lt;br /&gt;
* chage&lt;br /&gt;
* pam_tally.so, pam_tally2.so&lt;br /&gt;
* faillog&lt;br /&gt;
* pam_sss.so&lt;br /&gt;
* sssd&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.4 FreeIPA Installation and Samba Integration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with FreeIPA v4.x. This includes installation and maintenance of a server instance with a FreeIPA domain as well as integration of FreeIPA with Active Directory.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand FreeIPA, including its architecture and components.&lt;br /&gt;
* Understand system and configuration prerequisites for installing FreeIPA.&lt;br /&gt;
* Install and manage a FreeIPA server and domain.&lt;br /&gt;
* Understand and configure Active Directory replication and Kerberos cross-realm trusts.&lt;br /&gt;
* Be aware of sudo, autofs, SSH and SELinux integration in FreeIPA.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* 389 Directory Server, MIT Kerberos, Dogtag Certificate System, NTP, DNS, SSSD, certmonger&lt;br /&gt;
* ipa, including relevant subcommands&lt;br /&gt;
* ipa-server-install, ipa-client-install, ipa-replica-install&lt;br /&gt;
* ipa-replica-prepare, ipa-replica-manage&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 327: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.1 Discretionary Access Control (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are required to understand Discretionary Access Control and know how to implement it using Access Control Lists. Additionally, candidates are required to understand and know how to use Extended Attributes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand and manage file ownership and permissions, including SUID and SGID.&lt;br /&gt;
* Understand and manage access control lists.&lt;br /&gt;
* Understand and manage extended attributes and attribute classes.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.2 Mandatory Access Control (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with Mandatory Access Control systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the concepts of TE, RBAC, MAC and DAC.&lt;br /&gt;
* Configure, manage and use SELinux.&lt;br /&gt;
* Be aware of AppArmor and Smack.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getenforce, setenforce, selinuxenabled&lt;br /&gt;
* getsebool, setsebool, togglesebool&lt;br /&gt;
* fixfiles, restorecon, setfiles&lt;br /&gt;
* newrole, runcon&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus, seinfo&lt;br /&gt;
* apol&lt;br /&gt;
* seaudit, seaudit-report, audit2why, audit2allow&lt;br /&gt;
* /etc/selinux/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.3 Network File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 clients and servers as well as CIFS client services. Earlier versions of NFS are not required knowledge.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand NFSv4 security issues and improvements.&lt;br /&gt;
* Configure NFSv4 server and clients.&lt;br /&gt;
* Understand and configure NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos).&lt;br /&gt;
* Understand and use NFSv4 pseudo file system.&lt;br /&gt;
* Understand and use NFSv4 ACLs.&lt;br /&gt;
* Configure CIFS clients.&lt;br /&gt;
* Understand and use CIFS Unix Extensions.&lt;br /&gt;
* Understand and configure CIFS security modes (NTLM, Kerberos).&lt;br /&gt;
* Understand and manage mapping and handling of CIFS ACLs and SIDs in a Linux system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/exports &lt;br /&gt;
* /etc/idmap.conf&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* mount.cifs parameters related to ownership, permissions and security modes&lt;br /&gt;
* winbind&lt;br /&gt;
* getcifsacl, setcifsacl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 328: Network Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.1 Network Hardening (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure networks against common threats. This includes verification of the effectiveness of security measures.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure FreeRADIUS to authenticate network nodes.&lt;br /&gt;
* Use nmap to scan networks and hosts, including different scan methods.&lt;br /&gt;
* Use Wireshark to analyze network traffic, including filters and statistics.&lt;br /&gt;
* Identify and deal with rogue router advertisements and DHCP messages.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* radiusd&lt;br /&gt;
* radmin&lt;br /&gt;
* radtest, radclient&lt;br /&gt;
* radlast, radwho&lt;br /&gt;
* radiusd.conf&lt;br /&gt;
* /etc/raddb/*&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* ndpmon&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.2 Network Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Implement bandwidth usage monitoring.&lt;br /&gt;
* Configure and use Snort, including rule management.&lt;br /&gt;
* Configure and use OpenVAS, including NASL.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* Cacti&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/*&lt;br /&gt;
* openvas-adduser, openvas-rmuser&lt;br /&gt;
* openvas-nvt-sync&lt;br /&gt;
* openvassd&lt;br /&gt;
* openvas-mkcert&lt;br /&gt;
* /etc/openvas/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.3 Packet Filtering (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of packet filters. This includes netfilter, iptables and ip6tables as well as basic knowledge of nftables, nft and ebtables.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Understand common firewall architectures, including DMZ.&lt;br /&gt;
* Understand and use netfilter, iptables and ip6tables, including standard modules, tests and targets.&lt;br /&gt;
* Implement packet filtering for both IPv4 and IPv6.&lt;br /&gt;
* Implement connection tracking and network address translation.&lt;br /&gt;
* Define IP sets and use them in netfilter rules.&lt;br /&gt;
* Have basic knowledge of nftables and nft.&lt;br /&gt;
* Have basic knowledge of ebtables.&lt;br /&gt;
* Be aware of conntrackd.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* ip6tables&lt;br /&gt;
* iptables-save, iptables-restore &lt;br /&gt;
* ip6tables-save, ip6tables-restore &lt;br /&gt;
* ipset&lt;br /&gt;
* nft&lt;br /&gt;
* ebtables&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.4 Virtual Private Networks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of OpenVPN and IPsec.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure and operate OpenVPN server and clients for both bridged and routed VPN networks.&lt;br /&gt;
* Configure and operate IPsec server and clients for routed VPN networks using IPsec-Tools / racoon.&lt;br /&gt;
* Awareness of L2TP.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/*&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
* setkey&lt;br /&gt;
* /etc/ipsec-tools.conf&lt;br /&gt;
* /etc/racoon/racoon.conf&lt;br /&gt;
&lt;br /&gt;
==Other Comments for consideration==&lt;br /&gt;
&lt;br /&gt;
As examples, following items are not in the current objectives:&lt;br /&gt;
&lt;br /&gt;
1) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Wireless LAN:&amp;lt;/b&amp;gt; (Note: It’s not only for Linux though, it is necessary to consider because there are many points to be taken care for configuration in terms of security measure.)&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Some aspects (i.e. Radius) are implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
2) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to IPv6:&amp;lt;/b&amp;gt; Not only IPv4, but also IPv6 should be considered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 wherever applicable (fth)&lt;br /&gt;
&lt;br /&gt;
3) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Security features in Linux:&amp;lt;/b&amp;gt; For example, ASLR and Exec-Shield (ASCII Armor) should be considered, because it causes security level lower if those are disabled.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in host hardening in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
4) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Forensics:&amp;lt;/b&amp;gt; In the survey of malware’s behavior, Sleuth Kit would be used to analyze the hard disk on Linux machine. Also in some cases, LVM commands would be used to restore the disk which became un-mountable. So that this area should be learned.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interesting topic, but it goes beyond basic security in the sense it &amp;quot;prevention and defending&amp;quot;. This is postmortal analysis. As the exam already contains a lot of topic this is postponed but up to discussion (fth)&lt;br /&gt;
&lt;br /&gt;
5) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Database (RDB, NoSQL) security:&amp;lt;/b&amp;gt; Because Application Security (bind, apache, etc.) is covered now, this item would be nice to cover. And this item is listed in the CIF, security contest almost every time. Also the counter-measure in server side is necessary.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As the other software / service aspects beyond Linux system security have been dropped this is considered out of scope for now too (fth)&lt;br /&gt;
&lt;br /&gt;
6) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to OpenFlow:&amp;lt;/b&amp;gt; There are several points to be considered in terms of security measure about the configuration of OpenFlow.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is considered as an application aspect which seems to be beyond the scope for not (fth).&lt;br /&gt;
&lt;br /&gt;
7) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;RADIUS:&amp;lt;/b&amp;gt; This was covered in 301 though, this is not covered now. This should be covered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
8) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;DNS:&amp;lt;/b&amp;gt; More DNSSEC and DANE.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
9) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Secure development, hardening&amp;lt;/b&amp;gt;&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hardening has been implemented for both hosts and networks in V2 (fth), Secure development is considered out of scope for now (fth)&lt;br /&gt;
&lt;br /&gt;
10) Certificate Transparency&lt;br /&gt;
&lt;br /&gt;
==Changes since version 1==&lt;br /&gt;
&lt;br /&gt;
===321.3===&lt;br /&gt;
The following aspects have been removed from objective 321.3 User Management and Authentication:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Kerberos Key Distribution Centre&lt;br /&gt;
* Kerberos Principals&lt;br /&gt;
* Kerberos Tickets&lt;br /&gt;
* password cracking  &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* krb5kdc/kdc.conf&lt;br /&gt;
* kdb5_util&lt;br /&gt;
* rb5kdc/kadm5.acl&lt;br /&gt;
* kadmin, kadmin.local&lt;br /&gt;
* john&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to key servers. Managing multiple private keys and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Use GPG for encryption and signing.&lt;br /&gt;
* Configure GPG.&lt;br /&gt;
* Manage private and public keys.&lt;br /&gt;
* Interact with GPG key servers to publish and retrieve public keys. &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.6 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Configure and use OpenSSH.&lt;br /&gt;
* Manage OpenSSH keys and access control.&lt;br /&gt;
* Be aware of SSH protocol v1 and v2 security issues.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/ssh/*&lt;br /&gt;
* ~/.ssh/*&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4317</id>
		<title>LPIC-303(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4317"/>
		<updated>2017-12-10T22:12:27Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
La descripción del programa completo [[LPIC-3]] figura en la lista [[LPIC-3 | aquí]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos son los objetivos  de la versión 2.0.0.&lt;br /&gt;
La versión [[LPIC-303 Objetivos V1 | 1.x objetivos]] se puede encontrar [[LPIC-303 Objetivos V1 | aquí]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traducciones de objetivos ==&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
* [[LPIC-303|Ingles]]&lt;br /&gt;
* [[LPIC-303(ES)|Español]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
===&#039;&#039;Topic 325: Criptografía&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.1 X.509 Certificados e Infraestructuras de Clave Pública (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand X.509 certificates and public key infrastructures. They should know how to configure and use OpenSSL to implement certification authorities and issue SSL certificates for various purposes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand X.509 certificates, X.509 certificate lifecycle, X.509 certificate fields and X.509v3 certificate extensions.&lt;br /&gt;
* Understand trust chains and public key infrastructures.&lt;br /&gt;
* Generate and manage public and private keys.&lt;br /&gt;
* Create, operate and secure a certification authority.&lt;br /&gt;
* Request, sign and manage server and client certificates.&lt;br /&gt;
* Revoke certificates and certification authorities.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* openssl, including relevant subcommands&lt;br /&gt;
* OpenSSL configuration&lt;br /&gt;
* PEM, DER, PKCS&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL&lt;br /&gt;
* OCSP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.2 X.509 Certificates for Encryption, Signing and Authentication (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use X.509 certificates for both server and client authentication. Candidates should be able to implement user and server authentication for Apache HTTPD. The version of Apache HTTPD covered is 2.4 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand of SSL, TLS and protocol versions.&lt;br /&gt;
* Understand common transport layer security threats, for example Man-in-the-Middle.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to provide HTTPS service, including SNI and HSTS.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to authenticate users using certificates.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to provide OCSP stapling.&lt;br /&gt;
* Use OpenSSL for SSL/TLS client and server tests. &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Intermediate certification authorities&lt;br /&gt;
* Cipher configuration (no cipher-specific knowledge)&lt;br /&gt;
* httpd.conf&lt;br /&gt;
* mod_ssl&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.3 Encrypted File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up and configure encrypted file systems. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand block device and file system encryption.&lt;br /&gt;
* Use dm-crypt with LUKS to encrypt block devices.&lt;br /&gt;
* Use eCryptfs to encrypt file systems, including home directories and PAM integration.&lt;br /&gt;
* Be aware of plain dm-crypt and EncFS.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* cryptsetup&lt;br /&gt;
* cryptmount&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
* ecryptfsd&lt;br /&gt;
* ecryptfs-* commands&lt;br /&gt;
* mount.ecryptfs, umount.ecryptfs&lt;br /&gt;
* pam_ecryptfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.4 DNS and Cryptography (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND. The version of BIND covered is 9.7 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DNSSEC and DANE.&lt;br /&gt;
* Configure and troubleshoot BIND as an authoritative name server serving DNSSEC secured zones.&lt;br /&gt;
* Configure BIND as an recursive name server that performs DNSSEC validation on behalf of its clients. &lt;br /&gt;
* Key Signing Key, Zone Signing Key, Key Tag&lt;br /&gt;
* Key generation, key storage, key management and key rollover&lt;br /&gt;
* Maintenance and re-signing of zones&lt;br /&gt;
* Use DANE to publish X.509 certificate information in DNS.&lt;br /&gt;
* Use TSIG for secure communication with BIND.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* DNS, EDNS, Zones, Resource Records&lt;br /&gt;
* DNS resource records: DS, DNSKEY, RRSIG, NSEC, NSEC3, NSEC3PARAM, TLSA&lt;br /&gt;
* DO-Bit, AD-Bit&lt;br /&gt;
* TSIG&lt;br /&gt;
* named.conf&lt;br /&gt;
* dnssec-keygen&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
* dnssec-settime&lt;br /&gt;
* dnssec-dsfromkey&lt;br /&gt;
* rndc&lt;br /&gt;
* dig&lt;br /&gt;
* delv&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 326: Host Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.1 Host Hardening (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure computers running Linux against common threats. This includes kernel and software configuration.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure BIOS and boot loader (GRUB 2) security.&lt;br /&gt;
* Disable useless software and services.&lt;br /&gt;
* Use sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration.&lt;br /&gt;
* Limit resource usage.&lt;br /&gt;
* Work with chroot environments.&lt;br /&gt;
* Drop unnecessary capabilities.&lt;br /&gt;
* Be aware of the security advantages of virtualization.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* grub.cfg&lt;br /&gt;
* chkconfig, systemctl&lt;br /&gt;
* ulimit&lt;br /&gt;
* /etc/security/limits.conf&lt;br /&gt;
* pam_limits.so&lt;br /&gt;
* chroot&lt;br /&gt;
* sysctl&lt;br /&gt;
* /etc/sysctl.conf&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.2 Host Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes updates and maintenance as well as automated host scans.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Use and configure the Linux Audit system.&lt;br /&gt;
* Use chkrootkit.&lt;br /&gt;
* Use and configure rkhunter, including updates.&lt;br /&gt;
* Use Linux Malware Detect.&lt;br /&gt;
* Automate host scans using cron.&lt;br /&gt;
* Configure and use AIDE, including rule management.&lt;br /&gt;
* Be aware of OpenSCAP.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* auditd&lt;br /&gt;
* auditctl&lt;br /&gt;
* ausearch, aureport&lt;br /&gt;
* auditd.conf&lt;br /&gt;
* audit.rules&lt;br /&gt;
* pam_tty_audit.so&lt;br /&gt;
* chkrootkit&lt;br /&gt;
* rkhunter&lt;br /&gt;
* /etc/rkhunter.conf&lt;br /&gt;
* maldet&lt;br /&gt;
* conf.maldet&lt;br /&gt;
* aide&lt;br /&gt;
* /etc/aide/aide.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.3 User Management and Authentication (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with management and authentication of user accounts. This includes configuration and use of NSS, PAM, SSSD and Kerberos for both local and remote directories and authentication mechanisms as well as enforcing a password policy. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand and configure NSS.&lt;br /&gt;
* Understand and configure PAM.&lt;br /&gt;
* Enforce password complexity policies and periodic password changes.&lt;br /&gt;
* Lock accounts automatically after failed login attempts.&lt;br /&gt;
* Configure and use SSSD.&lt;br /&gt;
* Configure NSS and PAM for use with SSSD.&lt;br /&gt;
* Configure SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains.&lt;br /&gt;
* Obtain and manage Kerberos tickets.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* /etc/login.defs&lt;br /&gt;
* pam_cracklib.so&lt;br /&gt;
* chage&lt;br /&gt;
* pam_tally.so, pam_tally2.so&lt;br /&gt;
* faillog&lt;br /&gt;
* pam_sss.so&lt;br /&gt;
* sssd&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.4 FreeIPA Installation and Samba Integration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with FreeIPA v4.x. This includes installation and maintenance of a server instance with a FreeIPA domain as well as integration of FreeIPA with Active Directory.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand FreeIPA, including its architecture and components.&lt;br /&gt;
* Understand system and configuration prerequisites for installing FreeIPA.&lt;br /&gt;
* Install and manage a FreeIPA server and domain.&lt;br /&gt;
* Understand and configure Active Directory replication and Kerberos cross-realm trusts.&lt;br /&gt;
* Be aware of sudo, autofs, SSH and SELinux integration in FreeIPA.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* 389 Directory Server, MIT Kerberos, Dogtag Certificate System, NTP, DNS, SSSD, certmonger&lt;br /&gt;
* ipa, including relevant subcommands&lt;br /&gt;
* ipa-server-install, ipa-client-install, ipa-replica-install&lt;br /&gt;
* ipa-replica-prepare, ipa-replica-manage&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 327: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.1 Discretionary Access Control (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are required to understand Discretionary Access Control and know how to implement it using Access Control Lists. Additionally, candidates are required to understand and know how to use Extended Attributes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand and manage file ownership and permissions, including SUID and SGID.&lt;br /&gt;
* Understand and manage access control lists.&lt;br /&gt;
* Understand and manage extended attributes and attribute classes.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.2 Mandatory Access Control (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with Mandatory Access Control systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the concepts of TE, RBAC, MAC and DAC.&lt;br /&gt;
* Configure, manage and use SELinux.&lt;br /&gt;
* Be aware of AppArmor and Smack.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getenforce, setenforce, selinuxenabled&lt;br /&gt;
* getsebool, setsebool, togglesebool&lt;br /&gt;
* fixfiles, restorecon, setfiles&lt;br /&gt;
* newrole, runcon&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus, seinfo&lt;br /&gt;
* apol&lt;br /&gt;
* seaudit, seaudit-report, audit2why, audit2allow&lt;br /&gt;
* /etc/selinux/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.3 Network File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 clients and servers as well as CIFS client services. Earlier versions of NFS are not required knowledge.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand NFSv4 security issues and improvements.&lt;br /&gt;
* Configure NFSv4 server and clients.&lt;br /&gt;
* Understand and configure NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos).&lt;br /&gt;
* Understand and use NFSv4 pseudo file system.&lt;br /&gt;
* Understand and use NFSv4 ACLs.&lt;br /&gt;
* Configure CIFS clients.&lt;br /&gt;
* Understand and use CIFS Unix Extensions.&lt;br /&gt;
* Understand and configure CIFS security modes (NTLM, Kerberos).&lt;br /&gt;
* Understand and manage mapping and handling of CIFS ACLs and SIDs in a Linux system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/exports &lt;br /&gt;
* /etc/idmap.conf&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* mount.cifs parameters related to ownership, permissions and security modes&lt;br /&gt;
* winbind&lt;br /&gt;
* getcifsacl, setcifsacl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 328: Network Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.1 Network Hardening (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure networks against common threats. This includes verification of the effectiveness of security measures.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure FreeRADIUS to authenticate network nodes.&lt;br /&gt;
* Use nmap to scan networks and hosts, including different scan methods.&lt;br /&gt;
* Use Wireshark to analyze network traffic, including filters and statistics.&lt;br /&gt;
* Identify and deal with rogue router advertisements and DHCP messages.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* radiusd&lt;br /&gt;
* radmin&lt;br /&gt;
* radtest, radclient&lt;br /&gt;
* radlast, radwho&lt;br /&gt;
* radiusd.conf&lt;br /&gt;
* /etc/raddb/*&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* ndpmon&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.2 Network Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Implement bandwidth usage monitoring.&lt;br /&gt;
* Configure and use Snort, including rule management.&lt;br /&gt;
* Configure and use OpenVAS, including NASL.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* Cacti&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/*&lt;br /&gt;
* openvas-adduser, openvas-rmuser&lt;br /&gt;
* openvas-nvt-sync&lt;br /&gt;
* openvassd&lt;br /&gt;
* openvas-mkcert&lt;br /&gt;
* /etc/openvas/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.3 Packet Filtering (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of packet filters. This includes netfilter, iptables and ip6tables as well as basic knowledge of nftables, nft and ebtables.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand common firewall architectures, including DMZ.&lt;br /&gt;
* Understand and use netfilter, iptables and ip6tables, including standard modules, tests and targets.&lt;br /&gt;
* Implement packet filtering for both IPv4 and IPv6.&lt;br /&gt;
* Implement connection tracking and network address translation.&lt;br /&gt;
* Define IP sets and use them in netfilter rules.&lt;br /&gt;
* Have basic knowledge of nftables and nft.&lt;br /&gt;
* Have basic knowledge of ebtables.&lt;br /&gt;
* Be aware of conntrackd.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* ip6tables&lt;br /&gt;
* iptables-save, iptables-restore &lt;br /&gt;
* ip6tables-save, ip6tables-restore &lt;br /&gt;
* ipset&lt;br /&gt;
* nft&lt;br /&gt;
* ebtables&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.4 Virtual Private Networks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of OpenVPN and IPsec.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure and operate OpenVPN server and clients for both bridged and routed VPN networks.&lt;br /&gt;
* Configure and operate IPsec server and clients for routed VPN networks using IPsec-Tools / racoon.&lt;br /&gt;
* Awareness of L2TP.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/*&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
* setkey&lt;br /&gt;
* /etc/ipsec-tools.conf&lt;br /&gt;
* /etc/racoon/racoon.conf&lt;br /&gt;
&lt;br /&gt;
==Other Comments for consideration==&lt;br /&gt;
&lt;br /&gt;
As examples, following items are not in the current objectives:&lt;br /&gt;
&lt;br /&gt;
1) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Wireless LAN:&amp;lt;/b&amp;gt; (Note: It’s not only for Linux though, it is necessary to consider because there are many points to be taken care for configuration in terms of security measure.)&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Some aspects (i.e. Radius) are implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
2) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to IPv6:&amp;lt;/b&amp;gt; Not only IPv4, but also IPv6 should be considered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 wherever applicable (fth)&lt;br /&gt;
&lt;br /&gt;
3) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Security features in Linux:&amp;lt;/b&amp;gt; For example, ASLR and Exec-Shield (ASCII Armor) should be considered, because it causes security level lower if those are disabled.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in host hardening in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
4) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Forensics:&amp;lt;/b&amp;gt; In the survey of malware’s behavior, Sleuth Kit would be used to analyze the hard disk on Linux machine. Also in some cases, LVM commands would be used to restore the disk which became un-mountable. So that this area should be learned.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interesting topic, but it goes beyond basic security in the sense it &amp;quot;prevention and defending&amp;quot;. This is postmortal analysis. As the exam already contains a lot of topic this is postponed but up to discussion (fth)&lt;br /&gt;
&lt;br /&gt;
5) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Database (RDB, NoSQL) security:&amp;lt;/b&amp;gt; Because Application Security (bind, apache, etc.) is covered now, this item would be nice to cover. And this item is listed in the CIF, security contest almost every time. Also the counter-measure in server side is necessary.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As the other software / service aspects beyond Linux system security have been dropped this is considered out of scope for now too (fth)&lt;br /&gt;
&lt;br /&gt;
6) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to OpenFlow:&amp;lt;/b&amp;gt; There are several points to be considered in terms of security measure about the configuration of OpenFlow.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is considered as an application aspect which seems to be beyond the scope for not (fth).&lt;br /&gt;
&lt;br /&gt;
7) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;RADIUS:&amp;lt;/b&amp;gt; This was covered in 301 though, this is not covered now. This should be covered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
8) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;DNS:&amp;lt;/b&amp;gt; More DNSSEC and DANE.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
9) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Secure development, hardening&amp;lt;/b&amp;gt;&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hardening has been implemented for both hosts and networks in V2 (fth), Secure development is considered out of scope for now (fth)&lt;br /&gt;
&lt;br /&gt;
10) Certificate Transparency&lt;br /&gt;
&lt;br /&gt;
==Changes since version 1==&lt;br /&gt;
&lt;br /&gt;
===321.3===&lt;br /&gt;
The following aspects have been removed from objective 321.3 User Management and Authentication:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Kerberos Key Distribution Centre&lt;br /&gt;
* Kerberos Principals&lt;br /&gt;
* Kerberos Tickets&lt;br /&gt;
* password cracking  &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* krb5kdc/kdc.conf&lt;br /&gt;
* kdb5_util&lt;br /&gt;
* rb5kdc/kadm5.acl&lt;br /&gt;
* kadmin, kadmin.local&lt;br /&gt;
* john&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to key servers. Managing multiple private keys and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Use GPG for encryption and signing.&lt;br /&gt;
* Configure GPG.&lt;br /&gt;
* Manage private and public keys.&lt;br /&gt;
* Interact with GPG key servers to publish and retrieve public keys. &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.6 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure and use OpenSSH.&lt;br /&gt;
* Manage OpenSSH keys and access control.&lt;br /&gt;
* Be aware of SSH protocol v1 and v2 security issues.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/ssh/*&lt;br /&gt;
* ~/.ssh/*&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4316</id>
		<title>LPIC-303(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4316"/>
		<updated>2017-12-10T22:12:06Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
La descripción del programa completo [[LPIC-3]] figura en la lista [[LPIC-3 | aquí]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos son los objetivos  de la versión 2.0.0.&lt;br /&gt;
La versión [[LPIC-303 Objetivos V1 | 1.x objetivos]] se puede encontrar [[LPIC-303 Objetivos V1 | aquí]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traducciones de objetivos ==&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
* [[LPIC-303|Ingles]]&lt;br /&gt;
* [[LPIC-303(ES)|Español]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectivos==&lt;br /&gt;
===&#039;&#039;Topic 325: Criptografía&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.1 X.509 Certificados e Infraestructuras de Clave Pública (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand X.509 certificates and public key infrastructures. They should know how to configure and use OpenSSL to implement certification authorities and issue SSL certificates for various purposes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand X.509 certificates, X.509 certificate lifecycle, X.509 certificate fields and X.509v3 certificate extensions.&lt;br /&gt;
* Understand trust chains and public key infrastructures.&lt;br /&gt;
* Generate and manage public and private keys.&lt;br /&gt;
* Create, operate and secure a certification authority.&lt;br /&gt;
* Request, sign and manage server and client certificates.&lt;br /&gt;
* Revoke certificates and certification authorities.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* openssl, including relevant subcommands&lt;br /&gt;
* OpenSSL configuration&lt;br /&gt;
* PEM, DER, PKCS&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL&lt;br /&gt;
* OCSP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.2 X.509 Certificates for Encryption, Signing and Authentication (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use X.509 certificates for both server and client authentication. Candidates should be able to implement user and server authentication for Apache HTTPD. The version of Apache HTTPD covered is 2.4 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand of SSL, TLS and protocol versions.&lt;br /&gt;
* Understand common transport layer security threats, for example Man-in-the-Middle.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to provide HTTPS service, including SNI and HSTS.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to authenticate users using certificates.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to provide OCSP stapling.&lt;br /&gt;
* Use OpenSSL for SSL/TLS client and server tests. &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Intermediate certification authorities&lt;br /&gt;
* Cipher configuration (no cipher-specific knowledge)&lt;br /&gt;
* httpd.conf&lt;br /&gt;
* mod_ssl&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.3 Encrypted File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up and configure encrypted file systems. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand block device and file system encryption.&lt;br /&gt;
* Use dm-crypt with LUKS to encrypt block devices.&lt;br /&gt;
* Use eCryptfs to encrypt file systems, including home directories and PAM integration.&lt;br /&gt;
* Be aware of plain dm-crypt and EncFS.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* cryptsetup&lt;br /&gt;
* cryptmount&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
* ecryptfsd&lt;br /&gt;
* ecryptfs-* commands&lt;br /&gt;
* mount.ecryptfs, umount.ecryptfs&lt;br /&gt;
* pam_ecryptfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.4 DNS and Cryptography (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND. The version of BIND covered is 9.7 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DNSSEC and DANE.&lt;br /&gt;
* Configure and troubleshoot BIND as an authoritative name server serving DNSSEC secured zones.&lt;br /&gt;
* Configure BIND as an recursive name server that performs DNSSEC validation on behalf of its clients. &lt;br /&gt;
* Key Signing Key, Zone Signing Key, Key Tag&lt;br /&gt;
* Key generation, key storage, key management and key rollover&lt;br /&gt;
* Maintenance and re-signing of zones&lt;br /&gt;
* Use DANE to publish X.509 certificate information in DNS.&lt;br /&gt;
* Use TSIG for secure communication with BIND.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* DNS, EDNS, Zones, Resource Records&lt;br /&gt;
* DNS resource records: DS, DNSKEY, RRSIG, NSEC, NSEC3, NSEC3PARAM, TLSA&lt;br /&gt;
* DO-Bit, AD-Bit&lt;br /&gt;
* TSIG&lt;br /&gt;
* named.conf&lt;br /&gt;
* dnssec-keygen&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
* dnssec-settime&lt;br /&gt;
* dnssec-dsfromkey&lt;br /&gt;
* rndc&lt;br /&gt;
* dig&lt;br /&gt;
* delv&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 326: Host Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.1 Host Hardening (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure computers running Linux against common threats. This includes kernel and software configuration.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure BIOS and boot loader (GRUB 2) security.&lt;br /&gt;
* Disable useless software and services.&lt;br /&gt;
* Use sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration.&lt;br /&gt;
* Limit resource usage.&lt;br /&gt;
* Work with chroot environments.&lt;br /&gt;
* Drop unnecessary capabilities.&lt;br /&gt;
* Be aware of the security advantages of virtualization.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* grub.cfg&lt;br /&gt;
* chkconfig, systemctl&lt;br /&gt;
* ulimit&lt;br /&gt;
* /etc/security/limits.conf&lt;br /&gt;
* pam_limits.so&lt;br /&gt;
* chroot&lt;br /&gt;
* sysctl&lt;br /&gt;
* /etc/sysctl.conf&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.2 Host Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes updates and maintenance as well as automated host scans.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Use and configure the Linux Audit system.&lt;br /&gt;
* Use chkrootkit.&lt;br /&gt;
* Use and configure rkhunter, including updates.&lt;br /&gt;
* Use Linux Malware Detect.&lt;br /&gt;
* Automate host scans using cron.&lt;br /&gt;
* Configure and use AIDE, including rule management.&lt;br /&gt;
* Be aware of OpenSCAP.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* auditd&lt;br /&gt;
* auditctl&lt;br /&gt;
* ausearch, aureport&lt;br /&gt;
* auditd.conf&lt;br /&gt;
* audit.rules&lt;br /&gt;
* pam_tty_audit.so&lt;br /&gt;
* chkrootkit&lt;br /&gt;
* rkhunter&lt;br /&gt;
* /etc/rkhunter.conf&lt;br /&gt;
* maldet&lt;br /&gt;
* conf.maldet&lt;br /&gt;
* aide&lt;br /&gt;
* /etc/aide/aide.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.3 User Management and Authentication (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with management and authentication of user accounts. This includes configuration and use of NSS, PAM, SSSD and Kerberos for both local and remote directories and authentication mechanisms as well as enforcing a password policy. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand and configure NSS.&lt;br /&gt;
* Understand and configure PAM.&lt;br /&gt;
* Enforce password complexity policies and periodic password changes.&lt;br /&gt;
* Lock accounts automatically after failed login attempts.&lt;br /&gt;
* Configure and use SSSD.&lt;br /&gt;
* Configure NSS and PAM for use with SSSD.&lt;br /&gt;
* Configure SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains.&lt;br /&gt;
* Obtain and manage Kerberos tickets.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* /etc/login.defs&lt;br /&gt;
* pam_cracklib.so&lt;br /&gt;
* chage&lt;br /&gt;
* pam_tally.so, pam_tally2.so&lt;br /&gt;
* faillog&lt;br /&gt;
* pam_sss.so&lt;br /&gt;
* sssd&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.4 FreeIPA Installation and Samba Integration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with FreeIPA v4.x. This includes installation and maintenance of a server instance with a FreeIPA domain as well as integration of FreeIPA with Active Directory.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand FreeIPA, including its architecture and components.&lt;br /&gt;
* Understand system and configuration prerequisites for installing FreeIPA.&lt;br /&gt;
* Install and manage a FreeIPA server and domain.&lt;br /&gt;
* Understand and configure Active Directory replication and Kerberos cross-realm trusts.&lt;br /&gt;
* Be aware of sudo, autofs, SSH and SELinux integration in FreeIPA.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* 389 Directory Server, MIT Kerberos, Dogtag Certificate System, NTP, DNS, SSSD, certmonger&lt;br /&gt;
* ipa, including relevant subcommands&lt;br /&gt;
* ipa-server-install, ipa-client-install, ipa-replica-install&lt;br /&gt;
* ipa-replica-prepare, ipa-replica-manage&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 327: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.1 Discretionary Access Control (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are required to understand Discretionary Access Control and know how to implement it using Access Control Lists. Additionally, candidates are required to understand and know how to use Extended Attributes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand and manage file ownership and permissions, including SUID and SGID.&lt;br /&gt;
* Understand and manage access control lists.&lt;br /&gt;
* Understand and manage extended attributes and attribute classes.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.2 Mandatory Access Control (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with Mandatory Access Control systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the concepts of TE, RBAC, MAC and DAC.&lt;br /&gt;
* Configure, manage and use SELinux.&lt;br /&gt;
* Be aware of AppArmor and Smack.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getenforce, setenforce, selinuxenabled&lt;br /&gt;
* getsebool, setsebool, togglesebool&lt;br /&gt;
* fixfiles, restorecon, setfiles&lt;br /&gt;
* newrole, runcon&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus, seinfo&lt;br /&gt;
* apol&lt;br /&gt;
* seaudit, seaudit-report, audit2why, audit2allow&lt;br /&gt;
* /etc/selinux/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.3 Network File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 clients and servers as well as CIFS client services. Earlier versions of NFS are not required knowledge.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand NFSv4 security issues and improvements.&lt;br /&gt;
* Configure NFSv4 server and clients.&lt;br /&gt;
* Understand and configure NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos).&lt;br /&gt;
* Understand and use NFSv4 pseudo file system.&lt;br /&gt;
* Understand and use NFSv4 ACLs.&lt;br /&gt;
* Configure CIFS clients.&lt;br /&gt;
* Understand and use CIFS Unix Extensions.&lt;br /&gt;
* Understand and configure CIFS security modes (NTLM, Kerberos).&lt;br /&gt;
* Understand and manage mapping and handling of CIFS ACLs and SIDs in a Linux system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/exports &lt;br /&gt;
* /etc/idmap.conf&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* mount.cifs parameters related to ownership, permissions and security modes&lt;br /&gt;
* winbind&lt;br /&gt;
* getcifsacl, setcifsacl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 328: Network Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.1 Network Hardening (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure networks against common threats. This includes verification of the effectiveness of security measures.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure FreeRADIUS to authenticate network nodes.&lt;br /&gt;
* Use nmap to scan networks and hosts, including different scan methods.&lt;br /&gt;
* Use Wireshark to analyze network traffic, including filters and statistics.&lt;br /&gt;
* Identify and deal with rogue router advertisements and DHCP messages.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* radiusd&lt;br /&gt;
* radmin&lt;br /&gt;
* radtest, radclient&lt;br /&gt;
* radlast, radwho&lt;br /&gt;
* radiusd.conf&lt;br /&gt;
* /etc/raddb/*&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* ndpmon&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.2 Network Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Implement bandwidth usage monitoring.&lt;br /&gt;
* Configure and use Snort, including rule management.&lt;br /&gt;
* Configure and use OpenVAS, including NASL.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* Cacti&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/*&lt;br /&gt;
* openvas-adduser, openvas-rmuser&lt;br /&gt;
* openvas-nvt-sync&lt;br /&gt;
* openvassd&lt;br /&gt;
* openvas-mkcert&lt;br /&gt;
* /etc/openvas/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.3 Packet Filtering (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of packet filters. This includes netfilter, iptables and ip6tables as well as basic knowledge of nftables, nft and ebtables.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand common firewall architectures, including DMZ.&lt;br /&gt;
* Understand and use netfilter, iptables and ip6tables, including standard modules, tests and targets.&lt;br /&gt;
* Implement packet filtering for both IPv4 and IPv6.&lt;br /&gt;
* Implement connection tracking and network address translation.&lt;br /&gt;
* Define IP sets and use them in netfilter rules.&lt;br /&gt;
* Have basic knowledge of nftables and nft.&lt;br /&gt;
* Have basic knowledge of ebtables.&lt;br /&gt;
* Be aware of conntrackd.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* ip6tables&lt;br /&gt;
* iptables-save, iptables-restore &lt;br /&gt;
* ip6tables-save, ip6tables-restore &lt;br /&gt;
* ipset&lt;br /&gt;
* nft&lt;br /&gt;
* ebtables&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.4 Virtual Private Networks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of OpenVPN and IPsec.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure and operate OpenVPN server and clients for both bridged and routed VPN networks.&lt;br /&gt;
* Configure and operate IPsec server and clients for routed VPN networks using IPsec-Tools / racoon.&lt;br /&gt;
* Awareness of L2TP.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/*&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
* setkey&lt;br /&gt;
* /etc/ipsec-tools.conf&lt;br /&gt;
* /etc/racoon/racoon.conf&lt;br /&gt;
&lt;br /&gt;
==Other Comments for consideration==&lt;br /&gt;
&lt;br /&gt;
As examples, following items are not in the current objectives:&lt;br /&gt;
&lt;br /&gt;
1) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Wireless LAN:&amp;lt;/b&amp;gt; (Note: It’s not only for Linux though, it is necessary to consider because there are many points to be taken care for configuration in terms of security measure.)&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Some aspects (i.e. Radius) are implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
2) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to IPv6:&amp;lt;/b&amp;gt; Not only IPv4, but also IPv6 should be considered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 wherever applicable (fth)&lt;br /&gt;
&lt;br /&gt;
3) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Security features in Linux:&amp;lt;/b&amp;gt; For example, ASLR and Exec-Shield (ASCII Armor) should be considered, because it causes security level lower if those are disabled.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in host hardening in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
4) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Forensics:&amp;lt;/b&amp;gt; In the survey of malware’s behavior, Sleuth Kit would be used to analyze the hard disk on Linux machine. Also in some cases, LVM commands would be used to restore the disk which became un-mountable. So that this area should be learned.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interesting topic, but it goes beyond basic security in the sense it &amp;quot;prevention and defending&amp;quot;. This is postmortal analysis. As the exam already contains a lot of topic this is postponed but up to discussion (fth)&lt;br /&gt;
&lt;br /&gt;
5) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Database (RDB, NoSQL) security:&amp;lt;/b&amp;gt; Because Application Security (bind, apache, etc.) is covered now, this item would be nice to cover. And this item is listed in the CIF, security contest almost every time. Also the counter-measure in server side is necessary.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As the other software / service aspects beyond Linux system security have been dropped this is considered out of scope for now too (fth)&lt;br /&gt;
&lt;br /&gt;
6) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to OpenFlow:&amp;lt;/b&amp;gt; There are several points to be considered in terms of security measure about the configuration of OpenFlow.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is considered as an application aspect which seems to be beyond the scope for not (fth).&lt;br /&gt;
&lt;br /&gt;
7) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;RADIUS:&amp;lt;/b&amp;gt; This was covered in 301 though, this is not covered now. This should be covered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
8) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;DNS:&amp;lt;/b&amp;gt; More DNSSEC and DANE.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
9) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Secure development, hardening&amp;lt;/b&amp;gt;&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hardening has been implemented for both hosts and networks in V2 (fth), Secure development is considered out of scope for now (fth)&lt;br /&gt;
&lt;br /&gt;
10) Certificate Transparency&lt;br /&gt;
&lt;br /&gt;
==Changes since version 1==&lt;br /&gt;
&lt;br /&gt;
===321.3===&lt;br /&gt;
The following aspects have been removed from objective 321.3 User Management and Authentication:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Kerberos Key Distribution Centre&lt;br /&gt;
* Kerberos Principals&lt;br /&gt;
* Kerberos Tickets&lt;br /&gt;
* password cracking  &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* krb5kdc/kdc.conf&lt;br /&gt;
* kdb5_util&lt;br /&gt;
* rb5kdc/kadm5.acl&lt;br /&gt;
* kadmin, kadmin.local&lt;br /&gt;
* john&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to key servers. Managing multiple private keys and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Use GPG for encryption and signing.&lt;br /&gt;
* Configure GPG.&lt;br /&gt;
* Manage private and public keys.&lt;br /&gt;
* Interact with GPG key servers to publish and retrieve public keys. &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.6 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure and use OpenSSH.&lt;br /&gt;
* Manage OpenSSH keys and access control.&lt;br /&gt;
* Be aware of SSH protocol v1 and v2 security issues.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/ssh/*&lt;br /&gt;
* ~/.ssh/*&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4315</id>
		<title>LPIC-303(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4315"/>
		<updated>2017-12-08T02:39:28Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
La descripción del programa completo [[LPIC-3]] figura en la lista [[LPIC-3 | aquí]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==nformación de versión==&lt;br /&gt;
&lt;br /&gt;
Estos son los objetivos  de la versión 2.0.0.&lt;br /&gt;
La versión [[LPIC-303 Objetivos V1 | 1.x objetivos]] se puede encontrar [[LPIC-303 Objetivos V1 | aquí]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traducciones de objetivos ==&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
* [[LPIC-303|Ingles]]&lt;br /&gt;
* [[LPIC-303(ES)|Español]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectivos==&lt;br /&gt;
===&#039;&#039;Topic 325: Criptografía&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.1 X.509 Certificados e Infraestructuras de Clave Pública (peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand X.509 certificates and public key infrastructures. They should know how to configure and use OpenSSL to implement certification authorities and issue SSL certificates for various purposes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand X.509 certificates, X.509 certificate lifecycle, X.509 certificate fields and X.509v3 certificate extensions.&lt;br /&gt;
* Understand trust chains and public key infrastructures.&lt;br /&gt;
* Generate and manage public and private keys.&lt;br /&gt;
* Create, operate and secure a certification authority.&lt;br /&gt;
* Request, sign and manage server and client certificates.&lt;br /&gt;
* Revoke certificates and certification authorities.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* openssl, including relevant subcommands&lt;br /&gt;
* OpenSSL configuration&lt;br /&gt;
* PEM, DER, PKCS&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL&lt;br /&gt;
* OCSP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.2 X.509 Certificates for Encryption, Signing and Authentication (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use X.509 certificates for both server and client authentication. Candidates should be able to implement user and server authentication for Apache HTTPD. The version of Apache HTTPD covered is 2.4 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand of SSL, TLS and protocol versions.&lt;br /&gt;
* Understand common transport layer security threats, for example Man-in-the-Middle.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to provide HTTPS service, including SNI and HSTS.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to authenticate users using certificates.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to provide OCSP stapling.&lt;br /&gt;
* Use OpenSSL for SSL/TLS client and server tests. &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Intermediate certification authorities&lt;br /&gt;
* Cipher configuration (no cipher-specific knowledge)&lt;br /&gt;
* httpd.conf&lt;br /&gt;
* mod_ssl&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.3 Encrypted File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up and configure encrypted file systems. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand block device and file system encryption.&lt;br /&gt;
* Use dm-crypt with LUKS to encrypt block devices.&lt;br /&gt;
* Use eCryptfs to encrypt file systems, including home directories and PAM integration.&lt;br /&gt;
* Be aware of plain dm-crypt and EncFS.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* cryptsetup&lt;br /&gt;
* cryptmount&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
* ecryptfsd&lt;br /&gt;
* ecryptfs-* commands&lt;br /&gt;
* mount.ecryptfs, umount.ecryptfs&lt;br /&gt;
* pam_ecryptfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.4 DNS and Cryptography (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND. The version of BIND covered is 9.7 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DNSSEC and DANE.&lt;br /&gt;
* Configure and troubleshoot BIND as an authoritative name server serving DNSSEC secured zones.&lt;br /&gt;
* Configure BIND as an recursive name server that performs DNSSEC validation on behalf of its clients. &lt;br /&gt;
* Key Signing Key, Zone Signing Key, Key Tag&lt;br /&gt;
* Key generation, key storage, key management and key rollover&lt;br /&gt;
* Maintenance and re-signing of zones&lt;br /&gt;
* Use DANE to publish X.509 certificate information in DNS.&lt;br /&gt;
* Use TSIG for secure communication with BIND.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* DNS, EDNS, Zones, Resource Records&lt;br /&gt;
* DNS resource records: DS, DNSKEY, RRSIG, NSEC, NSEC3, NSEC3PARAM, TLSA&lt;br /&gt;
* DO-Bit, AD-Bit&lt;br /&gt;
* TSIG&lt;br /&gt;
* named.conf&lt;br /&gt;
* dnssec-keygen&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
* dnssec-settime&lt;br /&gt;
* dnssec-dsfromkey&lt;br /&gt;
* rndc&lt;br /&gt;
* dig&lt;br /&gt;
* delv&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 326: Host Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.1 Host Hardening (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure computers running Linux against common threats. This includes kernel and software configuration.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure BIOS and boot loader (GRUB 2) security.&lt;br /&gt;
* Disable useless software and services.&lt;br /&gt;
* Use sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration.&lt;br /&gt;
* Limit resource usage.&lt;br /&gt;
* Work with chroot environments.&lt;br /&gt;
* Drop unnecessary capabilities.&lt;br /&gt;
* Be aware of the security advantages of virtualization.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* grub.cfg&lt;br /&gt;
* chkconfig, systemctl&lt;br /&gt;
* ulimit&lt;br /&gt;
* /etc/security/limits.conf&lt;br /&gt;
* pam_limits.so&lt;br /&gt;
* chroot&lt;br /&gt;
* sysctl&lt;br /&gt;
* /etc/sysctl.conf&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.2 Host Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes updates and maintenance as well as automated host scans.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Use and configure the Linux Audit system.&lt;br /&gt;
* Use chkrootkit.&lt;br /&gt;
* Use and configure rkhunter, including updates.&lt;br /&gt;
* Use Linux Malware Detect.&lt;br /&gt;
* Automate host scans using cron.&lt;br /&gt;
* Configure and use AIDE, including rule management.&lt;br /&gt;
* Be aware of OpenSCAP.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* auditd&lt;br /&gt;
* auditctl&lt;br /&gt;
* ausearch, aureport&lt;br /&gt;
* auditd.conf&lt;br /&gt;
* audit.rules&lt;br /&gt;
* pam_tty_audit.so&lt;br /&gt;
* chkrootkit&lt;br /&gt;
* rkhunter&lt;br /&gt;
* /etc/rkhunter.conf&lt;br /&gt;
* maldet&lt;br /&gt;
* conf.maldet&lt;br /&gt;
* aide&lt;br /&gt;
* /etc/aide/aide.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.3 User Management and Authentication (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with management and authentication of user accounts. This includes configuration and use of NSS, PAM, SSSD and Kerberos for both local and remote directories and authentication mechanisms as well as enforcing a password policy. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand and configure NSS.&lt;br /&gt;
* Understand and configure PAM.&lt;br /&gt;
* Enforce password complexity policies and periodic password changes.&lt;br /&gt;
* Lock accounts automatically after failed login attempts.&lt;br /&gt;
* Configure and use SSSD.&lt;br /&gt;
* Configure NSS and PAM for use with SSSD.&lt;br /&gt;
* Configure SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains.&lt;br /&gt;
* Obtain and manage Kerberos tickets.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* /etc/login.defs&lt;br /&gt;
* pam_cracklib.so&lt;br /&gt;
* chage&lt;br /&gt;
* pam_tally.so, pam_tally2.so&lt;br /&gt;
* faillog&lt;br /&gt;
* pam_sss.so&lt;br /&gt;
* sssd&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.4 FreeIPA Installation and Samba Integration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with FreeIPA v4.x. This includes installation and maintenance of a server instance with a FreeIPA domain as well as integration of FreeIPA with Active Directory.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand FreeIPA, including its architecture and components.&lt;br /&gt;
* Understand system and configuration prerequisites for installing FreeIPA.&lt;br /&gt;
* Install and manage a FreeIPA server and domain.&lt;br /&gt;
* Understand and configure Active Directory replication and Kerberos cross-realm trusts.&lt;br /&gt;
* Be aware of sudo, autofs, SSH and SELinux integration in FreeIPA.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* 389 Directory Server, MIT Kerberos, Dogtag Certificate System, NTP, DNS, SSSD, certmonger&lt;br /&gt;
* ipa, including relevant subcommands&lt;br /&gt;
* ipa-server-install, ipa-client-install, ipa-replica-install&lt;br /&gt;
* ipa-replica-prepare, ipa-replica-manage&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 327: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.1 Discretionary Access Control (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are required to understand Discretionary Access Control and know how to implement it using Access Control Lists. Additionally, candidates are required to understand and know how to use Extended Attributes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand and manage file ownership and permissions, including SUID and SGID.&lt;br /&gt;
* Understand and manage access control lists.&lt;br /&gt;
* Understand and manage extended attributes and attribute classes.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.2 Mandatory Access Control (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with Mandatory Access Control systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the concepts of TE, RBAC, MAC and DAC.&lt;br /&gt;
* Configure, manage and use SELinux.&lt;br /&gt;
* Be aware of AppArmor and Smack.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getenforce, setenforce, selinuxenabled&lt;br /&gt;
* getsebool, setsebool, togglesebool&lt;br /&gt;
* fixfiles, restorecon, setfiles&lt;br /&gt;
* newrole, runcon&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus, seinfo&lt;br /&gt;
* apol&lt;br /&gt;
* seaudit, seaudit-report, audit2why, audit2allow&lt;br /&gt;
* /etc/selinux/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.3 Network File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 clients and servers as well as CIFS client services. Earlier versions of NFS are not required knowledge.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand NFSv4 security issues and improvements.&lt;br /&gt;
* Configure NFSv4 server and clients.&lt;br /&gt;
* Understand and configure NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos).&lt;br /&gt;
* Understand and use NFSv4 pseudo file system.&lt;br /&gt;
* Understand and use NFSv4 ACLs.&lt;br /&gt;
* Configure CIFS clients.&lt;br /&gt;
* Understand and use CIFS Unix Extensions.&lt;br /&gt;
* Understand and configure CIFS security modes (NTLM, Kerberos).&lt;br /&gt;
* Understand and manage mapping and handling of CIFS ACLs and SIDs in a Linux system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/exports &lt;br /&gt;
* /etc/idmap.conf&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* mount.cifs parameters related to ownership, permissions and security modes&lt;br /&gt;
* winbind&lt;br /&gt;
* getcifsacl, setcifsacl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 328: Network Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.1 Network Hardening (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure networks against common threats. This includes verification of the effectiveness of security measures.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure FreeRADIUS to authenticate network nodes.&lt;br /&gt;
* Use nmap to scan networks and hosts, including different scan methods.&lt;br /&gt;
* Use Wireshark to analyze network traffic, including filters and statistics.&lt;br /&gt;
* Identify and deal with rogue router advertisements and DHCP messages.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* radiusd&lt;br /&gt;
* radmin&lt;br /&gt;
* radtest, radclient&lt;br /&gt;
* radlast, radwho&lt;br /&gt;
* radiusd.conf&lt;br /&gt;
* /etc/raddb/*&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* ndpmon&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.2 Network Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Implement bandwidth usage monitoring.&lt;br /&gt;
* Configure and use Snort, including rule management.&lt;br /&gt;
* Configure and use OpenVAS, including NASL.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* Cacti&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/*&lt;br /&gt;
* openvas-adduser, openvas-rmuser&lt;br /&gt;
* openvas-nvt-sync&lt;br /&gt;
* openvassd&lt;br /&gt;
* openvas-mkcert&lt;br /&gt;
* /etc/openvas/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.3 Packet Filtering (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of packet filters. This includes netfilter, iptables and ip6tables as well as basic knowledge of nftables, nft and ebtables.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand common firewall architectures, including DMZ.&lt;br /&gt;
* Understand and use netfilter, iptables and ip6tables, including standard modules, tests and targets.&lt;br /&gt;
* Implement packet filtering for both IPv4 and IPv6.&lt;br /&gt;
* Implement connection tracking and network address translation.&lt;br /&gt;
* Define IP sets and use them in netfilter rules.&lt;br /&gt;
* Have basic knowledge of nftables and nft.&lt;br /&gt;
* Have basic knowledge of ebtables.&lt;br /&gt;
* Be aware of conntrackd.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* ip6tables&lt;br /&gt;
* iptables-save, iptables-restore &lt;br /&gt;
* ip6tables-save, ip6tables-restore &lt;br /&gt;
* ipset&lt;br /&gt;
* nft&lt;br /&gt;
* ebtables&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.4 Virtual Private Networks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of OpenVPN and IPsec.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure and operate OpenVPN server and clients for both bridged and routed VPN networks.&lt;br /&gt;
* Configure and operate IPsec server and clients for routed VPN networks using IPsec-Tools / racoon.&lt;br /&gt;
* Awareness of L2TP.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/*&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
* setkey&lt;br /&gt;
* /etc/ipsec-tools.conf&lt;br /&gt;
* /etc/racoon/racoon.conf&lt;br /&gt;
&lt;br /&gt;
==Other Comments for consideration==&lt;br /&gt;
&lt;br /&gt;
As examples, following items are not in the current objectives:&lt;br /&gt;
&lt;br /&gt;
1) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Wireless LAN:&amp;lt;/b&amp;gt; (Note: It’s not only for Linux though, it is necessary to consider because there are many points to be taken care for configuration in terms of security measure.)&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Some aspects (i.e. Radius) are implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
2) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to IPv6:&amp;lt;/b&amp;gt; Not only IPv4, but also IPv6 should be considered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 wherever applicable (fth)&lt;br /&gt;
&lt;br /&gt;
3) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Security features in Linux:&amp;lt;/b&amp;gt; For example, ASLR and Exec-Shield (ASCII Armor) should be considered, because it causes security level lower if those are disabled.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in host hardening in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
4) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Forensics:&amp;lt;/b&amp;gt; In the survey of malware’s behavior, Sleuth Kit would be used to analyze the hard disk on Linux machine. Also in some cases, LVM commands would be used to restore the disk which became un-mountable. So that this area should be learned.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interesting topic, but it goes beyond basic security in the sense it &amp;quot;prevention and defending&amp;quot;. This is postmortal analysis. As the exam already contains a lot of topic this is postponed but up to discussion (fth)&lt;br /&gt;
&lt;br /&gt;
5) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Database (RDB, NoSQL) security:&amp;lt;/b&amp;gt; Because Application Security (bind, apache, etc.) is covered now, this item would be nice to cover. And this item is listed in the CIF, security contest almost every time. Also the counter-measure in server side is necessary.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As the other software / service aspects beyond Linux system security have been dropped this is considered out of scope for now too (fth)&lt;br /&gt;
&lt;br /&gt;
6) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to OpenFlow:&amp;lt;/b&amp;gt; There are several points to be considered in terms of security measure about the configuration of OpenFlow.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is considered as an application aspect which seems to be beyond the scope for not (fth).&lt;br /&gt;
&lt;br /&gt;
7) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;RADIUS:&amp;lt;/b&amp;gt; This was covered in 301 though, this is not covered now. This should be covered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
8) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;DNS:&amp;lt;/b&amp;gt; More DNSSEC and DANE.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
9) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Secure development, hardening&amp;lt;/b&amp;gt;&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hardening has been implemented for both hosts and networks in V2 (fth), Secure development is considered out of scope for now (fth)&lt;br /&gt;
&lt;br /&gt;
10) Certificate Transparency&lt;br /&gt;
&lt;br /&gt;
==Changes since version 1==&lt;br /&gt;
&lt;br /&gt;
===321.3===&lt;br /&gt;
The following aspects have been removed from objective 321.3 User Management and Authentication:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Kerberos Key Distribution Centre&lt;br /&gt;
* Kerberos Principals&lt;br /&gt;
* Kerberos Tickets&lt;br /&gt;
* password cracking  &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* krb5kdc/kdc.conf&lt;br /&gt;
* kdb5_util&lt;br /&gt;
* rb5kdc/kadm5.acl&lt;br /&gt;
* kadmin, kadmin.local&lt;br /&gt;
* john&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to key servers. Managing multiple private keys and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Use GPG for encryption and signing.&lt;br /&gt;
* Configure GPG.&lt;br /&gt;
* Manage private and public keys.&lt;br /&gt;
* Interact with GPG key servers to publish and retrieve public keys. &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.6 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure and use OpenSSH.&lt;br /&gt;
* Manage OpenSSH keys and access control.&lt;br /&gt;
* Be aware of SSH protocol v1 and v2 security issues.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/ssh/*&lt;br /&gt;
* ~/.ssh/*&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4314</id>
		<title>LPIC-303(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-303(ES)&amp;diff=4314"/>
		<updated>2017-12-08T02:36:11Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
The description of the entire [[LPIC-3]] programme is listed [[LPIC-3|here]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Version Information==&lt;br /&gt;
&lt;br /&gt;
These objectives are version 2.0.0.&lt;br /&gt;
&lt;br /&gt;
The version [[LPIC-303 Objectives V1|1.x objectives]] can be found [[LPIC-303 Objectives V1|here]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
The following translations of the objectives are available on this wiki:&lt;br /&gt;
* [[LPIC-303|English]]&lt;br /&gt;
* [[LPIC-303(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
===&#039;&#039;Topic 325: Cryptography&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.1 X.509 Certificates and Public Key Infrastructures (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand X.509 certificates and public key infrastructures. They should know how to configure and use OpenSSL to implement certification authorities and issue SSL certificates for various purposes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand X.509 certificates, X.509 certificate lifecycle, X.509 certificate fields and X.509v3 certificate extensions.&lt;br /&gt;
* Understand trust chains and public key infrastructures.&lt;br /&gt;
* Generate and manage public and private keys.&lt;br /&gt;
* Create, operate and secure a certification authority.&lt;br /&gt;
* Request, sign and manage server and client certificates.&lt;br /&gt;
* Revoke certificates and certification authorities.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* openssl, including relevant subcommands&lt;br /&gt;
* OpenSSL configuration&lt;br /&gt;
* PEM, DER, PKCS&lt;br /&gt;
* CSR&lt;br /&gt;
* CRL&lt;br /&gt;
* OCSP&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.2 X.509 Certificates for Encryption, Signing and Authentication (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use X.509 certificates for both server and client authentication. Candidates should be able to implement user and server authentication for Apache HTTPD. The version of Apache HTTPD covered is 2.4 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand of SSL, TLS and protocol versions.&lt;br /&gt;
* Understand common transport layer security threats, for example Man-in-the-Middle.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to provide HTTPS service, including SNI and HSTS.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to authenticate users using certificates.&lt;br /&gt;
* Configure Apache HTTPD with mod_ssl to provide OCSP stapling.&lt;br /&gt;
* Use OpenSSL for SSL/TLS client and server tests. &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Intermediate certification authorities&lt;br /&gt;
* Cipher configuration (no cipher-specific knowledge)&lt;br /&gt;
* httpd.conf&lt;br /&gt;
* mod_ssl&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.3 Encrypted File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to set up and configure encrypted file systems. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand block device and file system encryption.&lt;br /&gt;
* Use dm-crypt with LUKS to encrypt block devices.&lt;br /&gt;
* Use eCryptfs to encrypt file systems, including home directories and PAM integration.&lt;br /&gt;
* Be aware of plain dm-crypt and EncFS.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* cryptsetup&lt;br /&gt;
* cryptmount&lt;br /&gt;
* /etc/crypttab&lt;br /&gt;
* ecryptfsd&lt;br /&gt;
* ecryptfs-* commands&lt;br /&gt;
* mount.ecryptfs, umount.ecryptfs&lt;br /&gt;
* pam_ecryptfs&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;325.4 DNS and Cryptography (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of cryptography in the context of DNS and its implementation using BIND. The version of BIND covered is 9.7 or higher.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DNSSEC and DANE.&lt;br /&gt;
* Configure and troubleshoot BIND as an authoritative name server serving DNSSEC secured zones.&lt;br /&gt;
* Configure BIND as an recursive name server that performs DNSSEC validation on behalf of its clients. &lt;br /&gt;
* Key Signing Key, Zone Signing Key, Key Tag&lt;br /&gt;
* Key generation, key storage, key management and key rollover&lt;br /&gt;
* Maintenance and re-signing of zones&lt;br /&gt;
* Use DANE to publish X.509 certificate information in DNS.&lt;br /&gt;
* Use TSIG for secure communication with BIND.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* DNS, EDNS, Zones, Resource Records&lt;br /&gt;
* DNS resource records: DS, DNSKEY, RRSIG, NSEC, NSEC3, NSEC3PARAM, TLSA&lt;br /&gt;
* DO-Bit, AD-Bit&lt;br /&gt;
* TSIG&lt;br /&gt;
* named.conf&lt;br /&gt;
* dnssec-keygen&lt;br /&gt;
* dnssec-signzone&lt;br /&gt;
* dnssec-settime&lt;br /&gt;
* dnssec-dsfromkey&lt;br /&gt;
* rndc&lt;br /&gt;
* dig&lt;br /&gt;
* delv&lt;br /&gt;
* openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 326: Host Security&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.1 Host Hardening (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure computers running Linux against common threats. This includes kernel and software configuration.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure BIOS and boot loader (GRUB 2) security.&lt;br /&gt;
* Disable useless software and services.&lt;br /&gt;
* Use sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration.&lt;br /&gt;
* Limit resource usage.&lt;br /&gt;
* Work with chroot environments.&lt;br /&gt;
* Drop unnecessary capabilities.&lt;br /&gt;
* Be aware of the security advantages of virtualization.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* grub.cfg&lt;br /&gt;
* chkconfig, systemctl&lt;br /&gt;
* ulimit&lt;br /&gt;
* /etc/security/limits.conf&lt;br /&gt;
* pam_limits.so&lt;br /&gt;
* chroot&lt;br /&gt;
* sysctl&lt;br /&gt;
* /etc/sysctl.conf&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.2 Host Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of common host intrusion detection software. This includes updates and maintenance as well as automated host scans.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Use and configure the Linux Audit system.&lt;br /&gt;
* Use chkrootkit.&lt;br /&gt;
* Use and configure rkhunter, including updates.&lt;br /&gt;
* Use Linux Malware Detect.&lt;br /&gt;
* Automate host scans using cron.&lt;br /&gt;
* Configure and use AIDE, including rule management.&lt;br /&gt;
* Be aware of OpenSCAP.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* auditd&lt;br /&gt;
* auditctl&lt;br /&gt;
* ausearch, aureport&lt;br /&gt;
* auditd.conf&lt;br /&gt;
* audit.rules&lt;br /&gt;
* pam_tty_audit.so&lt;br /&gt;
* chkrootkit&lt;br /&gt;
* rkhunter&lt;br /&gt;
* /etc/rkhunter.conf&lt;br /&gt;
* maldet&lt;br /&gt;
* conf.maldet&lt;br /&gt;
* aide&lt;br /&gt;
* /etc/aide/aide.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.3 User Management and Authentication (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with management and authentication of user accounts. This includes configuration and use of NSS, PAM, SSSD and Kerberos for both local and remote directories and authentication mechanisms as well as enforcing a password policy. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand and configure NSS.&lt;br /&gt;
* Understand and configure PAM.&lt;br /&gt;
* Enforce password complexity policies and periodic password changes.&lt;br /&gt;
* Lock accounts automatically after failed login attempts.&lt;br /&gt;
* Configure and use SSSD.&lt;br /&gt;
* Configure NSS and PAM for use with SSSD.&lt;br /&gt;
* Configure SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains.&lt;br /&gt;
* Obtain and manage Kerberos tickets.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* nsswitch.conf&lt;br /&gt;
* /etc/login.defs&lt;br /&gt;
* pam_cracklib.so&lt;br /&gt;
* chage&lt;br /&gt;
* pam_tally.so, pam_tally2.so&lt;br /&gt;
* faillog&lt;br /&gt;
* pam_sss.so&lt;br /&gt;
* sssd&lt;br /&gt;
* sssd.conf&lt;br /&gt;
* sss_* commands&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* kinit, klist, kdestroy&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;326.4 FreeIPA Installation and Samba Integration (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with FreeIPA v4.x. This includes installation and maintenance of a server instance with a FreeIPA domain as well as integration of FreeIPA with Active Directory.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand FreeIPA, including its architecture and components.&lt;br /&gt;
* Understand system and configuration prerequisites for installing FreeIPA.&lt;br /&gt;
* Install and manage a FreeIPA server and domain.&lt;br /&gt;
* Understand and configure Active Directory replication and Kerberos cross-realm trusts.&lt;br /&gt;
* Be aware of sudo, autofs, SSH and SELinux integration in FreeIPA.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* 389 Directory Server, MIT Kerberos, Dogtag Certificate System, NTP, DNS, SSSD, certmonger&lt;br /&gt;
* ipa, including relevant subcommands&lt;br /&gt;
* ipa-server-install, ipa-client-install, ipa-replica-install&lt;br /&gt;
* ipa-replica-prepare, ipa-replica-manage&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 327: Access Control&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.1 Discretionary Access Control (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are required to understand Discretionary Access Control and know how to implement it using Access Control Lists. Additionally, candidates are required to understand and know how to use Extended Attributes.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand and manage file ownership and permissions, including SUID and SGID.&lt;br /&gt;
* Understand and manage access control lists.&lt;br /&gt;
* Understand and manage extended attributes and attribute classes.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getfacl&lt;br /&gt;
* setfacl&lt;br /&gt;
* getfattr&lt;br /&gt;
* setfattr &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.2 Mandatory Access Control (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with Mandatory Access Control systems for Linux. Specifically, candidates should have a thorough knowledge of SELinux. Also, candidates should be aware of other Mandatory Access Control systems for Linux. This includes major features of these systems but not configuration and use.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the concepts of TE, RBAC, MAC and DAC.&lt;br /&gt;
* Configure, manage and use SELinux.&lt;br /&gt;
* Be aware of AppArmor and Smack.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* getenforce, setenforce, selinuxenabled&lt;br /&gt;
* getsebool, setsebool, togglesebool&lt;br /&gt;
* fixfiles, restorecon, setfiles&lt;br /&gt;
* newrole, runcon&lt;br /&gt;
* semanage&lt;br /&gt;
* sestatus, seinfo&lt;br /&gt;
* apol&lt;br /&gt;
* seaudit, seaudit-report, audit2why, audit2allow&lt;br /&gt;
* /etc/selinux/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;327.3 Network File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of NFSv4 clients and servers as well as CIFS client services. Earlier versions of NFS are not required knowledge.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand NFSv4 security issues and improvements.&lt;br /&gt;
* Configure NFSv4 server and clients.&lt;br /&gt;
* Understand and configure NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos).&lt;br /&gt;
* Understand and use NFSv4 pseudo file system.&lt;br /&gt;
* Understand and use NFSv4 ACLs.&lt;br /&gt;
* Configure CIFS clients.&lt;br /&gt;
* Understand and use CIFS Unix Extensions.&lt;br /&gt;
* Understand and configure CIFS security modes (NTLM, Kerberos).&lt;br /&gt;
* Understand and manage mapping and handling of CIFS ACLs and SIDs in a Linux system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/exports &lt;br /&gt;
* /etc/idmap.conf&lt;br /&gt;
* nfs4acl&lt;br /&gt;
* mount.cifs parameters related to ownership, permissions and security modes&lt;br /&gt;
* winbind&lt;br /&gt;
* getcifsacl, setcifsacl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 328: Network Security&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.1 Network Hardening (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be able to secure networks against common threats. This includes verification of the effectiveness of security measures.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure FreeRADIUS to authenticate network nodes.&lt;br /&gt;
* Use nmap to scan networks and hosts, including different scan methods.&lt;br /&gt;
* Use Wireshark to analyze network traffic, including filters and statistics.&lt;br /&gt;
* Identify and deal with rogue router advertisements and DHCP messages.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* radiusd&lt;br /&gt;
* radmin&lt;br /&gt;
* radtest, radclient&lt;br /&gt;
* radlast, radwho&lt;br /&gt;
* radiusd.conf&lt;br /&gt;
* /etc/raddb/*&lt;br /&gt;
* nmap&lt;br /&gt;
* wireshark&lt;br /&gt;
* tshark&lt;br /&gt;
* tcpdump&lt;br /&gt;
* ndpmon&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.2 Network Intrusion Detection (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of network security scanning, network monitoring and network intrusion detection software. This includes updating and maintaining the security scanners.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Implement bandwidth usage monitoring.&lt;br /&gt;
* Configure and use Snort, including rule management.&lt;br /&gt;
* Configure and use OpenVAS, including NASL.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ntop&lt;br /&gt;
* Cacti&lt;br /&gt;
* snort&lt;br /&gt;
* snort-stat&lt;br /&gt;
* /etc/snort/*&lt;br /&gt;
* openvas-adduser, openvas-rmuser&lt;br /&gt;
* openvas-nvt-sync&lt;br /&gt;
* openvassd&lt;br /&gt;
* openvas-mkcert&lt;br /&gt;
* /etc/openvas/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.3 Packet Filtering (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use and configuration of packet filters. This includes netfilter, iptables and ip6tables as well as basic knowledge of nftables, nft and ebtables.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand common firewall architectures, including DMZ.&lt;br /&gt;
* Understand and use netfilter, iptables and ip6tables, including standard modules, tests and targets.&lt;br /&gt;
* Implement packet filtering for both IPv4 and IPv6.&lt;br /&gt;
* Implement connection tracking and network address translation.&lt;br /&gt;
* Define IP sets and use them in netfilter rules.&lt;br /&gt;
* Have basic knowledge of nftables and nft.&lt;br /&gt;
* Have basic knowledge of ebtables.&lt;br /&gt;
* Be aware of conntrackd.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* iptables&lt;br /&gt;
* ip6tables&lt;br /&gt;
* iptables-save, iptables-restore &lt;br /&gt;
* ip6tables-save, ip6tables-restore &lt;br /&gt;
* ipset&lt;br /&gt;
* nft&lt;br /&gt;
* ebtables&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;328.4 Virtual Private Networks (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be familiar with the use of OpenVPN and IPsec.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure and operate OpenVPN server and clients for both bridged and routed VPN networks.&lt;br /&gt;
* Configure and operate IPsec server and clients for routed VPN networks using IPsec-Tools / racoon.&lt;br /&gt;
* Awareness of L2TP.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/openvpn/*&lt;br /&gt;
* openvpn server and client&lt;br /&gt;
* setkey&lt;br /&gt;
* /etc/ipsec-tools.conf&lt;br /&gt;
* /etc/racoon/racoon.conf&lt;br /&gt;
&lt;br /&gt;
==Other Comments for consideration==&lt;br /&gt;
&lt;br /&gt;
As examples, following items are not in the current objectives:&lt;br /&gt;
&lt;br /&gt;
1) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Wireless LAN:&amp;lt;/b&amp;gt; (Note: It’s not only for Linux though, it is necessary to consider because there are many points to be taken care for configuration in terms of security measure.)&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Some aspects (i.e. Radius) are implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
2) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to IPv6:&amp;lt;/b&amp;gt; Not only IPv4, but also IPv6 should be considered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 wherever applicable (fth)&lt;br /&gt;
&lt;br /&gt;
3) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Security features in Linux:&amp;lt;/b&amp;gt; For example, ASLR and Exec-Shield (ASCII Armor) should be considered, because it causes security level lower if those are disabled.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in host hardening in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
4) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to Forensics:&amp;lt;/b&amp;gt; In the survey of malware’s behavior, Sleuth Kit would be used to analyze the hard disk on Linux machine. Also in some cases, LVM commands would be used to restore the disk which became un-mountable. So that this area should be learned.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is an interesting topic, but it goes beyond basic security in the sense it &amp;quot;prevention and defending&amp;quot;. This is postmortal analysis. As the exam already contains a lot of topic this is postponed but up to discussion (fth)&lt;br /&gt;
&lt;br /&gt;
5) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Database (RDB, NoSQL) security:&amp;lt;/b&amp;gt; Because Application Security (bind, apache, etc.) is covered now, this item would be nice to cover. And this item is listed in the CIF, security contest almost every time. Also the counter-measure in server side is necessary.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
As the other software / service aspects beyond Linux system security have been dropped this is considered out of scope for now too (fth)&lt;br /&gt;
&lt;br /&gt;
6) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Related to OpenFlow:&amp;lt;/b&amp;gt; There are several points to be considered in terms of security measure about the configuration of OpenFlow.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This is considered as an application aspect which seems to be beyond the scope for not (fth).&lt;br /&gt;
&lt;br /&gt;
7) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;RADIUS:&amp;lt;/b&amp;gt; This was covered in 301 though, this is not covered now. This should be covered.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
8) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;DNS:&amp;lt;/b&amp;gt; More DNSSEC and DANE.&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Implemented in V2 (fth)&lt;br /&gt;
&lt;br /&gt;
9) &amp;lt;del&amp;gt;&amp;lt;b&amp;gt;Secure development, hardening&amp;lt;/b&amp;gt;&amp;lt;/del&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hardening has been implemented for both hosts and networks in V2 (fth), Secure development is considered out of scope for now (fth)&lt;br /&gt;
&lt;br /&gt;
10) Certificate Transparency&lt;br /&gt;
&lt;br /&gt;
==Changes since version 1==&lt;br /&gt;
&lt;br /&gt;
===321.3===&lt;br /&gt;
The following aspects have been removed from objective 321.3 User Management and Authentication:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Kerberos Key Distribution Centre&lt;br /&gt;
* Kerberos Principals&lt;br /&gt;
* Kerberos Tickets&lt;br /&gt;
* password cracking  &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* krb5.conf&lt;br /&gt;
* krb5kdc/kdc.conf&lt;br /&gt;
* kdb5_util&lt;br /&gt;
* rb5kdc/kadm5.acl&lt;br /&gt;
* kadmin, kadmin.local&lt;br /&gt;
* john&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.3 Advanced GPG&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to use GPG. This includes key generation, signing and publishing to key servers. Managing multiple private keys and IDs is also included.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Use GPG for encryption and signing.&lt;br /&gt;
* Configure GPG.&lt;br /&gt;
* Manage private and public keys.&lt;br /&gt;
* Interact with GPG key servers to publish and retrieve public keys. &lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* gpg&lt;br /&gt;
* gpgv&lt;br /&gt;
* gpg-agent&lt;br /&gt;
* ~/.gnupg/*&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;320.6 OpenSSH&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | To be determined&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience and knowledge of security issues in use and configuration of OpenSSH SSH services. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Configure and use OpenSSH.&lt;br /&gt;
* Manage OpenSSH keys and access control.&lt;br /&gt;
* Be aware of SSH protocol v1 and v2 security issues.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* /etc/ssh/*&lt;br /&gt;
* ~/.ssh/*&lt;br /&gt;
* ssh-keygen&lt;br /&gt;
* ssh-agent&lt;br /&gt;
* ssh-vulnkey &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4313</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4313"/>
		<updated>2017-12-08T02:26:22Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* Topic 397: Working with Linux and Windows Clients */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: Configuración de OpenLDAP&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Replicación de OpenLDAP (Pesot: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con la replicación del servidor disponible con OpenLDAP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conceptos de replicación&lt;br /&gt;
* Configurar la replicación de OpenLDAP&lt;br /&gt;
* Analizar archivos de registro de replicación&lt;br /&gt;
* Comprender los centros de réplica&lt;br /&gt;
* Referencias de LDAP&lt;br /&gt;
* Replicación de sincronización LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* servidor maestro / esclavo&lt;br /&gt;
* replicación multi-master&lt;br /&gt;
* consumer&lt;br /&gt;
* hub de réplica&lt;br /&gt;
* modo one-shot&lt;br /&gt;
* referral&lt;br /&gt;
* syncrepl&lt;br /&gt;
* sincronización basada en pull / basado en push&lt;br /&gt;
* refreshOnly and refreshAndPersist&lt;br /&gt;
* replog&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.2  Asegurar el directorio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder configurar el acceso codificado al directorio LDAP y restringir el acceso al nivel del firewall.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Asegurar el directorio con SSL y TLS&lt;br /&gt;
* Consideraciones de firewall&lt;br /&gt;
* Métodos de acceso no autenticado&lt;br /&gt;
* Métodos de autenticación de usuario / contraseña&lt;br /&gt;
* Mantenimiento del usuario SASL DB&lt;br /&gt;
* Certificados de cliente / servidor&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL / TLS&lt;br /&gt;
* Factores de fortaleza de seguridad (SSF)&lt;br /&gt;
* SASL&lt;br /&gt;
* autorización de proxy&lt;br /&gt;
* StartTLS&lt;br /&gt;
* iptables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.3  Ajuste del rendimiento del servidor OpenLDAP (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de medir el rendimiento de un servidor LDAP y ajustar las directivas de configuración.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Medir el rendimiento de OpenLDAP&lt;br /&gt;
* Ajuste la configuración del software para aumentar el rendimiento&lt;br /&gt;
* Comprender los índices&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* index&lt;br /&gt;
* DB_CONFIG&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 391: OpenLDAP como un backend de autenticación&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.1 Integración LDAP con PAM y NSS (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar PAM y NSS para recuperar información de un directorio LDAP.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar PAM para usar LDAP para autenticación&lt;br /&gt;
* Configurar NSS para recuperar información de LDAP&lt;br /&gt;
* Configurar módulos PAM en varios entornos Unix&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM&lt;br /&gt;
* NSS&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
* /etc/nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.2 Integración de LDAP con Active Directory y Kerberos (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder integrar LDAP con los Servicios de Active Directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Integración de Kerberos con LDAP&lt;br /&gt;
* Autenticación multiplataforma&lt;br /&gt;
* Conceptos de inicio de sesión único&lt;br /&gt;
* Limitaciones de integración y compatibilidad entre OpenLDAP y Active Directory&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos&lt;br /&gt;
* Directorio Activo&lt;br /&gt;
* inicio de sesión único&lt;br /&gt;
* DNS&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 392: Conceptos básicos de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.1 Arquitectura y conceptos de Samba  (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben entender los conceptos esenciales de Samba. Además, las principales diferencias entre Samba3 y Samba4 deberían conocerse.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender los roles de los demonios y componentes de Samba&lt;br /&gt;
* Comprender los problemas clave relacionados con las redes heterogéneas&lt;br /&gt;
* Identificar los puertos clave TCP / UDP utilizados con SMB / CIFS&lt;br /&gt;
* Conocimiento de las diferencias entre Samba3 y Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
* Samba daemons: smbd, nmbd, samba, winbindd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.2 Configurar Samba (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar los demonios Samba para una amplia variedad de propósitos.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento de la estructura del archivo de configuración del servidor Samba&lt;br /&gt;
* Conocimiento de variables de Samba y parámetros de configuración&lt;br /&gt;
* Solucionar problemas y depurar problemas de configuración con Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smb.conf parameters&lt;br /&gt;
* smb.conf variables&lt;br /&gt;
* testparm&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.3 Mantenimiento regular de samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben conocer las diversas herramientas y utilidades que forman parte de una instalación de Samba.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Controla e interactúa con los daemons de Samba mientras estan en ejecución&lt;br /&gt;
* Realizar copias de seguridad periódicas de la configuración de Samba y sus datos de estado&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smbcontrol&lt;br /&gt;
* smbstatus&lt;br /&gt;
* tdbbackup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.4 Solución de problemas de Samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender la estructura de los archivos triviales de la base de datos y saber cómo solucionar los problemas.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar el registro de Samba&lt;br /&gt;
* Copia de seguridad de archivos TDB&lt;br /&gt;
* Restaurar archivos TDB&lt;br /&gt;
* Identifica los corrupción del archivo TDB&lt;br /&gt;
* Editar / listar contenido del archivo TDB&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/log/samba/&lt;br /&gt;
* log level&lt;br /&gt;
* debuglevel&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* pdbedit&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
* tdbbackup&lt;br /&gt;
* tdbdump&lt;br /&gt;
* tdbrestore&lt;br /&gt;
* tdbtool&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.5 Internacionalización (Peso: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder trabajar con códigos de caracteres de internacionalización y páginas de códigos.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender códigos de caracteres de internacionalización y páginas de códigos&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a compartir, archivos y nombres de directorios en un entorno que no sea inglés&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a los nombres de usuarios y grupos en un entorno que no es inglés&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a la denominación de la computadora en un entorno que no sea inglés&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* internacionalización&lt;br /&gt;
* códigos de caracteres&lt;br /&gt;
* páginas de códigos&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dos charset, display charset y unix charset&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 393: Configuración de Samba Share&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.1 Servicios de archivo (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de crear y configurar archivos compartidos en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Crear y configurar archivos compartidos&lt;br /&gt;
* Plan de migración del servicio de archivos&lt;br /&gt;
* Limite el acceso a IPC $&lt;br /&gt;
* Crear scripts para el manejo de usuarios y grupos de archivos compartidos&lt;br /&gt;
* Parámetros de configuración de acceso de Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [homes]&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* smbsh&lt;br /&gt;
* browseable, writeable, valid users, write list, read list, read only and guest ok&lt;br /&gt;
* IPC$&lt;br /&gt;
* mount, smbmount&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.2 Sistema de archivos Linux y permisos de Compartir / Servicio(Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender los permisos de archivos en un sistema de archivos Linux en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento del control de permisos de archivos / directorios&lt;br /&gt;
* Comprender cómo interactúa Samba con los permisos del sistema de archivos de Linux y las ACL&lt;br /&gt;
* Utilice Samba VFS para almacenar las ACL de Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* chmod, chown&lt;br /&gt;
* create mask, directory mask, force create mode, force directory mode&lt;br /&gt;
* smbcacls&lt;br /&gt;
* getfacl, setfacl&lt;br /&gt;
* vfs_acl_xattr, vfs_acl_tdb and vfs objects&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.3 Servicios de impresión (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían ser capaces de crear y administrar recursos compartidos de impresión en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Crear y configurar el uso compartido de impresoras&lt;br /&gt;
* Configurar la integración entre Samba y CUPS&lt;br /&gt;
* Administrar los controladores de impresión de Windows y configurar la descarga de los controladores de impresión&lt;br /&gt;
* Configurar [imprimir $]&lt;br /&gt;
* Comprender las preocupaciones de seguridad con el uso compartido de impresoras&lt;br /&gt;
* Carga de controladores de impresora para la instalación del controlador Point&#039;n&#039;Print con &#039;Asistente para Agregar controlador de impresora&#039; en Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [print$]&lt;br /&gt;
* CUPS&lt;br /&gt;
* cupsd.conf&lt;br /&gt;
* /var/spool/samba/&lt;br /&gt;
* smbspool&lt;br /&gt;
* rpcclient&lt;br /&gt;
* net&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 394: Gestion de Usuarios y Grupos de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.1 Gestión de cuentas y grupos de usuarios  (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de administrar cuentas de usuarios y grupos en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Administrador de cuentas de usuarios y grupos&lt;br /&gt;
* Comprender el mapeo de usuarios y grupos&lt;br /&gt;
* Conocimiento de herramientas de administración de cuentas de usuario&lt;br /&gt;
* Uso del programa smbpasswd&lt;br /&gt;
* Forzar las propiedades de los objetos de archivos y directorios&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* pdbedit&lt;br /&gt;
* smb.conf&lt;br /&gt;
* samba-tool user (con subcomandos)&lt;br /&gt;
* samba-tool group (con subcommands)&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
* force user, force group&lt;br /&gt;
* idmap&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.2 Autenticación, autorización y Winbind (Peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender los diversos mecanismos de autenticación y configurar el control de acceso. Los candidatos deberían poder instalar y configurar el servicio Winbind.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar una base de datos de contraseñas local&lt;br /&gt;
* Realizar sincronización de contraseña&lt;br /&gt;
* Conocimiento de diferentes backends de passdb&lt;br /&gt;
* Convert between Samba passdb backends&lt;br /&gt;
* Integrar Samba con LDAP&lt;br /&gt;
* Configurar el servicio de Winbind&lt;br /&gt;
* Configurar PAM y NSS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbpasswd, tdbsam, ldapsam&lt;br /&gt;
* passdb backend&lt;br /&gt;
* libnss_winbind&lt;br /&gt;
* libpam_winbind&lt;br /&gt;
* libpam_smbpass&lt;br /&gt;
* wbinfo&lt;br /&gt;
* getent&lt;br /&gt;
* SID and foreign SID&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 395: Integración de dominios Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.1 Samba como PDC y BDC (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían ser capaces de configurar y mantener los controladores de dominio principales y de respaldo. Los candidatos deberían poder administrar el acceso de los clientes de Windows / Linux a los dominios  del estilo NT.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender y configurar membresía de dominio y relaciones de confianza&lt;br /&gt;
* Crear y mantener un controlador de dominio principal con Samba3 y Samba4&lt;br /&gt;
* Crear y mantener un controlador de dominio de respaldo con Samba3 y Samba4&lt;br /&gt;
* Agregar computadoras a un dominio existente&lt;br /&gt;
* Configurar scripts de inicio de sesión&lt;br /&gt;
* Configurar perfiles itinerantes&lt;br /&gt;
* Configurar políticas del sistema&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* security mode&lt;br /&gt;
* server role&lt;br /&gt;
* domain logons&lt;br /&gt;
* domain master&lt;br /&gt;
* logon script&lt;br /&gt;
* logon path&lt;br /&gt;
* NTConfig.pol&lt;br /&gt;
* net&lt;br /&gt;
* profiles&lt;br /&gt;
* add machine script&lt;br /&gt;
* profile acls&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.2 Samba4 como controlador de dominio compatible con AD (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder configurar Samba 4 como un controlador de dominio AD.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar y probar Samba 4 como AD DC&lt;br /&gt;
* Uso de smbclient para confirmar la operación de AD&lt;br /&gt;
* Comprender cómo se integra Samba con los servicios de AD: DNS, Kerberos, NTP, LDAP&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* samba-tool domain (with subcommands)&lt;br /&gt;
* samba&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.3 Configurar Samba como servidor de miembros de dominio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de integrar servidores Linux en un entorno donde esté presente Active Directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unirse a Samba a un dominio NT4 existente&lt;br /&gt;
* Unirse a Samba a un dominio de AD existente&lt;br /&gt;
* Capacidad de obtener un TGT de un KDC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* server security&lt;br /&gt;
* net command&lt;br /&gt;
* kinit, TGT and REALM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 396: Servicios de nombres de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.1 NetBIOS y WINS  (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con los conceptos NetBIOS / WINS y comprender la navegación de red.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Entender los conceptos de WINS&lt;br /&gt;
* Comprender los conceptos de NetBIOS&lt;br /&gt;
* Comprender el papel de un navegador maestro local&lt;br /&gt;
* Comprender el papel de un navegador maestro de dominio&lt;br /&gt;
* Comprender el papel de Samba como servidor WINS&lt;br /&gt;
* Entender la resolución del nombre&lt;br /&gt;
* Configurar Samba como un servidor WINS&lt;br /&gt;
* Configurar la replicación de WINS&lt;br /&gt;
* Comprender la navegación de NetBIOS y las elecciones de navegador&lt;br /&gt;
* Comprender los tipos de nombre NETBIOS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* nmblookup&lt;br /&gt;
* smbclient&lt;br /&gt;
* name resolve order&lt;br /&gt;
* lmhosts&lt;br /&gt;
* wins support, wins server, wins proxy, dns proxy&lt;br /&gt;
* domain master, os level, preferred master&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.2 Resolución de nombre de Active Directory  (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con el servidor DNS interno con Samba4.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender y gestionar DNS para Samba4 como un controlador de dominio AD&lt;br /&gt;
* Reenvío de DNS con el servidor DNS interno de Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba-tool dns (with subcommands)&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dns forwarder&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
* dig, host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 397: Trabajar con clientes Linux y Windows&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.1 Integración de CIFS (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben sentirse cómodos trabajando con CIFS en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Entender los conceptos SMB / CIFS&lt;br /&gt;
* Acceda y monte recursos compartidos de CIFS remotos desde un cliente de Linux&lt;br /&gt;
* Almacenamiento seguro de credenciales CIFS&lt;br /&gt;
* Comprender las características y los beneficios de CIFS&lt;br /&gt;
* Comprender los permisos y la propiedad de archivos de acciones compartidas de CIFS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SMB/CIFS&lt;br /&gt;
* mount, mount.cifs&lt;br /&gt;
* smbclient&lt;br /&gt;
* smbget&lt;br /&gt;
* smbtar&lt;br /&gt;
* smbtree&lt;br /&gt;
* findsmb&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.2 Trabajar con clientes de Windows (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder interactuar con clientes remotos de Windows y configurar estaciones de trabajo de Windows para acceder a los servicios de archivo e impresión desde servidores Linux.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento de clientes de Windows&lt;br /&gt;
* Explorar listas de exploración y clientes SMB desde Windows&lt;br /&gt;
* Compartir archivos / imprimir recursos desde Windows&lt;br /&gt;
* Uso del programa smbclient&lt;br /&gt;
* Uso de la utilidad de red de Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Windows net command&lt;br /&gt;
* smbclient&lt;br /&gt;
* control panel&lt;br /&gt;
* rdesktop&lt;br /&gt;
* workgroup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4312</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4312"/>
		<updated>2017-12-08T02:15:32Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* Topic 396: Samba Name Services */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: Configuración de OpenLDAP&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Replicación de OpenLDAP (Pesot: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con la replicación del servidor disponible con OpenLDAP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conceptos de replicación&lt;br /&gt;
* Configurar la replicación de OpenLDAP&lt;br /&gt;
* Analizar archivos de registro de replicación&lt;br /&gt;
* Comprender los centros de réplica&lt;br /&gt;
* Referencias de LDAP&lt;br /&gt;
* Replicación de sincronización LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* servidor maestro / esclavo&lt;br /&gt;
* replicación multi-master&lt;br /&gt;
* consumer&lt;br /&gt;
* hub de réplica&lt;br /&gt;
* modo one-shot&lt;br /&gt;
* referral&lt;br /&gt;
* syncrepl&lt;br /&gt;
* sincronización basada en pull / basado en push&lt;br /&gt;
* refreshOnly and refreshAndPersist&lt;br /&gt;
* replog&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.2  Asegurar el directorio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder configurar el acceso codificado al directorio LDAP y restringir el acceso al nivel del firewall.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Asegurar el directorio con SSL y TLS&lt;br /&gt;
* Consideraciones de firewall&lt;br /&gt;
* Métodos de acceso no autenticado&lt;br /&gt;
* Métodos de autenticación de usuario / contraseña&lt;br /&gt;
* Mantenimiento del usuario SASL DB&lt;br /&gt;
* Certificados de cliente / servidor&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL / TLS&lt;br /&gt;
* Factores de fortaleza de seguridad (SSF)&lt;br /&gt;
* SASL&lt;br /&gt;
* autorización de proxy&lt;br /&gt;
* StartTLS&lt;br /&gt;
* iptables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.3  Ajuste del rendimiento del servidor OpenLDAP (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de medir el rendimiento de un servidor LDAP y ajustar las directivas de configuración.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Medir el rendimiento de OpenLDAP&lt;br /&gt;
* Ajuste la configuración del software para aumentar el rendimiento&lt;br /&gt;
* Comprender los índices&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* index&lt;br /&gt;
* DB_CONFIG&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 391: OpenLDAP como un backend de autenticación&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.1 Integración LDAP con PAM y NSS (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar PAM y NSS para recuperar información de un directorio LDAP.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar PAM para usar LDAP para autenticación&lt;br /&gt;
* Configurar NSS para recuperar información de LDAP&lt;br /&gt;
* Configurar módulos PAM en varios entornos Unix&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM&lt;br /&gt;
* NSS&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
* /etc/nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.2 Integración de LDAP con Active Directory y Kerberos (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder integrar LDAP con los Servicios de Active Directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Integración de Kerberos con LDAP&lt;br /&gt;
* Autenticación multiplataforma&lt;br /&gt;
* Conceptos de inicio de sesión único&lt;br /&gt;
* Limitaciones de integración y compatibilidad entre OpenLDAP y Active Directory&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos&lt;br /&gt;
* Directorio Activo&lt;br /&gt;
* inicio de sesión único&lt;br /&gt;
* DNS&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 392: Conceptos básicos de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.1 Arquitectura y conceptos de Samba  (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben entender los conceptos esenciales de Samba. Además, las principales diferencias entre Samba3 y Samba4 deberían conocerse.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender los roles de los demonios y componentes de Samba&lt;br /&gt;
* Comprender los problemas clave relacionados con las redes heterogéneas&lt;br /&gt;
* Identificar los puertos clave TCP / UDP utilizados con SMB / CIFS&lt;br /&gt;
* Conocimiento de las diferencias entre Samba3 y Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
* Samba daemons: smbd, nmbd, samba, winbindd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.2 Configurar Samba (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar los demonios Samba para una amplia variedad de propósitos.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento de la estructura del archivo de configuración del servidor Samba&lt;br /&gt;
* Conocimiento de variables de Samba y parámetros de configuración&lt;br /&gt;
* Solucionar problemas y depurar problemas de configuración con Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smb.conf parameters&lt;br /&gt;
* smb.conf variables&lt;br /&gt;
* testparm&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.3 Mantenimiento regular de samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben conocer las diversas herramientas y utilidades que forman parte de una instalación de Samba.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Controla e interactúa con los daemons de Samba mientras estan en ejecución&lt;br /&gt;
* Realizar copias de seguridad periódicas de la configuración de Samba y sus datos de estado&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smbcontrol&lt;br /&gt;
* smbstatus&lt;br /&gt;
* tdbbackup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.4 Solución de problemas de Samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender la estructura de los archivos triviales de la base de datos y saber cómo solucionar los problemas.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar el registro de Samba&lt;br /&gt;
* Copia de seguridad de archivos TDB&lt;br /&gt;
* Restaurar archivos TDB&lt;br /&gt;
* Identifica los corrupción del archivo TDB&lt;br /&gt;
* Editar / listar contenido del archivo TDB&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/log/samba/&lt;br /&gt;
* log level&lt;br /&gt;
* debuglevel&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* pdbedit&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
* tdbbackup&lt;br /&gt;
* tdbdump&lt;br /&gt;
* tdbrestore&lt;br /&gt;
* tdbtool&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.5 Internacionalización (Peso: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder trabajar con códigos de caracteres de internacionalización y páginas de códigos.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender códigos de caracteres de internacionalización y páginas de códigos&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a compartir, archivos y nombres de directorios en un entorno que no sea inglés&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a los nombres de usuarios y grupos en un entorno que no es inglés&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a la denominación de la computadora en un entorno que no sea inglés&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* internacionalización&lt;br /&gt;
* códigos de caracteres&lt;br /&gt;
* páginas de códigos&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dos charset, display charset y unix charset&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 393: Configuración de Samba Share&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.1 Servicios de archivo (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de crear y configurar archivos compartidos en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Crear y configurar archivos compartidos&lt;br /&gt;
* Plan de migración del servicio de archivos&lt;br /&gt;
* Limite el acceso a IPC $&lt;br /&gt;
* Crear scripts para el manejo de usuarios y grupos de archivos compartidos&lt;br /&gt;
* Parámetros de configuración de acceso de Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [homes]&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* smbsh&lt;br /&gt;
* browseable, writeable, valid users, write list, read list, read only and guest ok&lt;br /&gt;
* IPC$&lt;br /&gt;
* mount, smbmount&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.2 Sistema de archivos Linux y permisos de Compartir / Servicio(Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender los permisos de archivos en un sistema de archivos Linux en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento del control de permisos de archivos / directorios&lt;br /&gt;
* Comprender cómo interactúa Samba con los permisos del sistema de archivos de Linux y las ACL&lt;br /&gt;
* Utilice Samba VFS para almacenar las ACL de Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* chmod, chown&lt;br /&gt;
* create mask, directory mask, force create mode, force directory mode&lt;br /&gt;
* smbcacls&lt;br /&gt;
* getfacl, setfacl&lt;br /&gt;
* vfs_acl_xattr, vfs_acl_tdb and vfs objects&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.3 Servicios de impresión (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían ser capaces de crear y administrar recursos compartidos de impresión en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Crear y configurar el uso compartido de impresoras&lt;br /&gt;
* Configurar la integración entre Samba y CUPS&lt;br /&gt;
* Administrar los controladores de impresión de Windows y configurar la descarga de los controladores de impresión&lt;br /&gt;
* Configurar [imprimir $]&lt;br /&gt;
* Comprender las preocupaciones de seguridad con el uso compartido de impresoras&lt;br /&gt;
* Carga de controladores de impresora para la instalación del controlador Point&#039;n&#039;Print con &#039;Asistente para Agregar controlador de impresora&#039; en Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [print$]&lt;br /&gt;
* CUPS&lt;br /&gt;
* cupsd.conf&lt;br /&gt;
* /var/spool/samba/&lt;br /&gt;
* smbspool&lt;br /&gt;
* rpcclient&lt;br /&gt;
* net&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 394: Gestion de Usuarios y Grupos de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.1 Gestión de cuentas y grupos de usuarios  (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de administrar cuentas de usuarios y grupos en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Administrador de cuentas de usuarios y grupos&lt;br /&gt;
* Comprender el mapeo de usuarios y grupos&lt;br /&gt;
* Conocimiento de herramientas de administración de cuentas de usuario&lt;br /&gt;
* Uso del programa smbpasswd&lt;br /&gt;
* Forzar las propiedades de los objetos de archivos y directorios&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* pdbedit&lt;br /&gt;
* smb.conf&lt;br /&gt;
* samba-tool user (con subcomandos)&lt;br /&gt;
* samba-tool group (con subcommands)&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
* force user, force group&lt;br /&gt;
* idmap&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.2 Autenticación, autorización y Winbind (Peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender los diversos mecanismos de autenticación y configurar el control de acceso. Los candidatos deberían poder instalar y configurar el servicio Winbind.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar una base de datos de contraseñas local&lt;br /&gt;
* Realizar sincronización de contraseña&lt;br /&gt;
* Conocimiento de diferentes backends de passdb&lt;br /&gt;
* Convert between Samba passdb backends&lt;br /&gt;
* Integrar Samba con LDAP&lt;br /&gt;
* Configurar el servicio de Winbind&lt;br /&gt;
* Configurar PAM y NSS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbpasswd, tdbsam, ldapsam&lt;br /&gt;
* passdb backend&lt;br /&gt;
* libnss_winbind&lt;br /&gt;
* libpam_winbind&lt;br /&gt;
* libpam_smbpass&lt;br /&gt;
* wbinfo&lt;br /&gt;
* getent&lt;br /&gt;
* SID and foreign SID&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 395: Integración de dominios Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.1 Samba como PDC y BDC (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían ser capaces de configurar y mantener los controladores de dominio principales y de respaldo. Los candidatos deberían poder administrar el acceso de los clientes de Windows / Linux a los dominios  del estilo NT.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender y configurar membresía de dominio y relaciones de confianza&lt;br /&gt;
* Crear y mantener un controlador de dominio principal con Samba3 y Samba4&lt;br /&gt;
* Crear y mantener un controlador de dominio de respaldo con Samba3 y Samba4&lt;br /&gt;
* Agregar computadoras a un dominio existente&lt;br /&gt;
* Configurar scripts de inicio de sesión&lt;br /&gt;
* Configurar perfiles itinerantes&lt;br /&gt;
* Configurar políticas del sistema&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* security mode&lt;br /&gt;
* server role&lt;br /&gt;
* domain logons&lt;br /&gt;
* domain master&lt;br /&gt;
* logon script&lt;br /&gt;
* logon path&lt;br /&gt;
* NTConfig.pol&lt;br /&gt;
* net&lt;br /&gt;
* profiles&lt;br /&gt;
* add machine script&lt;br /&gt;
* profile acls&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.2 Samba4 como controlador de dominio compatible con AD (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder configurar Samba 4 como un controlador de dominio AD.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar y probar Samba 4 como AD DC&lt;br /&gt;
* Uso de smbclient para confirmar la operación de AD&lt;br /&gt;
* Comprender cómo se integra Samba con los servicios de AD: DNS, Kerberos, NTP, LDAP&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* samba-tool domain (with subcommands)&lt;br /&gt;
* samba&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.3 Configurar Samba como servidor de miembros de dominio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de integrar servidores Linux en un entorno donde esté presente Active Directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unirse a Samba a un dominio NT4 existente&lt;br /&gt;
* Unirse a Samba a un dominio de AD existente&lt;br /&gt;
* Capacidad de obtener un TGT de un KDC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* server security&lt;br /&gt;
* net command&lt;br /&gt;
* kinit, TGT and REALM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 396: Servicios de nombres de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.1 NetBIOS y WINS  (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con los conceptos NetBIOS / WINS y comprender la navegación de red.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Entender los conceptos de WINS&lt;br /&gt;
* Comprender los conceptos de NetBIOS&lt;br /&gt;
* Comprender el papel de un navegador maestro local&lt;br /&gt;
* Comprender el papel de un navegador maestro de dominio&lt;br /&gt;
* Comprender el papel de Samba como servidor WINS&lt;br /&gt;
* Entender la resolución del nombre&lt;br /&gt;
* Configurar Samba como un servidor WINS&lt;br /&gt;
* Configurar la replicación de WINS&lt;br /&gt;
* Comprender la navegación de NetBIOS y las elecciones de navegador&lt;br /&gt;
* Comprender los tipos de nombre NETBIOS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* nmblookup&lt;br /&gt;
* smbclient&lt;br /&gt;
* name resolve order&lt;br /&gt;
* lmhosts&lt;br /&gt;
* wins support, wins server, wins proxy, dns proxy&lt;br /&gt;
* domain master, os level, preferred master&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.2 Resolución de nombre de Active Directory  (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con el servidor DNS interno con Samba4.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender y gestionar DNS para Samba4 como un controlador de dominio AD&lt;br /&gt;
* Reenvío de DNS con el servidor DNS interno de Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba-tool dns (with subcommands)&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dns forwarder&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
* dig, host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 397: Working with Linux and Windows Clients&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.1 CIFS Integration (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be comfortable working with CIFS in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand SMB/CIFS concepts&lt;br /&gt;
* Access and mount remote CIFS shares from a Linux client&lt;br /&gt;
* Securely storing CIFS credentials&lt;br /&gt;
* Understand features and benefits of CIFS&lt;br /&gt;
* Understand permissions and file ownership of remote CIFS shares&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SMB/CIFS&lt;br /&gt;
* mount, mount.cifs&lt;br /&gt;
* smbclient&lt;br /&gt;
* smbget&lt;br /&gt;
* smbtar&lt;br /&gt;
* smbtree&lt;br /&gt;
* findsmb&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.2 Working with Windows Clients (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to interact with remote Windows clients, and configure Windows workstations to access file and print services from Linux servers.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of Windows clients&lt;br /&gt;
* Explore browse lists and SMB clients from Windows&lt;br /&gt;
* Share file / print resources from Windows&lt;br /&gt;
* Use of the smbclient program&lt;br /&gt;
* Use of the Windows net utility&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Windows net command&lt;br /&gt;
* smbclient&lt;br /&gt;
* control panel&lt;br /&gt;
* rdesktop&lt;br /&gt;
* workgroup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4311</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4311"/>
		<updated>2017-12-08T02:13:09Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* Topic 395: Samba Domain Integration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: Configuración de OpenLDAP&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Replicación de OpenLDAP (Pesot: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con la replicación del servidor disponible con OpenLDAP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conceptos de replicación&lt;br /&gt;
* Configurar la replicación de OpenLDAP&lt;br /&gt;
* Analizar archivos de registro de replicación&lt;br /&gt;
* Comprender los centros de réplica&lt;br /&gt;
* Referencias de LDAP&lt;br /&gt;
* Replicación de sincronización LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* servidor maestro / esclavo&lt;br /&gt;
* replicación multi-master&lt;br /&gt;
* consumer&lt;br /&gt;
* hub de réplica&lt;br /&gt;
* modo one-shot&lt;br /&gt;
* referral&lt;br /&gt;
* syncrepl&lt;br /&gt;
* sincronización basada en pull / basado en push&lt;br /&gt;
* refreshOnly and refreshAndPersist&lt;br /&gt;
* replog&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.2  Asegurar el directorio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder configurar el acceso codificado al directorio LDAP y restringir el acceso al nivel del firewall.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Asegurar el directorio con SSL y TLS&lt;br /&gt;
* Consideraciones de firewall&lt;br /&gt;
* Métodos de acceso no autenticado&lt;br /&gt;
* Métodos de autenticación de usuario / contraseña&lt;br /&gt;
* Mantenimiento del usuario SASL DB&lt;br /&gt;
* Certificados de cliente / servidor&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL / TLS&lt;br /&gt;
* Factores de fortaleza de seguridad (SSF)&lt;br /&gt;
* SASL&lt;br /&gt;
* autorización de proxy&lt;br /&gt;
* StartTLS&lt;br /&gt;
* iptables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.3  Ajuste del rendimiento del servidor OpenLDAP (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de medir el rendimiento de un servidor LDAP y ajustar las directivas de configuración.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Medir el rendimiento de OpenLDAP&lt;br /&gt;
* Ajuste la configuración del software para aumentar el rendimiento&lt;br /&gt;
* Comprender los índices&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* index&lt;br /&gt;
* DB_CONFIG&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 391: OpenLDAP como un backend de autenticación&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.1 Integración LDAP con PAM y NSS (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar PAM y NSS para recuperar información de un directorio LDAP.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar PAM para usar LDAP para autenticación&lt;br /&gt;
* Configurar NSS para recuperar información de LDAP&lt;br /&gt;
* Configurar módulos PAM en varios entornos Unix&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM&lt;br /&gt;
* NSS&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
* /etc/nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.2 Integración de LDAP con Active Directory y Kerberos (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder integrar LDAP con los Servicios de Active Directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Integración de Kerberos con LDAP&lt;br /&gt;
* Autenticación multiplataforma&lt;br /&gt;
* Conceptos de inicio de sesión único&lt;br /&gt;
* Limitaciones de integración y compatibilidad entre OpenLDAP y Active Directory&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos&lt;br /&gt;
* Directorio Activo&lt;br /&gt;
* inicio de sesión único&lt;br /&gt;
* DNS&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 392: Conceptos básicos de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.1 Arquitectura y conceptos de Samba  (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben entender los conceptos esenciales de Samba. Además, las principales diferencias entre Samba3 y Samba4 deberían conocerse.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender los roles de los demonios y componentes de Samba&lt;br /&gt;
* Comprender los problemas clave relacionados con las redes heterogéneas&lt;br /&gt;
* Identificar los puertos clave TCP / UDP utilizados con SMB / CIFS&lt;br /&gt;
* Conocimiento de las diferencias entre Samba3 y Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
* Samba daemons: smbd, nmbd, samba, winbindd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.2 Configurar Samba (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar los demonios Samba para una amplia variedad de propósitos.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento de la estructura del archivo de configuración del servidor Samba&lt;br /&gt;
* Conocimiento de variables de Samba y parámetros de configuración&lt;br /&gt;
* Solucionar problemas y depurar problemas de configuración con Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smb.conf parameters&lt;br /&gt;
* smb.conf variables&lt;br /&gt;
* testparm&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.3 Mantenimiento regular de samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben conocer las diversas herramientas y utilidades que forman parte de una instalación de Samba.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Controla e interactúa con los daemons de Samba mientras estan en ejecución&lt;br /&gt;
* Realizar copias de seguridad periódicas de la configuración de Samba y sus datos de estado&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smbcontrol&lt;br /&gt;
* smbstatus&lt;br /&gt;
* tdbbackup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.4 Solución de problemas de Samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender la estructura de los archivos triviales de la base de datos y saber cómo solucionar los problemas.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar el registro de Samba&lt;br /&gt;
* Copia de seguridad de archivos TDB&lt;br /&gt;
* Restaurar archivos TDB&lt;br /&gt;
* Identifica los corrupción del archivo TDB&lt;br /&gt;
* Editar / listar contenido del archivo TDB&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/log/samba/&lt;br /&gt;
* log level&lt;br /&gt;
* debuglevel&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* pdbedit&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
* tdbbackup&lt;br /&gt;
* tdbdump&lt;br /&gt;
* tdbrestore&lt;br /&gt;
* tdbtool&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.5 Internacionalización (Peso: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder trabajar con códigos de caracteres de internacionalización y páginas de códigos.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender códigos de caracteres de internacionalización y páginas de códigos&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a compartir, archivos y nombres de directorios en un entorno que no sea inglés&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a los nombres de usuarios y grupos en un entorno que no es inglés&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a la denominación de la computadora en un entorno que no sea inglés&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* internacionalización&lt;br /&gt;
* códigos de caracteres&lt;br /&gt;
* páginas de códigos&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dos charset, display charset y unix charset&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 393: Configuración de Samba Share&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.1 Servicios de archivo (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de crear y configurar archivos compartidos en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Crear y configurar archivos compartidos&lt;br /&gt;
* Plan de migración del servicio de archivos&lt;br /&gt;
* Limite el acceso a IPC $&lt;br /&gt;
* Crear scripts para el manejo de usuarios y grupos de archivos compartidos&lt;br /&gt;
* Parámetros de configuración de acceso de Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [homes]&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* smbsh&lt;br /&gt;
* browseable, writeable, valid users, write list, read list, read only and guest ok&lt;br /&gt;
* IPC$&lt;br /&gt;
* mount, smbmount&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.2 Sistema de archivos Linux y permisos de Compartir / Servicio(Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender los permisos de archivos en un sistema de archivos Linux en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento del control de permisos de archivos / directorios&lt;br /&gt;
* Comprender cómo interactúa Samba con los permisos del sistema de archivos de Linux y las ACL&lt;br /&gt;
* Utilice Samba VFS para almacenar las ACL de Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* chmod, chown&lt;br /&gt;
* create mask, directory mask, force create mode, force directory mode&lt;br /&gt;
* smbcacls&lt;br /&gt;
* getfacl, setfacl&lt;br /&gt;
* vfs_acl_xattr, vfs_acl_tdb and vfs objects&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.3 Servicios de impresión (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían ser capaces de crear y administrar recursos compartidos de impresión en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Crear y configurar el uso compartido de impresoras&lt;br /&gt;
* Configurar la integración entre Samba y CUPS&lt;br /&gt;
* Administrar los controladores de impresión de Windows y configurar la descarga de los controladores de impresión&lt;br /&gt;
* Configurar [imprimir $]&lt;br /&gt;
* Comprender las preocupaciones de seguridad con el uso compartido de impresoras&lt;br /&gt;
* Carga de controladores de impresora para la instalación del controlador Point&#039;n&#039;Print con &#039;Asistente para Agregar controlador de impresora&#039; en Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [print$]&lt;br /&gt;
* CUPS&lt;br /&gt;
* cupsd.conf&lt;br /&gt;
* /var/spool/samba/&lt;br /&gt;
* smbspool&lt;br /&gt;
* rpcclient&lt;br /&gt;
* net&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 394: Gestion de Usuarios y Grupos de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.1 Gestión de cuentas y grupos de usuarios  (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de administrar cuentas de usuarios y grupos en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Administrador de cuentas de usuarios y grupos&lt;br /&gt;
* Comprender el mapeo de usuarios y grupos&lt;br /&gt;
* Conocimiento de herramientas de administración de cuentas de usuario&lt;br /&gt;
* Uso del programa smbpasswd&lt;br /&gt;
* Forzar las propiedades de los objetos de archivos y directorios&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* pdbedit&lt;br /&gt;
* smb.conf&lt;br /&gt;
* samba-tool user (con subcomandos)&lt;br /&gt;
* samba-tool group (con subcommands)&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
* force user, force group&lt;br /&gt;
* idmap&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.2 Autenticación, autorización y Winbind (Peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender los diversos mecanismos de autenticación y configurar el control de acceso. Los candidatos deberían poder instalar y configurar el servicio Winbind.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar una base de datos de contraseñas local&lt;br /&gt;
* Realizar sincronización de contraseña&lt;br /&gt;
* Conocimiento de diferentes backends de passdb&lt;br /&gt;
* Convert between Samba passdb backends&lt;br /&gt;
* Integrar Samba con LDAP&lt;br /&gt;
* Configurar el servicio de Winbind&lt;br /&gt;
* Configurar PAM y NSS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbpasswd, tdbsam, ldapsam&lt;br /&gt;
* passdb backend&lt;br /&gt;
* libnss_winbind&lt;br /&gt;
* libpam_winbind&lt;br /&gt;
* libpam_smbpass&lt;br /&gt;
* wbinfo&lt;br /&gt;
* getent&lt;br /&gt;
* SID and foreign SID&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 395: Integración de dominios Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.1 Samba como PDC y BDC (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían ser capaces de configurar y mantener los controladores de dominio principales y de respaldo. Los candidatos deberían poder administrar el acceso de los clientes de Windows / Linux a los dominios  del estilo NT.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender y configurar membresía de dominio y relaciones de confianza&lt;br /&gt;
* Crear y mantener un controlador de dominio principal con Samba3 y Samba4&lt;br /&gt;
* Crear y mantener un controlador de dominio de respaldo con Samba3 y Samba4&lt;br /&gt;
* Agregar computadoras a un dominio existente&lt;br /&gt;
* Configurar scripts de inicio de sesión&lt;br /&gt;
* Configurar perfiles itinerantes&lt;br /&gt;
* Configurar políticas del sistema&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* security mode&lt;br /&gt;
* server role&lt;br /&gt;
* domain logons&lt;br /&gt;
* domain master&lt;br /&gt;
* logon script&lt;br /&gt;
* logon path&lt;br /&gt;
* NTConfig.pol&lt;br /&gt;
* net&lt;br /&gt;
* profiles&lt;br /&gt;
* add machine script&lt;br /&gt;
* profile acls&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.2 Samba4 como controlador de dominio compatible con AD (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder configurar Samba 4 como un controlador de dominio AD.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar y probar Samba 4 como AD DC&lt;br /&gt;
* Uso de smbclient para confirmar la operación de AD&lt;br /&gt;
* Comprender cómo se integra Samba con los servicios de AD: DNS, Kerberos, NTP, LDAP&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* samba-tool domain (with subcommands)&lt;br /&gt;
* samba&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.3 Configurar Samba como servidor de miembros de dominio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de integrar servidores Linux en un entorno donde esté presente Active Directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Unirse a Samba a un dominio NT4 existente&lt;br /&gt;
* Unirse a Samba a un dominio de AD existente&lt;br /&gt;
* Capacidad de obtener un TGT de un KDC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* server security&lt;br /&gt;
* net command&lt;br /&gt;
* kinit, TGT and REALM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 396: Samba Name Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.1 NetBIOS and WINS (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with NetBIOS/WINS concepts and understand network browsing.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand WINS concepts&lt;br /&gt;
* Understand NetBIOS concepts&lt;br /&gt;
* Understand the role of a local master browser&lt;br /&gt;
* Understand the role of a domain master browser&lt;br /&gt;
* Understand the role of Samba as a WINS server&lt;br /&gt;
* Understand name resolution&lt;br /&gt;
* Configure Samba as a WINS server&lt;br /&gt;
* Configure WINS replication&lt;br /&gt;
* Understand NetBIOS browsing and browser elections&lt;br /&gt;
* Understand NETBIOS name types&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* nmblookup&lt;br /&gt;
* smbclient&lt;br /&gt;
* name resolve order&lt;br /&gt;
* lmhosts&lt;br /&gt;
* wins support, wins server, wins proxy, dns proxy&lt;br /&gt;
* domain master, os level, preferred master&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.2 Active Directory Name Resolution (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with the internal DNS server with Samba4.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and manage DNS for Samba4 as an AD Domain Controller&lt;br /&gt;
* DNS forwarding with the internal DNS server of Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba-tool dns (with subcommands)&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dns forwarder&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
* dig, host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 397: Working with Linux and Windows Clients&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.1 CIFS Integration (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be comfortable working with CIFS in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand SMB/CIFS concepts&lt;br /&gt;
* Access and mount remote CIFS shares from a Linux client&lt;br /&gt;
* Securely storing CIFS credentials&lt;br /&gt;
* Understand features and benefits of CIFS&lt;br /&gt;
* Understand permissions and file ownership of remote CIFS shares&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SMB/CIFS&lt;br /&gt;
* mount, mount.cifs&lt;br /&gt;
* smbclient&lt;br /&gt;
* smbget&lt;br /&gt;
* smbtar&lt;br /&gt;
* smbtree&lt;br /&gt;
* findsmb&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.2 Working with Windows Clients (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to interact with remote Windows clients, and configure Windows workstations to access file and print services from Linux servers.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of Windows clients&lt;br /&gt;
* Explore browse lists and SMB clients from Windows&lt;br /&gt;
* Share file / print resources from Windows&lt;br /&gt;
* Use of the smbclient program&lt;br /&gt;
* Use of the Windows net utility&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Windows net command&lt;br /&gt;
* smbclient&lt;br /&gt;
* control panel&lt;br /&gt;
* rdesktop&lt;br /&gt;
* workgroup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4310</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4310"/>
		<updated>2017-12-08T02:06:25Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* Topic 394: Samba User and Group Management */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: Configuración de OpenLDAP&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Replicación de OpenLDAP (Pesot: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con la replicación del servidor disponible con OpenLDAP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conceptos de replicación&lt;br /&gt;
* Configurar la replicación de OpenLDAP&lt;br /&gt;
* Analizar archivos de registro de replicación&lt;br /&gt;
* Comprender los centros de réplica&lt;br /&gt;
* Referencias de LDAP&lt;br /&gt;
* Replicación de sincronización LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* servidor maestro / esclavo&lt;br /&gt;
* replicación multi-master&lt;br /&gt;
* consumer&lt;br /&gt;
* hub de réplica&lt;br /&gt;
* modo one-shot&lt;br /&gt;
* referral&lt;br /&gt;
* syncrepl&lt;br /&gt;
* sincronización basada en pull / basado en push&lt;br /&gt;
* refreshOnly and refreshAndPersist&lt;br /&gt;
* replog&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.2  Asegurar el directorio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder configurar el acceso codificado al directorio LDAP y restringir el acceso al nivel del firewall.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Asegurar el directorio con SSL y TLS&lt;br /&gt;
* Consideraciones de firewall&lt;br /&gt;
* Métodos de acceso no autenticado&lt;br /&gt;
* Métodos de autenticación de usuario / contraseña&lt;br /&gt;
* Mantenimiento del usuario SASL DB&lt;br /&gt;
* Certificados de cliente / servidor&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL / TLS&lt;br /&gt;
* Factores de fortaleza de seguridad (SSF)&lt;br /&gt;
* SASL&lt;br /&gt;
* autorización de proxy&lt;br /&gt;
* StartTLS&lt;br /&gt;
* iptables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.3  Ajuste del rendimiento del servidor OpenLDAP (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de medir el rendimiento de un servidor LDAP y ajustar las directivas de configuración.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Medir el rendimiento de OpenLDAP&lt;br /&gt;
* Ajuste la configuración del software para aumentar el rendimiento&lt;br /&gt;
* Comprender los índices&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* index&lt;br /&gt;
* DB_CONFIG&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 391: OpenLDAP como un backend de autenticación&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.1 Integración LDAP con PAM y NSS (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar PAM y NSS para recuperar información de un directorio LDAP.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar PAM para usar LDAP para autenticación&lt;br /&gt;
* Configurar NSS para recuperar información de LDAP&lt;br /&gt;
* Configurar módulos PAM en varios entornos Unix&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM&lt;br /&gt;
* NSS&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
* /etc/nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.2 Integración de LDAP con Active Directory y Kerberos (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder integrar LDAP con los Servicios de Active Directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Integración de Kerberos con LDAP&lt;br /&gt;
* Autenticación multiplataforma&lt;br /&gt;
* Conceptos de inicio de sesión único&lt;br /&gt;
* Limitaciones de integración y compatibilidad entre OpenLDAP y Active Directory&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos&lt;br /&gt;
* Directorio Activo&lt;br /&gt;
* inicio de sesión único&lt;br /&gt;
* DNS&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 392: Conceptos básicos de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.1 Arquitectura y conceptos de Samba  (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben entender los conceptos esenciales de Samba. Además, las principales diferencias entre Samba3 y Samba4 deberían conocerse.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender los roles de los demonios y componentes de Samba&lt;br /&gt;
* Comprender los problemas clave relacionados con las redes heterogéneas&lt;br /&gt;
* Identificar los puertos clave TCP / UDP utilizados con SMB / CIFS&lt;br /&gt;
* Conocimiento de las diferencias entre Samba3 y Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
* Samba daemons: smbd, nmbd, samba, winbindd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.2 Configurar Samba (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar los demonios Samba para una amplia variedad de propósitos.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento de la estructura del archivo de configuración del servidor Samba&lt;br /&gt;
* Conocimiento de variables de Samba y parámetros de configuración&lt;br /&gt;
* Solucionar problemas y depurar problemas de configuración con Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smb.conf parameters&lt;br /&gt;
* smb.conf variables&lt;br /&gt;
* testparm&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.3 Mantenimiento regular de samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben conocer las diversas herramientas y utilidades que forman parte de una instalación de Samba.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Controla e interactúa con los daemons de Samba mientras estan en ejecución&lt;br /&gt;
* Realizar copias de seguridad periódicas de la configuración de Samba y sus datos de estado&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smbcontrol&lt;br /&gt;
* smbstatus&lt;br /&gt;
* tdbbackup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.4 Solución de problemas de Samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender la estructura de los archivos triviales de la base de datos y saber cómo solucionar los problemas.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar el registro de Samba&lt;br /&gt;
* Copia de seguridad de archivos TDB&lt;br /&gt;
* Restaurar archivos TDB&lt;br /&gt;
* Identifica los corrupción del archivo TDB&lt;br /&gt;
* Editar / listar contenido del archivo TDB&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/log/samba/&lt;br /&gt;
* log level&lt;br /&gt;
* debuglevel&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* pdbedit&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
* tdbbackup&lt;br /&gt;
* tdbdump&lt;br /&gt;
* tdbrestore&lt;br /&gt;
* tdbtool&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.5 Internacionalización (Peso: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder trabajar con códigos de caracteres de internacionalización y páginas de códigos.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender códigos de caracteres de internacionalización y páginas de códigos&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a compartir, archivos y nombres de directorios en un entorno que no sea inglés&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a los nombres de usuarios y grupos en un entorno que no es inglés&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a la denominación de la computadora en un entorno que no sea inglés&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* internacionalización&lt;br /&gt;
* códigos de caracteres&lt;br /&gt;
* páginas de códigos&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dos charset, display charset y unix charset&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 393: Configuración de Samba Share&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.1 Servicios de archivo (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de crear y configurar archivos compartidos en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Crear y configurar archivos compartidos&lt;br /&gt;
* Plan de migración del servicio de archivos&lt;br /&gt;
* Limite el acceso a IPC $&lt;br /&gt;
* Crear scripts para el manejo de usuarios y grupos de archivos compartidos&lt;br /&gt;
* Parámetros de configuración de acceso de Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [homes]&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* smbsh&lt;br /&gt;
* browseable, writeable, valid users, write list, read list, read only and guest ok&lt;br /&gt;
* IPC$&lt;br /&gt;
* mount, smbmount&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.2 Sistema de archivos Linux y permisos de Compartir / Servicio(Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender los permisos de archivos en un sistema de archivos Linux en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento del control de permisos de archivos / directorios&lt;br /&gt;
* Comprender cómo interactúa Samba con los permisos del sistema de archivos de Linux y las ACL&lt;br /&gt;
* Utilice Samba VFS para almacenar las ACL de Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* chmod, chown&lt;br /&gt;
* create mask, directory mask, force create mode, force directory mode&lt;br /&gt;
* smbcacls&lt;br /&gt;
* getfacl, setfacl&lt;br /&gt;
* vfs_acl_xattr, vfs_acl_tdb and vfs objects&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.3 Servicios de impresión (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían ser capaces de crear y administrar recursos compartidos de impresión en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Crear y configurar el uso compartido de impresoras&lt;br /&gt;
* Configurar la integración entre Samba y CUPS&lt;br /&gt;
* Administrar los controladores de impresión de Windows y configurar la descarga de los controladores de impresión&lt;br /&gt;
* Configurar [imprimir $]&lt;br /&gt;
* Comprender las preocupaciones de seguridad con el uso compartido de impresoras&lt;br /&gt;
* Carga de controladores de impresora para la instalación del controlador Point&#039;n&#039;Print con &#039;Asistente para Agregar controlador de impresora&#039; en Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [print$]&lt;br /&gt;
* CUPS&lt;br /&gt;
* cupsd.conf&lt;br /&gt;
* /var/spool/samba/&lt;br /&gt;
* smbspool&lt;br /&gt;
* rpcclient&lt;br /&gt;
* net&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 394: Gestion de Usuarios y Grupos de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.1 Gestión de cuentas y grupos de usuarios  (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de administrar cuentas de usuarios y grupos en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Administrador de cuentas de usuarios y grupos&lt;br /&gt;
* Comprender el mapeo de usuarios y grupos&lt;br /&gt;
* Conocimiento de herramientas de administración de cuentas de usuario&lt;br /&gt;
* Uso del programa smbpasswd&lt;br /&gt;
* Forzar las propiedades de los objetos de archivos y directorios&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* pdbedit&lt;br /&gt;
* smb.conf&lt;br /&gt;
* samba-tool user (con subcomandos)&lt;br /&gt;
* samba-tool group (con subcommands)&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
* force user, force group&lt;br /&gt;
* idmap&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.2 Autenticación, autorización y Winbind (Peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender los diversos mecanismos de autenticación y configurar el control de acceso. Los candidatos deberían poder instalar y configurar el servicio Winbind.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar una base de datos de contraseñas local&lt;br /&gt;
* Realizar sincronización de contraseña&lt;br /&gt;
* Conocimiento de diferentes backends de passdb&lt;br /&gt;
* Convert between Samba passdb backends&lt;br /&gt;
* Integrar Samba con LDAP&lt;br /&gt;
* Configurar el servicio de Winbind&lt;br /&gt;
* Configurar PAM y NSS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbpasswd, tdbsam, ldapsam&lt;br /&gt;
* passdb backend&lt;br /&gt;
* libnss_winbind&lt;br /&gt;
* libpam_winbind&lt;br /&gt;
* libpam_smbpass&lt;br /&gt;
* wbinfo&lt;br /&gt;
* getent&lt;br /&gt;
* SID and foreign SID&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 395: Samba Domain Integration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.1 Samba as a PDC and BDC (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to setup and maintain primary and backup domain controllers.  Candidates should be able to manage Windows/Linux client access to the NT-Style domains.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and configure domain membership and trust relationships&lt;br /&gt;
* Create and maintain a primary domain controller with Samba3 and Samba4&lt;br /&gt;
* Create and maintain a backup domain controller with Samba3 and Samba4&lt;br /&gt;
* Add computers to an existing domain&lt;br /&gt;
* Configure logon scripts&lt;br /&gt;
* Configure roaming profiles&lt;br /&gt;
* Configure system policies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* security mode&lt;br /&gt;
* server role&lt;br /&gt;
* domain logons&lt;br /&gt;
* domain master&lt;br /&gt;
* logon script&lt;br /&gt;
* logon path&lt;br /&gt;
* NTConfig.pol&lt;br /&gt;
* net&lt;br /&gt;
* profiles&lt;br /&gt;
* add machine script&lt;br /&gt;
* profile acls&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.2 Samba4 as an AD compatible Domain Controller (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure Samba 4 as an AD Domain Controller.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure and test Samba 4 as an AD DC&lt;br /&gt;
* Using smbclient to confirm AD operation&lt;br /&gt;
* Understand how Samba integrates with AD services: DNS, Kerberos, NTP, LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* samba-tool domain (with subcommands)&lt;br /&gt;
* samba&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.3 Configure Samba as a Domain Member Server (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to integrate Linux servers into an environment where Active Directory is present.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Joining Samba to an existing NT4 domain&lt;br /&gt;
* Joining Samba to an existing AD domain&lt;br /&gt;
* Ability to obtain a TGT from a KDC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* server security&lt;br /&gt;
* net command&lt;br /&gt;
* kinit, TGT and REALM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 396: Samba Name Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.1 NetBIOS and WINS (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with NetBIOS/WINS concepts and understand network browsing.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand WINS concepts&lt;br /&gt;
* Understand NetBIOS concepts&lt;br /&gt;
* Understand the role of a local master browser&lt;br /&gt;
* Understand the role of a domain master browser&lt;br /&gt;
* Understand the role of Samba as a WINS server&lt;br /&gt;
* Understand name resolution&lt;br /&gt;
* Configure Samba as a WINS server&lt;br /&gt;
* Configure WINS replication&lt;br /&gt;
* Understand NetBIOS browsing and browser elections&lt;br /&gt;
* Understand NETBIOS name types&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* nmblookup&lt;br /&gt;
* smbclient&lt;br /&gt;
* name resolve order&lt;br /&gt;
* lmhosts&lt;br /&gt;
* wins support, wins server, wins proxy, dns proxy&lt;br /&gt;
* domain master, os level, preferred master&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.2 Active Directory Name Resolution (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with the internal DNS server with Samba4.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and manage DNS for Samba4 as an AD Domain Controller&lt;br /&gt;
* DNS forwarding with the internal DNS server of Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba-tool dns (with subcommands)&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dns forwarder&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
* dig, host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 397: Working with Linux and Windows Clients&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.1 CIFS Integration (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be comfortable working with CIFS in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand SMB/CIFS concepts&lt;br /&gt;
* Access and mount remote CIFS shares from a Linux client&lt;br /&gt;
* Securely storing CIFS credentials&lt;br /&gt;
* Understand features and benefits of CIFS&lt;br /&gt;
* Understand permissions and file ownership of remote CIFS shares&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SMB/CIFS&lt;br /&gt;
* mount, mount.cifs&lt;br /&gt;
* smbclient&lt;br /&gt;
* smbget&lt;br /&gt;
* smbtar&lt;br /&gt;
* smbtree&lt;br /&gt;
* findsmb&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.2 Working with Windows Clients (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to interact with remote Windows clients, and configure Windows workstations to access file and print services from Linux servers.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of Windows clients&lt;br /&gt;
* Explore browse lists and SMB clients from Windows&lt;br /&gt;
* Share file / print resources from Windows&lt;br /&gt;
* Use of the smbclient program&lt;br /&gt;
* Use of the Windows net utility&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Windows net command&lt;br /&gt;
* smbclient&lt;br /&gt;
* control panel&lt;br /&gt;
* rdesktop&lt;br /&gt;
* workgroup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4309</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4309"/>
		<updated>2017-12-08T02:01:10Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* Topic 393: Samba Share Configuration */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: Configuración de OpenLDAP&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Replicación de OpenLDAP (Pesot: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con la replicación del servidor disponible con OpenLDAP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conceptos de replicación&lt;br /&gt;
* Configurar la replicación de OpenLDAP&lt;br /&gt;
* Analizar archivos de registro de replicación&lt;br /&gt;
* Comprender los centros de réplica&lt;br /&gt;
* Referencias de LDAP&lt;br /&gt;
* Replicación de sincronización LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* servidor maestro / esclavo&lt;br /&gt;
* replicación multi-master&lt;br /&gt;
* consumer&lt;br /&gt;
* hub de réplica&lt;br /&gt;
* modo one-shot&lt;br /&gt;
* referral&lt;br /&gt;
* syncrepl&lt;br /&gt;
* sincronización basada en pull / basado en push&lt;br /&gt;
* refreshOnly and refreshAndPersist&lt;br /&gt;
* replog&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.2  Asegurar el directorio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder configurar el acceso codificado al directorio LDAP y restringir el acceso al nivel del firewall.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Asegurar el directorio con SSL y TLS&lt;br /&gt;
* Consideraciones de firewall&lt;br /&gt;
* Métodos de acceso no autenticado&lt;br /&gt;
* Métodos de autenticación de usuario / contraseña&lt;br /&gt;
* Mantenimiento del usuario SASL DB&lt;br /&gt;
* Certificados de cliente / servidor&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL / TLS&lt;br /&gt;
* Factores de fortaleza de seguridad (SSF)&lt;br /&gt;
* SASL&lt;br /&gt;
* autorización de proxy&lt;br /&gt;
* StartTLS&lt;br /&gt;
* iptables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.3  Ajuste del rendimiento del servidor OpenLDAP (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de medir el rendimiento de un servidor LDAP y ajustar las directivas de configuración.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Medir el rendimiento de OpenLDAP&lt;br /&gt;
* Ajuste la configuración del software para aumentar el rendimiento&lt;br /&gt;
* Comprender los índices&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* index&lt;br /&gt;
* DB_CONFIG&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 391: OpenLDAP como un backend de autenticación&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.1 Integración LDAP con PAM y NSS (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar PAM y NSS para recuperar información de un directorio LDAP.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar PAM para usar LDAP para autenticación&lt;br /&gt;
* Configurar NSS para recuperar información de LDAP&lt;br /&gt;
* Configurar módulos PAM en varios entornos Unix&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM&lt;br /&gt;
* NSS&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
* /etc/nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.2 Integración de LDAP con Active Directory y Kerberos (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder integrar LDAP con los Servicios de Active Directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Integración de Kerberos con LDAP&lt;br /&gt;
* Autenticación multiplataforma&lt;br /&gt;
* Conceptos de inicio de sesión único&lt;br /&gt;
* Limitaciones de integración y compatibilidad entre OpenLDAP y Active Directory&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos&lt;br /&gt;
* Directorio Activo&lt;br /&gt;
* inicio de sesión único&lt;br /&gt;
* DNS&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 392: Conceptos básicos de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.1 Arquitectura y conceptos de Samba  (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben entender los conceptos esenciales de Samba. Además, las principales diferencias entre Samba3 y Samba4 deberían conocerse.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender los roles de los demonios y componentes de Samba&lt;br /&gt;
* Comprender los problemas clave relacionados con las redes heterogéneas&lt;br /&gt;
* Identificar los puertos clave TCP / UDP utilizados con SMB / CIFS&lt;br /&gt;
* Conocimiento de las diferencias entre Samba3 y Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
* Samba daemons: smbd, nmbd, samba, winbindd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.2 Configurar Samba (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar los demonios Samba para una amplia variedad de propósitos.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento de la estructura del archivo de configuración del servidor Samba&lt;br /&gt;
* Conocimiento de variables de Samba y parámetros de configuración&lt;br /&gt;
* Solucionar problemas y depurar problemas de configuración con Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smb.conf parameters&lt;br /&gt;
* smb.conf variables&lt;br /&gt;
* testparm&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.3 Mantenimiento regular de samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben conocer las diversas herramientas y utilidades que forman parte de una instalación de Samba.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Controla e interactúa con los daemons de Samba mientras estan en ejecución&lt;br /&gt;
* Realizar copias de seguridad periódicas de la configuración de Samba y sus datos de estado&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smbcontrol&lt;br /&gt;
* smbstatus&lt;br /&gt;
* tdbbackup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.4 Solución de problemas de Samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender la estructura de los archivos triviales de la base de datos y saber cómo solucionar los problemas.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar el registro de Samba&lt;br /&gt;
* Copia de seguridad de archivos TDB&lt;br /&gt;
* Restaurar archivos TDB&lt;br /&gt;
* Identifica los corrupción del archivo TDB&lt;br /&gt;
* Editar / listar contenido del archivo TDB&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/log/samba/&lt;br /&gt;
* log level&lt;br /&gt;
* debuglevel&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* pdbedit&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
* tdbbackup&lt;br /&gt;
* tdbdump&lt;br /&gt;
* tdbrestore&lt;br /&gt;
* tdbtool&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.5 Internacionalización (Peso: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder trabajar con códigos de caracteres de internacionalización y páginas de códigos.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender códigos de caracteres de internacionalización y páginas de códigos&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a compartir, archivos y nombres de directorios en un entorno que no sea inglés&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a los nombres de usuarios y grupos en un entorno que no es inglés&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a la denominación de la computadora en un entorno que no sea inglés&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* internacionalización&lt;br /&gt;
* códigos de caracteres&lt;br /&gt;
* páginas de códigos&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dos charset, display charset y unix charset&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 393: Configuración de Samba Share&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.1 Servicios de archivo (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de crear y configurar archivos compartidos en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Crear y configurar archivos compartidos&lt;br /&gt;
* Plan de migración del servicio de archivos&lt;br /&gt;
* Limite el acceso a IPC $&lt;br /&gt;
* Crear scripts para el manejo de usuarios y grupos de archivos compartidos&lt;br /&gt;
* Parámetros de configuración de acceso de Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [homes]&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* smbsh&lt;br /&gt;
* browseable, writeable, valid users, write list, read list, read only and guest ok&lt;br /&gt;
* IPC$&lt;br /&gt;
* mount, smbmount&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.2 Sistema de archivos Linux y permisos de Compartir / Servicio(Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender los permisos de archivos en un sistema de archivos Linux en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento del control de permisos de archivos / directorios&lt;br /&gt;
* Comprender cómo interactúa Samba con los permisos del sistema de archivos de Linux y las ACL&lt;br /&gt;
* Utilice Samba VFS para almacenar las ACL de Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* chmod, chown&lt;br /&gt;
* create mask, directory mask, force create mode, force directory mode&lt;br /&gt;
* smbcacls&lt;br /&gt;
* getfacl, setfacl&lt;br /&gt;
* vfs_acl_xattr, vfs_acl_tdb and vfs objects&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.3 Servicios de impresión (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían ser capaces de crear y administrar recursos compartidos de impresión en un entorno mixto.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Crear y configurar el uso compartido de impresoras&lt;br /&gt;
* Configurar la integración entre Samba y CUPS&lt;br /&gt;
* Administrar los controladores de impresión de Windows y configurar la descarga de los controladores de impresión&lt;br /&gt;
* Configurar [imprimir $]&lt;br /&gt;
* Comprender las preocupaciones de seguridad con el uso compartido de impresoras&lt;br /&gt;
* Carga de controladores de impresora para la instalación del controlador Point&#039;n&#039;Print con &#039;Asistente para Agregar controlador de impresora&#039; en Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [print$]&lt;br /&gt;
* CUPS&lt;br /&gt;
* cupsd.conf&lt;br /&gt;
* /var/spool/samba/&lt;br /&gt;
* smbspool&lt;br /&gt;
* rpcclient&lt;br /&gt;
* net&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 394: Samba User and Group Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.1 Managing User Accounts and Groups (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to manage user and group accounts in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Manager user and group accounts&lt;br /&gt;
* Understand user and group mapping&lt;br /&gt;
* Knowledge of user account management tools&lt;br /&gt;
* Use of the smbpasswd program&lt;br /&gt;
* Force ownership of file and directory objects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* pdbedit&lt;br /&gt;
* smb.conf&lt;br /&gt;
* samba-tool user (with subcommands)&lt;br /&gt;
* samba-tool group (with subcommands)&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
* force user, force group&lt;br /&gt;
* idmap&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.2 Authentication, Authorization and Winbind (Peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the various authentication mechanisms and configure access control.  Candidates should be able to install and configure the Winbind service.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Setup a local password database&lt;br /&gt;
* Perform password synchronization&lt;br /&gt;
* Knowledge of different passdb backends&lt;br /&gt;
* Convert between Samba passdb backends&lt;br /&gt;
* Integrate Samba with LDAP&lt;br /&gt;
* Configure Winbind service&lt;br /&gt;
* Configure PAM and NSS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbpasswd, tdbsam, ldapsam&lt;br /&gt;
* passdb backend&lt;br /&gt;
* libnss_winbind&lt;br /&gt;
* libpam_winbind&lt;br /&gt;
* libpam_smbpass&lt;br /&gt;
* wbinfo&lt;br /&gt;
* getent&lt;br /&gt;
* SID and foreign SID&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 395: Samba Domain Integration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.1 Samba as a PDC and BDC (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to setup and maintain primary and backup domain controllers.  Candidates should be able to manage Windows/Linux client access to the NT-Style domains.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and configure domain membership and trust relationships&lt;br /&gt;
* Create and maintain a primary domain controller with Samba3 and Samba4&lt;br /&gt;
* Create and maintain a backup domain controller with Samba3 and Samba4&lt;br /&gt;
* Add computers to an existing domain&lt;br /&gt;
* Configure logon scripts&lt;br /&gt;
* Configure roaming profiles&lt;br /&gt;
* Configure system policies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* security mode&lt;br /&gt;
* server role&lt;br /&gt;
* domain logons&lt;br /&gt;
* domain master&lt;br /&gt;
* logon script&lt;br /&gt;
* logon path&lt;br /&gt;
* NTConfig.pol&lt;br /&gt;
* net&lt;br /&gt;
* profiles&lt;br /&gt;
* add machine script&lt;br /&gt;
* profile acls&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.2 Samba4 as an AD compatible Domain Controller (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure Samba 4 as an AD Domain Controller.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure and test Samba 4 as an AD DC&lt;br /&gt;
* Using smbclient to confirm AD operation&lt;br /&gt;
* Understand how Samba integrates with AD services: DNS, Kerberos, NTP, LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* samba-tool domain (with subcommands)&lt;br /&gt;
* samba&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.3 Configure Samba as a Domain Member Server (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to integrate Linux servers into an environment where Active Directory is present.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Joining Samba to an existing NT4 domain&lt;br /&gt;
* Joining Samba to an existing AD domain&lt;br /&gt;
* Ability to obtain a TGT from a KDC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* server security&lt;br /&gt;
* net command&lt;br /&gt;
* kinit, TGT and REALM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 396: Samba Name Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.1 NetBIOS and WINS (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with NetBIOS/WINS concepts and understand network browsing.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand WINS concepts&lt;br /&gt;
* Understand NetBIOS concepts&lt;br /&gt;
* Understand the role of a local master browser&lt;br /&gt;
* Understand the role of a domain master browser&lt;br /&gt;
* Understand the role of Samba as a WINS server&lt;br /&gt;
* Understand name resolution&lt;br /&gt;
* Configure Samba as a WINS server&lt;br /&gt;
* Configure WINS replication&lt;br /&gt;
* Understand NetBIOS browsing and browser elections&lt;br /&gt;
* Understand NETBIOS name types&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* nmblookup&lt;br /&gt;
* smbclient&lt;br /&gt;
* name resolve order&lt;br /&gt;
* lmhosts&lt;br /&gt;
* wins support, wins server, wins proxy, dns proxy&lt;br /&gt;
* domain master, os level, preferred master&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.2 Active Directory Name Resolution (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with the internal DNS server with Samba4.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and manage DNS for Samba4 as an AD Domain Controller&lt;br /&gt;
* DNS forwarding with the internal DNS server of Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba-tool dns (with subcommands)&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dns forwarder&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
* dig, host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 397: Working with Linux and Windows Clients&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.1 CIFS Integration (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be comfortable working with CIFS in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand SMB/CIFS concepts&lt;br /&gt;
* Access and mount remote CIFS shares from a Linux client&lt;br /&gt;
* Securely storing CIFS credentials&lt;br /&gt;
* Understand features and benefits of CIFS&lt;br /&gt;
* Understand permissions and file ownership of remote CIFS shares&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SMB/CIFS&lt;br /&gt;
* mount, mount.cifs&lt;br /&gt;
* smbclient&lt;br /&gt;
* smbget&lt;br /&gt;
* smbtar&lt;br /&gt;
* smbtree&lt;br /&gt;
* findsmb&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.2 Working with Windows Clients (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to interact with remote Windows clients, and configure Windows workstations to access file and print services from Linux servers.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of Windows clients&lt;br /&gt;
* Explore browse lists and SMB clients from Windows&lt;br /&gt;
* Share file / print resources from Windows&lt;br /&gt;
* Use of the smbclient program&lt;br /&gt;
* Use of the Windows net utility&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Windows net command&lt;br /&gt;
* smbclient&lt;br /&gt;
* control panel&lt;br /&gt;
* rdesktop&lt;br /&gt;
* workgroup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4308</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4308"/>
		<updated>2017-12-08T01:53:23Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* Topic 392: Samba Basics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: Configuración de OpenLDAP&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Replicación de OpenLDAP (Pesot: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con la replicación del servidor disponible con OpenLDAP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conceptos de replicación&lt;br /&gt;
* Configurar la replicación de OpenLDAP&lt;br /&gt;
* Analizar archivos de registro de replicación&lt;br /&gt;
* Comprender los centros de réplica&lt;br /&gt;
* Referencias de LDAP&lt;br /&gt;
* Replicación de sincronización LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* servidor maestro / esclavo&lt;br /&gt;
* replicación multi-master&lt;br /&gt;
* consumer&lt;br /&gt;
* hub de réplica&lt;br /&gt;
* modo one-shot&lt;br /&gt;
* referral&lt;br /&gt;
* syncrepl&lt;br /&gt;
* sincronización basada en pull / basado en push&lt;br /&gt;
* refreshOnly and refreshAndPersist&lt;br /&gt;
* replog&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.2  Asegurar el directorio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder configurar el acceso codificado al directorio LDAP y restringir el acceso al nivel del firewall.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Asegurar el directorio con SSL y TLS&lt;br /&gt;
* Consideraciones de firewall&lt;br /&gt;
* Métodos de acceso no autenticado&lt;br /&gt;
* Métodos de autenticación de usuario / contraseña&lt;br /&gt;
* Mantenimiento del usuario SASL DB&lt;br /&gt;
* Certificados de cliente / servidor&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL / TLS&lt;br /&gt;
* Factores de fortaleza de seguridad (SSF)&lt;br /&gt;
* SASL&lt;br /&gt;
* autorización de proxy&lt;br /&gt;
* StartTLS&lt;br /&gt;
* iptables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.3  Ajuste del rendimiento del servidor OpenLDAP (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de medir el rendimiento de un servidor LDAP y ajustar las directivas de configuración.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Medir el rendimiento de OpenLDAP&lt;br /&gt;
* Ajuste la configuración del software para aumentar el rendimiento&lt;br /&gt;
* Comprender los índices&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* index&lt;br /&gt;
* DB_CONFIG&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 391: OpenLDAP como un backend de autenticación&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.1 Integración LDAP con PAM y NSS (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar PAM y NSS para recuperar información de un directorio LDAP.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar PAM para usar LDAP para autenticación&lt;br /&gt;
* Configurar NSS para recuperar información de LDAP&lt;br /&gt;
* Configurar módulos PAM en varios entornos Unix&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM&lt;br /&gt;
* NSS&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
* /etc/nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.2 Integración de LDAP con Active Directory y Kerberos (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder integrar LDAP con los Servicios de Active Directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Integración de Kerberos con LDAP&lt;br /&gt;
* Autenticación multiplataforma&lt;br /&gt;
* Conceptos de inicio de sesión único&lt;br /&gt;
* Limitaciones de integración y compatibilidad entre OpenLDAP y Active Directory&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos&lt;br /&gt;
* Directorio Activo&lt;br /&gt;
* inicio de sesión único&lt;br /&gt;
* DNS&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 392: Conceptos básicos de Samba&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.1 Arquitectura y conceptos de Samba  (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben entender los conceptos esenciales de Samba. Además, las principales diferencias entre Samba3 y Samba4 deberían conocerse.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender los roles de los demonios y componentes de Samba&lt;br /&gt;
* Comprender los problemas clave relacionados con las redes heterogéneas&lt;br /&gt;
* Identificar los puertos clave TCP / UDP utilizados con SMB / CIFS&lt;br /&gt;
* Conocimiento de las diferencias entre Samba3 y Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
* Samba daemons: smbd, nmbd, samba, winbindd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.2 Configurar Samba (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar los demonios Samba para una amplia variedad de propósitos.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conocimiento de la estructura del archivo de configuración del servidor Samba&lt;br /&gt;
* Conocimiento de variables de Samba y parámetros de configuración&lt;br /&gt;
* Solucionar problemas y depurar problemas de configuración con Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smb.conf parameters&lt;br /&gt;
* smb.conf variables&lt;br /&gt;
* testparm&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.3 Mantenimiento regular de samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben conocer las diversas herramientas y utilidades que forman parte de una instalación de Samba.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Controla e interactúa con los daemons de Samba mientras estan en ejecución&lt;br /&gt;
* Realizar copias de seguridad periódicas de la configuración de Samba y sus datos de estado&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smbcontrol&lt;br /&gt;
* smbstatus&lt;br /&gt;
* tdbbackup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.4 Solución de problemas de Samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben comprender la estructura de los archivos triviales de la base de datos y saber cómo solucionar los problemas.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar el registro de Samba&lt;br /&gt;
* Copia de seguridad de archivos TDB&lt;br /&gt;
* Restaurar archivos TDB&lt;br /&gt;
* Identifica los corrupción del archivo TDB&lt;br /&gt;
* Editar / listar contenido del archivo TDB&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/log/samba/&lt;br /&gt;
* log level&lt;br /&gt;
* debuglevel&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* pdbedit&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
* tdbbackup&lt;br /&gt;
* tdbdump&lt;br /&gt;
* tdbrestore&lt;br /&gt;
* tdbtool&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.5 Internacionalización (Peso: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder trabajar con códigos de caracteres de internacionalización y páginas de códigos.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Comprender códigos de caracteres de internacionalización y páginas de códigos&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a compartir, archivos y nombres de directorios en un entorno que no sea inglés&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a los nombres de usuarios y grupos en un entorno que no es inglés&lt;br /&gt;
* Comprender la diferencia en el espacio de nombres entre Windows y Linux / Unix con respecto a la denominación de la computadora en un entorno que no sea inglés&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* internacionalización&lt;br /&gt;
* códigos de caracteres&lt;br /&gt;
* páginas de códigos&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dos charset, display charset y unix charset&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 393: Samba Share Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.1 File Services (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to create and configure file shares in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create and configure file sharing&lt;br /&gt;
* Plan file service migration&lt;br /&gt;
* Limit access to IPC$&lt;br /&gt;
* Create scripts for user and group handling of file shares&lt;br /&gt;
* Samba share access configuration parameters&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [homes]&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* smbsh&lt;br /&gt;
* browseable, writeable, valid users, write list, read list, read only and guest ok&lt;br /&gt;
* IPC$&lt;br /&gt;
* mount, smbmount&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.2 Linux File System and Share/Service Permissions (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand file permissions on a Linux file system in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of file / directory permission control&lt;br /&gt;
* Understand how Samba interacts with Linux file system permissions and ACLs&lt;br /&gt;
* Use Samba VFS to store Windows ACLs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* chmod, chown&lt;br /&gt;
* create mask, directory mask, force create mode, force directory mode&lt;br /&gt;
* smbcacls&lt;br /&gt;
* getfacl, setfacl&lt;br /&gt;
* vfs_acl_xattr, vfs_acl_tdb and vfs objects&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.3 Print Services (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to create and manage print shares in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create and configure printer sharing&lt;br /&gt;
* Configure integration between Samba and CUPS&lt;br /&gt;
* Manage Windows print drivers and configure downloading of print drivers&lt;br /&gt;
* Configure [print$]&lt;br /&gt;
* Understand security concerns with printer sharing&lt;br /&gt;
* Uploading printer drivers for Point&#039;n&#039;Print driver installation using &#039;Add Print Driver Wizard&#039; in Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [print$]&lt;br /&gt;
* CUPS&lt;br /&gt;
* cupsd.conf&lt;br /&gt;
* /var/spool/samba/&lt;br /&gt;
* smbspool&lt;br /&gt;
* rpcclient&lt;br /&gt;
* net&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 394: Samba User and Group Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.1 Managing User Accounts and Groups (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to manage user and group accounts in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Manager user and group accounts&lt;br /&gt;
* Understand user and group mapping&lt;br /&gt;
* Knowledge of user account management tools&lt;br /&gt;
* Use of the smbpasswd program&lt;br /&gt;
* Force ownership of file and directory objects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* pdbedit&lt;br /&gt;
* smb.conf&lt;br /&gt;
* samba-tool user (with subcommands)&lt;br /&gt;
* samba-tool group (with subcommands)&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
* force user, force group&lt;br /&gt;
* idmap&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.2 Authentication, Authorization and Winbind (Peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the various authentication mechanisms and configure access control.  Candidates should be able to install and configure the Winbind service.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Setup a local password database&lt;br /&gt;
* Perform password synchronization&lt;br /&gt;
* Knowledge of different passdb backends&lt;br /&gt;
* Convert between Samba passdb backends&lt;br /&gt;
* Integrate Samba with LDAP&lt;br /&gt;
* Configure Winbind service&lt;br /&gt;
* Configure PAM and NSS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbpasswd, tdbsam, ldapsam&lt;br /&gt;
* passdb backend&lt;br /&gt;
* libnss_winbind&lt;br /&gt;
* libpam_winbind&lt;br /&gt;
* libpam_smbpass&lt;br /&gt;
* wbinfo&lt;br /&gt;
* getent&lt;br /&gt;
* SID and foreign SID&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 395: Samba Domain Integration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.1 Samba as a PDC and BDC (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to setup and maintain primary and backup domain controllers.  Candidates should be able to manage Windows/Linux client access to the NT-Style domains.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and configure domain membership and trust relationships&lt;br /&gt;
* Create and maintain a primary domain controller with Samba3 and Samba4&lt;br /&gt;
* Create and maintain a backup domain controller with Samba3 and Samba4&lt;br /&gt;
* Add computers to an existing domain&lt;br /&gt;
* Configure logon scripts&lt;br /&gt;
* Configure roaming profiles&lt;br /&gt;
* Configure system policies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* security mode&lt;br /&gt;
* server role&lt;br /&gt;
* domain logons&lt;br /&gt;
* domain master&lt;br /&gt;
* logon script&lt;br /&gt;
* logon path&lt;br /&gt;
* NTConfig.pol&lt;br /&gt;
* net&lt;br /&gt;
* profiles&lt;br /&gt;
* add machine script&lt;br /&gt;
* profile acls&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.2 Samba4 as an AD compatible Domain Controller (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure Samba 4 as an AD Domain Controller.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure and test Samba 4 as an AD DC&lt;br /&gt;
* Using smbclient to confirm AD operation&lt;br /&gt;
* Understand how Samba integrates with AD services: DNS, Kerberos, NTP, LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* samba-tool domain (with subcommands)&lt;br /&gt;
* samba&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.3 Configure Samba as a Domain Member Server (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to integrate Linux servers into an environment where Active Directory is present.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Joining Samba to an existing NT4 domain&lt;br /&gt;
* Joining Samba to an existing AD domain&lt;br /&gt;
* Ability to obtain a TGT from a KDC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* server security&lt;br /&gt;
* net command&lt;br /&gt;
* kinit, TGT and REALM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 396: Samba Name Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.1 NetBIOS and WINS (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with NetBIOS/WINS concepts and understand network browsing.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand WINS concepts&lt;br /&gt;
* Understand NetBIOS concepts&lt;br /&gt;
* Understand the role of a local master browser&lt;br /&gt;
* Understand the role of a domain master browser&lt;br /&gt;
* Understand the role of Samba as a WINS server&lt;br /&gt;
* Understand name resolution&lt;br /&gt;
* Configure Samba as a WINS server&lt;br /&gt;
* Configure WINS replication&lt;br /&gt;
* Understand NetBIOS browsing and browser elections&lt;br /&gt;
* Understand NETBIOS name types&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* nmblookup&lt;br /&gt;
* smbclient&lt;br /&gt;
* name resolve order&lt;br /&gt;
* lmhosts&lt;br /&gt;
* wins support, wins server, wins proxy, dns proxy&lt;br /&gt;
* domain master, os level, preferred master&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.2 Active Directory Name Resolution (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with the internal DNS server with Samba4.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and manage DNS for Samba4 as an AD Domain Controller&lt;br /&gt;
* DNS forwarding with the internal DNS server of Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba-tool dns (with subcommands)&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dns forwarder&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
* dig, host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 397: Working with Linux and Windows Clients&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.1 CIFS Integration (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be comfortable working with CIFS in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand SMB/CIFS concepts&lt;br /&gt;
* Access and mount remote CIFS shares from a Linux client&lt;br /&gt;
* Securely storing CIFS credentials&lt;br /&gt;
* Understand features and benefits of CIFS&lt;br /&gt;
* Understand permissions and file ownership of remote CIFS shares&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SMB/CIFS&lt;br /&gt;
* mount, mount.cifs&lt;br /&gt;
* smbclient&lt;br /&gt;
* smbget&lt;br /&gt;
* smbtar&lt;br /&gt;
* smbtree&lt;br /&gt;
* findsmb&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.2 Working with Windows Clients (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to interact with remote Windows clients, and configure Windows workstations to access file and print services from Linux servers.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of Windows clients&lt;br /&gt;
* Explore browse lists and SMB clients from Windows&lt;br /&gt;
* Share file / print resources from Windows&lt;br /&gt;
* Use of the smbclient program&lt;br /&gt;
* Use of the Windows net utility&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Windows net command&lt;br /&gt;
* smbclient&lt;br /&gt;
* control panel&lt;br /&gt;
* rdesktop&lt;br /&gt;
* workgroup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4307</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4307"/>
		<updated>2017-12-08T01:43:55Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* Topic 391: OpenLDAP as an Authentication Backend */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: Configuración de OpenLDAP&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Replicación de OpenLDAP (Pesot: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con la replicación del servidor disponible con OpenLDAP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conceptos de replicación&lt;br /&gt;
* Configurar la replicación de OpenLDAP&lt;br /&gt;
* Analizar archivos de registro de replicación&lt;br /&gt;
* Comprender los centros de réplica&lt;br /&gt;
* Referencias de LDAP&lt;br /&gt;
* Replicación de sincronización LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* servidor maestro / esclavo&lt;br /&gt;
* replicación multi-master&lt;br /&gt;
* consumer&lt;br /&gt;
* hub de réplica&lt;br /&gt;
* modo one-shot&lt;br /&gt;
* referral&lt;br /&gt;
* syncrepl&lt;br /&gt;
* sincronización basada en pull / basado en push&lt;br /&gt;
* refreshOnly and refreshAndPersist&lt;br /&gt;
* replog&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.2  Asegurar el directorio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder configurar el acceso codificado al directorio LDAP y restringir el acceso al nivel del firewall.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Asegurar el directorio con SSL y TLS&lt;br /&gt;
* Consideraciones de firewall&lt;br /&gt;
* Métodos de acceso no autenticado&lt;br /&gt;
* Métodos de autenticación de usuario / contraseña&lt;br /&gt;
* Mantenimiento del usuario SASL DB&lt;br /&gt;
* Certificados de cliente / servidor&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL / TLS&lt;br /&gt;
* Factores de fortaleza de seguridad (SSF)&lt;br /&gt;
* SASL&lt;br /&gt;
* autorización de proxy&lt;br /&gt;
* StartTLS&lt;br /&gt;
* iptables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.3  Ajuste del rendimiento del servidor OpenLDAP (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de medir el rendimiento de un servidor LDAP y ajustar las directivas de configuración.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Medir el rendimiento de OpenLDAP&lt;br /&gt;
* Ajuste la configuración del software para aumentar el rendimiento&lt;br /&gt;
* Comprender los índices&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* index&lt;br /&gt;
* DB_CONFIG&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 391: OpenLDAP como un backend de autenticación&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.1 Integración LDAP con PAM y NSS (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de configurar PAM y NSS para recuperar información de un directorio LDAP.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configurar PAM para usar LDAP para autenticación&lt;br /&gt;
* Configurar NSS para recuperar información de LDAP&lt;br /&gt;
* Configurar módulos PAM en varios entornos Unix&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM&lt;br /&gt;
* NSS&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
* /etc/nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.2 Integración de LDAP con Active Directory y Kerberos (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deberían poder integrar LDAP con los Servicios de Active Directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Integración de Kerberos con LDAP&lt;br /&gt;
* Autenticación multiplataforma&lt;br /&gt;
* Conceptos de inicio de sesión único&lt;br /&gt;
* Limitaciones de integración y compatibilidad entre OpenLDAP y Active Directory&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos&lt;br /&gt;
* Directorio Activo&lt;br /&gt;
* inicio de sesión único&lt;br /&gt;
* DNS&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 392: Samba Basics&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.1 Samba Concepts and Architecture (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the essential concepts of Samba.  As well, the major differences between Samba3 and Samba4 should be known.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the roles of the Samba daemons and components&lt;br /&gt;
* Understand key issues regarding heterogeneous networks&lt;br /&gt;
* Identify key TCP/UDP ports used with SMB/CIFS&lt;br /&gt;
* Knowledge of Samba3 and Samba4 differences&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
* Samba daemons: smbd, nmbd, samba, winbindd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.2 Configure Samba (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure the Samba daemons for a wide variety of purposes.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of Samba server configuration file structure&lt;br /&gt;
* Knowledge of Samba variables and configuration parameters&lt;br /&gt;
* Troubleshoot and debug configuration problems with Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smb.conf parameters&lt;br /&gt;
* smb.conf variables&lt;br /&gt;
* testparm&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.3 Regular Samba Maintenance (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should know about the various tools and utilities that are part of a Samba installation.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Monitor and interact with running Samba daemons&lt;br /&gt;
* Perform regular backups of Samba configuration and state data&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smbcontrol&lt;br /&gt;
* smbstatus&lt;br /&gt;
* tdbbackup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.4 Troubleshooting Samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the structure of trivial database files and know how troubleshoot problems.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure Samba logging&lt;br /&gt;
* Backup TDB files&lt;br /&gt;
* Restore TDB files&lt;br /&gt;
* Identify TDB file corruption&lt;br /&gt;
* Edit / list TDB file content&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/log/samba/&lt;br /&gt;
* log level&lt;br /&gt;
* debuglevel&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* pdbedit&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
* tdbbackup&lt;br /&gt;
* tdbdump&lt;br /&gt;
* tdbrestore&lt;br /&gt;
* tdbtool&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.5 Internationalization (Peso: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to work with internationalization character codes and code pages.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand internationalization character codes and code pages&lt;br /&gt;
* Understand the difference in the name space between Windows and Linux/Unix with respect to share, file and directory names in a non-English environment&lt;br /&gt;
* Understand the difference in the name space between Windows and Linux/Unix with respect to user and group naming in a non-English environment&lt;br /&gt;
* Understand the difference in the name space between Windows and Linux/Unix with respect to computer naming in a non-English environment&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* internationalization&lt;br /&gt;
* character codes&lt;br /&gt;
* code pages&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dos charset, display charset and unix charset&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 393: Samba Share Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.1 File Services (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to create and configure file shares in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create and configure file sharing&lt;br /&gt;
* Plan file service migration&lt;br /&gt;
* Limit access to IPC$&lt;br /&gt;
* Create scripts for user and group handling of file shares&lt;br /&gt;
* Samba share access configuration parameters&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [homes]&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* smbsh&lt;br /&gt;
* browseable, writeable, valid users, write list, read list, read only and guest ok&lt;br /&gt;
* IPC$&lt;br /&gt;
* mount, smbmount&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.2 Linux File System and Share/Service Permissions (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand file permissions on a Linux file system in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of file / directory permission control&lt;br /&gt;
* Understand how Samba interacts with Linux file system permissions and ACLs&lt;br /&gt;
* Use Samba VFS to store Windows ACLs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* chmod, chown&lt;br /&gt;
* create mask, directory mask, force create mode, force directory mode&lt;br /&gt;
* smbcacls&lt;br /&gt;
* getfacl, setfacl&lt;br /&gt;
* vfs_acl_xattr, vfs_acl_tdb and vfs objects&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.3 Print Services (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to create and manage print shares in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create and configure printer sharing&lt;br /&gt;
* Configure integration between Samba and CUPS&lt;br /&gt;
* Manage Windows print drivers and configure downloading of print drivers&lt;br /&gt;
* Configure [print$]&lt;br /&gt;
* Understand security concerns with printer sharing&lt;br /&gt;
* Uploading printer drivers for Point&#039;n&#039;Print driver installation using &#039;Add Print Driver Wizard&#039; in Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [print$]&lt;br /&gt;
* CUPS&lt;br /&gt;
* cupsd.conf&lt;br /&gt;
* /var/spool/samba/&lt;br /&gt;
* smbspool&lt;br /&gt;
* rpcclient&lt;br /&gt;
* net&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 394: Samba User and Group Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.1 Managing User Accounts and Groups (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to manage user and group accounts in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Manager user and group accounts&lt;br /&gt;
* Understand user and group mapping&lt;br /&gt;
* Knowledge of user account management tools&lt;br /&gt;
* Use of the smbpasswd program&lt;br /&gt;
* Force ownership of file and directory objects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* pdbedit&lt;br /&gt;
* smb.conf&lt;br /&gt;
* samba-tool user (with subcommands)&lt;br /&gt;
* samba-tool group (with subcommands)&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
* force user, force group&lt;br /&gt;
* idmap&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.2 Authentication, Authorization and Winbind (Peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the various authentication mechanisms and configure access control.  Candidates should be able to install and configure the Winbind service.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Setup a local password database&lt;br /&gt;
* Perform password synchronization&lt;br /&gt;
* Knowledge of different passdb backends&lt;br /&gt;
* Convert between Samba passdb backends&lt;br /&gt;
* Integrate Samba with LDAP&lt;br /&gt;
* Configure Winbind service&lt;br /&gt;
* Configure PAM and NSS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbpasswd, tdbsam, ldapsam&lt;br /&gt;
* passdb backend&lt;br /&gt;
* libnss_winbind&lt;br /&gt;
* libpam_winbind&lt;br /&gt;
* libpam_smbpass&lt;br /&gt;
* wbinfo&lt;br /&gt;
* getent&lt;br /&gt;
* SID and foreign SID&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 395: Samba Domain Integration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.1 Samba as a PDC and BDC (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to setup and maintain primary and backup domain controllers.  Candidates should be able to manage Windows/Linux client access to the NT-Style domains.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and configure domain membership and trust relationships&lt;br /&gt;
* Create and maintain a primary domain controller with Samba3 and Samba4&lt;br /&gt;
* Create and maintain a backup domain controller with Samba3 and Samba4&lt;br /&gt;
* Add computers to an existing domain&lt;br /&gt;
* Configure logon scripts&lt;br /&gt;
* Configure roaming profiles&lt;br /&gt;
* Configure system policies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* security mode&lt;br /&gt;
* server role&lt;br /&gt;
* domain logons&lt;br /&gt;
* domain master&lt;br /&gt;
* logon script&lt;br /&gt;
* logon path&lt;br /&gt;
* NTConfig.pol&lt;br /&gt;
* net&lt;br /&gt;
* profiles&lt;br /&gt;
* add machine script&lt;br /&gt;
* profile acls&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.2 Samba4 as an AD compatible Domain Controller (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure Samba 4 as an AD Domain Controller.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure and test Samba 4 as an AD DC&lt;br /&gt;
* Using smbclient to confirm AD operation&lt;br /&gt;
* Understand how Samba integrates with AD services: DNS, Kerberos, NTP, LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* samba-tool domain (with subcommands)&lt;br /&gt;
* samba&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.3 Configure Samba as a Domain Member Server (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to integrate Linux servers into an environment where Active Directory is present.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Joining Samba to an existing NT4 domain&lt;br /&gt;
* Joining Samba to an existing AD domain&lt;br /&gt;
* Ability to obtain a TGT from a KDC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* server security&lt;br /&gt;
* net command&lt;br /&gt;
* kinit, TGT and REALM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 396: Samba Name Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.1 NetBIOS and WINS (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with NetBIOS/WINS concepts and understand network browsing.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand WINS concepts&lt;br /&gt;
* Understand NetBIOS concepts&lt;br /&gt;
* Understand the role of a local master browser&lt;br /&gt;
* Understand the role of a domain master browser&lt;br /&gt;
* Understand the role of Samba as a WINS server&lt;br /&gt;
* Understand name resolution&lt;br /&gt;
* Configure Samba as a WINS server&lt;br /&gt;
* Configure WINS replication&lt;br /&gt;
* Understand NetBIOS browsing and browser elections&lt;br /&gt;
* Understand NETBIOS name types&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* nmblookup&lt;br /&gt;
* smbclient&lt;br /&gt;
* name resolve order&lt;br /&gt;
* lmhosts&lt;br /&gt;
* wins support, wins server, wins proxy, dns proxy&lt;br /&gt;
* domain master, os level, preferred master&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.2 Active Directory Name Resolution (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with the internal DNS server with Samba4.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and manage DNS for Samba4 as an AD Domain Controller&lt;br /&gt;
* DNS forwarding with the internal DNS server of Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba-tool dns (with subcommands)&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dns forwarder&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
* dig, host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 397: Working with Linux and Windows Clients&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.1 CIFS Integration (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be comfortable working with CIFS in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand SMB/CIFS concepts&lt;br /&gt;
* Access and mount remote CIFS shares from a Linux client&lt;br /&gt;
* Securely storing CIFS credentials&lt;br /&gt;
* Understand features and benefits of CIFS&lt;br /&gt;
* Understand permissions and file ownership of remote CIFS shares&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SMB/CIFS&lt;br /&gt;
* mount, mount.cifs&lt;br /&gt;
* smbclient&lt;br /&gt;
* smbget&lt;br /&gt;
* smbtar&lt;br /&gt;
* smbtree&lt;br /&gt;
* findsmb&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.2 Working with Windows Clients (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to interact with remote Windows clients, and configure Windows workstations to access file and print services from Linux servers.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of Windows clients&lt;br /&gt;
* Explore browse lists and SMB clients from Windows&lt;br /&gt;
* Share file / print resources from Windows&lt;br /&gt;
* Use of the smbclient program&lt;br /&gt;
* Use of the Windows net utility&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Windows net command&lt;br /&gt;
* smbclient&lt;br /&gt;
* control panel&lt;br /&gt;
* rdesktop&lt;br /&gt;
* workgroup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4306</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4306"/>
		<updated>2017-12-08T01:40:52Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* 390.3 OpenLDAP Server Performance Tuning (Peso: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: Configuración de OpenLDAP&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Replicación de OpenLDAP (Pesot: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con la replicación del servidor disponible con OpenLDAP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conceptos de replicación&lt;br /&gt;
* Configurar la replicación de OpenLDAP&lt;br /&gt;
* Analizar archivos de registro de replicación&lt;br /&gt;
* Comprender los centros de réplica&lt;br /&gt;
* Referencias de LDAP&lt;br /&gt;
* Replicación de sincronización LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* servidor maestro / esclavo&lt;br /&gt;
* replicación multi-master&lt;br /&gt;
* consumer&lt;br /&gt;
* hub de réplica&lt;br /&gt;
* modo one-shot&lt;br /&gt;
* referral&lt;br /&gt;
* syncrepl&lt;br /&gt;
* sincronización basada en pull / basado en push&lt;br /&gt;
* refreshOnly and refreshAndPersist&lt;br /&gt;
* replog&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.2  Asegurar el directorio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder configurar el acceso codificado al directorio LDAP y restringir el acceso al nivel del firewall.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Asegurar el directorio con SSL y TLS&lt;br /&gt;
* Consideraciones de firewall&lt;br /&gt;
* Métodos de acceso no autenticado&lt;br /&gt;
* Métodos de autenticación de usuario / contraseña&lt;br /&gt;
* Mantenimiento del usuario SASL DB&lt;br /&gt;
* Certificados de cliente / servidor&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL / TLS&lt;br /&gt;
* Factores de fortaleza de seguridad (SSF)&lt;br /&gt;
* SASL&lt;br /&gt;
* autorización de proxy&lt;br /&gt;
* StartTLS&lt;br /&gt;
* iptables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.3  Ajuste del rendimiento del servidor OpenLDAP (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben ser capaces de medir el rendimiento de un servidor LDAP y ajustar las directivas de configuración.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Medir el rendimiento de OpenLDAP&lt;br /&gt;
* Ajuste la configuración del software para aumentar el rendimiento&lt;br /&gt;
* Comprender los índices&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* index&lt;br /&gt;
* DB_CONFIG&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 391: OpenLDAP as an Authentication Backend&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.1 LDAP Integration with PAM and NSS (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure PAM and NSS to retrieve information from an LDAP directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure PAM to use LDAP for authentication&lt;br /&gt;
* Configure NSS to retrieve information from LDAP&lt;br /&gt;
* Configure PAM modules in various Unix environments&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM&lt;br /&gt;
* NSS&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
* /etc/nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.2 Integrating LDAP with Active Directory and Kerberos (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to integrate LDAP with Active Directory Services.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos integration with LDAP&lt;br /&gt;
* Cross platform authentication&lt;br /&gt;
* Single sign-on concepts&lt;br /&gt;
* Integration and compatibility limitations between OpenLDAP and Active Directory&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos&lt;br /&gt;
* Active Directory&lt;br /&gt;
* single sign-on&lt;br /&gt;
* DNS &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 392: Samba Basics&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.1 Samba Concepts and Architecture (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the essential concepts of Samba.  As well, the major differences between Samba3 and Samba4 should be known.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the roles of the Samba daemons and components&lt;br /&gt;
* Understand key issues regarding heterogeneous networks&lt;br /&gt;
* Identify key TCP/UDP ports used with SMB/CIFS&lt;br /&gt;
* Knowledge of Samba3 and Samba4 differences&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
* Samba daemons: smbd, nmbd, samba, winbindd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.2 Configure Samba (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure the Samba daemons for a wide variety of purposes.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of Samba server configuration file structure&lt;br /&gt;
* Knowledge of Samba variables and configuration parameters&lt;br /&gt;
* Troubleshoot and debug configuration problems with Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smb.conf parameters&lt;br /&gt;
* smb.conf variables&lt;br /&gt;
* testparm&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.3 Regular Samba Maintenance (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should know about the various tools and utilities that are part of a Samba installation.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Monitor and interact with running Samba daemons&lt;br /&gt;
* Perform regular backups of Samba configuration and state data&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smbcontrol&lt;br /&gt;
* smbstatus&lt;br /&gt;
* tdbbackup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.4 Troubleshooting Samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the structure of trivial database files and know how troubleshoot problems.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure Samba logging&lt;br /&gt;
* Backup TDB files&lt;br /&gt;
* Restore TDB files&lt;br /&gt;
* Identify TDB file corruption&lt;br /&gt;
* Edit / list TDB file content&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/log/samba/&lt;br /&gt;
* log level&lt;br /&gt;
* debuglevel&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* pdbedit&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
* tdbbackup&lt;br /&gt;
* tdbdump&lt;br /&gt;
* tdbrestore&lt;br /&gt;
* tdbtool&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.5 Internationalization (Peso: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to work with internationalization character codes and code pages.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand internationalization character codes and code pages&lt;br /&gt;
* Understand the difference in the name space between Windows and Linux/Unix with respect to share, file and directory names in a non-English environment&lt;br /&gt;
* Understand the difference in the name space between Windows and Linux/Unix with respect to user and group naming in a non-English environment&lt;br /&gt;
* Understand the difference in the name space between Windows and Linux/Unix with respect to computer naming in a non-English environment&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* internationalization&lt;br /&gt;
* character codes&lt;br /&gt;
* code pages&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dos charset, display charset and unix charset&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 393: Samba Share Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.1 File Services (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to create and configure file shares in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create and configure file sharing&lt;br /&gt;
* Plan file service migration&lt;br /&gt;
* Limit access to IPC$&lt;br /&gt;
* Create scripts for user and group handling of file shares&lt;br /&gt;
* Samba share access configuration parameters&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [homes]&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* smbsh&lt;br /&gt;
* browseable, writeable, valid users, write list, read list, read only and guest ok&lt;br /&gt;
* IPC$&lt;br /&gt;
* mount, smbmount&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.2 Linux File System and Share/Service Permissions (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand file permissions on a Linux file system in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of file / directory permission control&lt;br /&gt;
* Understand how Samba interacts with Linux file system permissions and ACLs&lt;br /&gt;
* Use Samba VFS to store Windows ACLs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* chmod, chown&lt;br /&gt;
* create mask, directory mask, force create mode, force directory mode&lt;br /&gt;
* smbcacls&lt;br /&gt;
* getfacl, setfacl&lt;br /&gt;
* vfs_acl_xattr, vfs_acl_tdb and vfs objects&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.3 Print Services (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to create and manage print shares in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create and configure printer sharing&lt;br /&gt;
* Configure integration between Samba and CUPS&lt;br /&gt;
* Manage Windows print drivers and configure downloading of print drivers&lt;br /&gt;
* Configure [print$]&lt;br /&gt;
* Understand security concerns with printer sharing&lt;br /&gt;
* Uploading printer drivers for Point&#039;n&#039;Print driver installation using &#039;Add Print Driver Wizard&#039; in Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [print$]&lt;br /&gt;
* CUPS&lt;br /&gt;
* cupsd.conf&lt;br /&gt;
* /var/spool/samba/&lt;br /&gt;
* smbspool&lt;br /&gt;
* rpcclient&lt;br /&gt;
* net&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 394: Samba User and Group Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.1 Managing User Accounts and Groups (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to manage user and group accounts in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Manager user and group accounts&lt;br /&gt;
* Understand user and group mapping&lt;br /&gt;
* Knowledge of user account management tools&lt;br /&gt;
* Use of the smbpasswd program&lt;br /&gt;
* Force ownership of file and directory objects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* pdbedit&lt;br /&gt;
* smb.conf&lt;br /&gt;
* samba-tool user (with subcommands)&lt;br /&gt;
* samba-tool group (with subcommands)&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
* force user, force group&lt;br /&gt;
* idmap&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.2 Authentication, Authorization and Winbind (Peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the various authentication mechanisms and configure access control.  Candidates should be able to install and configure the Winbind service.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Setup a local password database&lt;br /&gt;
* Perform password synchronization&lt;br /&gt;
* Knowledge of different passdb backends&lt;br /&gt;
* Convert between Samba passdb backends&lt;br /&gt;
* Integrate Samba with LDAP&lt;br /&gt;
* Configure Winbind service&lt;br /&gt;
* Configure PAM and NSS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbpasswd, tdbsam, ldapsam&lt;br /&gt;
* passdb backend&lt;br /&gt;
* libnss_winbind&lt;br /&gt;
* libpam_winbind&lt;br /&gt;
* libpam_smbpass&lt;br /&gt;
* wbinfo&lt;br /&gt;
* getent&lt;br /&gt;
* SID and foreign SID&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 395: Samba Domain Integration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.1 Samba as a PDC and BDC (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to setup and maintain primary and backup domain controllers.  Candidates should be able to manage Windows/Linux client access to the NT-Style domains.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and configure domain membership and trust relationships&lt;br /&gt;
* Create and maintain a primary domain controller with Samba3 and Samba4&lt;br /&gt;
* Create and maintain a backup domain controller with Samba3 and Samba4&lt;br /&gt;
* Add computers to an existing domain&lt;br /&gt;
* Configure logon scripts&lt;br /&gt;
* Configure roaming profiles&lt;br /&gt;
* Configure system policies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* security mode&lt;br /&gt;
* server role&lt;br /&gt;
* domain logons&lt;br /&gt;
* domain master&lt;br /&gt;
* logon script&lt;br /&gt;
* logon path&lt;br /&gt;
* NTConfig.pol&lt;br /&gt;
* net&lt;br /&gt;
* profiles&lt;br /&gt;
* add machine script&lt;br /&gt;
* profile acls&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.2 Samba4 as an AD compatible Domain Controller (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure Samba 4 as an AD Domain Controller.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure and test Samba 4 as an AD DC&lt;br /&gt;
* Using smbclient to confirm AD operation&lt;br /&gt;
* Understand how Samba integrates with AD services: DNS, Kerberos, NTP, LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* samba-tool domain (with subcommands)&lt;br /&gt;
* samba&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.3 Configure Samba as a Domain Member Server (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to integrate Linux servers into an environment where Active Directory is present.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Joining Samba to an existing NT4 domain&lt;br /&gt;
* Joining Samba to an existing AD domain&lt;br /&gt;
* Ability to obtain a TGT from a KDC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* server security&lt;br /&gt;
* net command&lt;br /&gt;
* kinit, TGT and REALM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 396: Samba Name Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.1 NetBIOS and WINS (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with NetBIOS/WINS concepts and understand network browsing.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand WINS concepts&lt;br /&gt;
* Understand NetBIOS concepts&lt;br /&gt;
* Understand the role of a local master browser&lt;br /&gt;
* Understand the role of a domain master browser&lt;br /&gt;
* Understand the role of Samba as a WINS server&lt;br /&gt;
* Understand name resolution&lt;br /&gt;
* Configure Samba as a WINS server&lt;br /&gt;
* Configure WINS replication&lt;br /&gt;
* Understand NetBIOS browsing and browser elections&lt;br /&gt;
* Understand NETBIOS name types&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* nmblookup&lt;br /&gt;
* smbclient&lt;br /&gt;
* name resolve order&lt;br /&gt;
* lmhosts&lt;br /&gt;
* wins support, wins server, wins proxy, dns proxy&lt;br /&gt;
* domain master, os level, preferred master&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.2 Active Directory Name Resolution (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with the internal DNS server with Samba4.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and manage DNS for Samba4 as an AD Domain Controller&lt;br /&gt;
* DNS forwarding with the internal DNS server of Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba-tool dns (with subcommands)&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dns forwarder&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
* dig, host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 397: Working with Linux and Windows Clients&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.1 CIFS Integration (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be comfortable working with CIFS in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand SMB/CIFS concepts&lt;br /&gt;
* Access and mount remote CIFS shares from a Linux client&lt;br /&gt;
* Securely storing CIFS credentials&lt;br /&gt;
* Understand features and benefits of CIFS&lt;br /&gt;
* Understand permissions and file ownership of remote CIFS shares&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SMB/CIFS&lt;br /&gt;
* mount, mount.cifs&lt;br /&gt;
* smbclient&lt;br /&gt;
* smbget&lt;br /&gt;
* smbtar&lt;br /&gt;
* smbtree&lt;br /&gt;
* findsmb&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.2 Working with Windows Clients (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to interact with remote Windows clients, and configure Windows workstations to access file and print services from Linux servers.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of Windows clients&lt;br /&gt;
* Explore browse lists and SMB clients from Windows&lt;br /&gt;
* Share file / print resources from Windows&lt;br /&gt;
* Use of the smbclient program&lt;br /&gt;
* Use of the Windows net utility&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Windows net command&lt;br /&gt;
* smbclient&lt;br /&gt;
* control panel&lt;br /&gt;
* rdesktop&lt;br /&gt;
* workgroup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4305</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4305"/>
		<updated>2017-12-08T01:32:32Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: Configuración de OpenLDAP&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Replicación de OpenLDAP (Pesot: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con la replicación del servidor disponible con OpenLDAP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conceptos de replicación&lt;br /&gt;
* Configurar la replicación de OpenLDAP&lt;br /&gt;
* Analizar archivos de registro de replicación&lt;br /&gt;
* Comprender los centros de réplica&lt;br /&gt;
* Referencias de LDAP&lt;br /&gt;
* Replicación de sincronización LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* servidor maestro / esclavo&lt;br /&gt;
* replicación multi-master&lt;br /&gt;
* consumer&lt;br /&gt;
* hub de réplica&lt;br /&gt;
* modo one-shot&lt;br /&gt;
* referral&lt;br /&gt;
* syncrepl&lt;br /&gt;
* sincronización basada en pull / basado en push&lt;br /&gt;
* refreshOnly and refreshAndPersist&lt;br /&gt;
* replog&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.2  Asegurar el directorio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder configurar el acceso codificado al directorio LDAP y restringir el acceso al nivel del firewall.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Asegurar el directorio con SSL y TLS&lt;br /&gt;
* Consideraciones de firewall&lt;br /&gt;
* Métodos de acceso no autenticado&lt;br /&gt;
* Métodos de autenticación de usuario / contraseña&lt;br /&gt;
* Mantenimiento del usuario SASL DB&lt;br /&gt;
* Certificados de cliente / servidor&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL / TLS&lt;br /&gt;
* Factores de fortaleza de seguridad (SSF)&lt;br /&gt;
* SASL&lt;br /&gt;
* autorización de proxy&lt;br /&gt;
* StartTLS&lt;br /&gt;
* iptables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.3 OpenLDAP Server Performance Tuning (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be capable of measuring the performance of an LDAP server, and tuning configuration directives.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure OpenLDAP performance&lt;br /&gt;
* Tune software configuration to increase performance&lt;br /&gt;
* Understand indexes&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* index&lt;br /&gt;
* DB_CONFIG&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 391: OpenLDAP as an Authentication Backend&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.1 LDAP Integration with PAM and NSS (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure PAM and NSS to retrieve information from an LDAP directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure PAM to use LDAP for authentication&lt;br /&gt;
* Configure NSS to retrieve information from LDAP&lt;br /&gt;
* Configure PAM modules in various Unix environments&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM&lt;br /&gt;
* NSS&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
* /etc/nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.2 Integrating LDAP with Active Directory and Kerberos (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to integrate LDAP with Active Directory Services.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos integration with LDAP&lt;br /&gt;
* Cross platform authentication&lt;br /&gt;
* Single sign-on concepts&lt;br /&gt;
* Integration and compatibility limitations between OpenLDAP and Active Directory&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos&lt;br /&gt;
* Active Directory&lt;br /&gt;
* single sign-on&lt;br /&gt;
* DNS &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 392: Samba Basics&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.1 Samba Concepts and Architecture (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the essential concepts of Samba.  As well, the major differences between Samba3 and Samba4 should be known.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the roles of the Samba daemons and components&lt;br /&gt;
* Understand key issues regarding heterogeneous networks&lt;br /&gt;
* Identify key TCP/UDP ports used with SMB/CIFS&lt;br /&gt;
* Knowledge of Samba3 and Samba4 differences&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
* Samba daemons: smbd, nmbd, samba, winbindd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.2 Configure Samba (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure the Samba daemons for a wide variety of purposes.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of Samba server configuration file structure&lt;br /&gt;
* Knowledge of Samba variables and configuration parameters&lt;br /&gt;
* Troubleshoot and debug configuration problems with Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smb.conf parameters&lt;br /&gt;
* smb.conf variables&lt;br /&gt;
* testparm&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.3 Regular Samba Maintenance (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should know about the various tools and utilities that are part of a Samba installation.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Monitor and interact with running Samba daemons&lt;br /&gt;
* Perform regular backups of Samba configuration and state data&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smbcontrol&lt;br /&gt;
* smbstatus&lt;br /&gt;
* tdbbackup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.4 Troubleshooting Samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the structure of trivial database files and know how troubleshoot problems.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure Samba logging&lt;br /&gt;
* Backup TDB files&lt;br /&gt;
* Restore TDB files&lt;br /&gt;
* Identify TDB file corruption&lt;br /&gt;
* Edit / list TDB file content&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/log/samba/&lt;br /&gt;
* log level&lt;br /&gt;
* debuglevel&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* pdbedit&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
* tdbbackup&lt;br /&gt;
* tdbdump&lt;br /&gt;
* tdbrestore&lt;br /&gt;
* tdbtool&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.5 Internationalization (Peso: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to work with internationalization character codes and code pages.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand internationalization character codes and code pages&lt;br /&gt;
* Understand the difference in the name space between Windows and Linux/Unix with respect to share, file and directory names in a non-English environment&lt;br /&gt;
* Understand the difference in the name space between Windows and Linux/Unix with respect to user and group naming in a non-English environment&lt;br /&gt;
* Understand the difference in the name space between Windows and Linux/Unix with respect to computer naming in a non-English environment&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* internationalization&lt;br /&gt;
* character codes&lt;br /&gt;
* code pages&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dos charset, display charset and unix charset&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 393: Samba Share Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.1 File Services (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to create and configure file shares in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create and configure file sharing&lt;br /&gt;
* Plan file service migration&lt;br /&gt;
* Limit access to IPC$&lt;br /&gt;
* Create scripts for user and group handling of file shares&lt;br /&gt;
* Samba share access configuration parameters&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [homes]&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* smbsh&lt;br /&gt;
* browseable, writeable, valid users, write list, read list, read only and guest ok&lt;br /&gt;
* IPC$&lt;br /&gt;
* mount, smbmount&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.2 Linux File System and Share/Service Permissions (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand file permissions on a Linux file system in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of file / directory permission control&lt;br /&gt;
* Understand how Samba interacts with Linux file system permissions and ACLs&lt;br /&gt;
* Use Samba VFS to store Windows ACLs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* chmod, chown&lt;br /&gt;
* create mask, directory mask, force create mode, force directory mode&lt;br /&gt;
* smbcacls&lt;br /&gt;
* getfacl, setfacl&lt;br /&gt;
* vfs_acl_xattr, vfs_acl_tdb and vfs objects&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.3 Print Services (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to create and manage print shares in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create and configure printer sharing&lt;br /&gt;
* Configure integration between Samba and CUPS&lt;br /&gt;
* Manage Windows print drivers and configure downloading of print drivers&lt;br /&gt;
* Configure [print$]&lt;br /&gt;
* Understand security concerns with printer sharing&lt;br /&gt;
* Uploading printer drivers for Point&#039;n&#039;Print driver installation using &#039;Add Print Driver Wizard&#039; in Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [print$]&lt;br /&gt;
* CUPS&lt;br /&gt;
* cupsd.conf&lt;br /&gt;
* /var/spool/samba/&lt;br /&gt;
* smbspool&lt;br /&gt;
* rpcclient&lt;br /&gt;
* net&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 394: Samba User and Group Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.1 Managing User Accounts and Groups (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to manage user and group accounts in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Manager user and group accounts&lt;br /&gt;
* Understand user and group mapping&lt;br /&gt;
* Knowledge of user account management tools&lt;br /&gt;
* Use of the smbpasswd program&lt;br /&gt;
* Force ownership of file and directory objects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* pdbedit&lt;br /&gt;
* smb.conf&lt;br /&gt;
* samba-tool user (with subcommands)&lt;br /&gt;
* samba-tool group (with subcommands)&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
* force user, force group&lt;br /&gt;
* idmap&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.2 Authentication, Authorization and Winbind (Peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the various authentication mechanisms and configure access control.  Candidates should be able to install and configure the Winbind service.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Setup a local password database&lt;br /&gt;
* Perform password synchronization&lt;br /&gt;
* Knowledge of different passdb backends&lt;br /&gt;
* Convert between Samba passdb backends&lt;br /&gt;
* Integrate Samba with LDAP&lt;br /&gt;
* Configure Winbind service&lt;br /&gt;
* Configure PAM and NSS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbpasswd, tdbsam, ldapsam&lt;br /&gt;
* passdb backend&lt;br /&gt;
* libnss_winbind&lt;br /&gt;
* libpam_winbind&lt;br /&gt;
* libpam_smbpass&lt;br /&gt;
* wbinfo&lt;br /&gt;
* getent&lt;br /&gt;
* SID and foreign SID&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 395: Samba Domain Integration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.1 Samba as a PDC and BDC (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to setup and maintain primary and backup domain controllers.  Candidates should be able to manage Windows/Linux client access to the NT-Style domains.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and configure domain membership and trust relationships&lt;br /&gt;
* Create and maintain a primary domain controller with Samba3 and Samba4&lt;br /&gt;
* Create and maintain a backup domain controller with Samba3 and Samba4&lt;br /&gt;
* Add computers to an existing domain&lt;br /&gt;
* Configure logon scripts&lt;br /&gt;
* Configure roaming profiles&lt;br /&gt;
* Configure system policies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* security mode&lt;br /&gt;
* server role&lt;br /&gt;
* domain logons&lt;br /&gt;
* domain master&lt;br /&gt;
* logon script&lt;br /&gt;
* logon path&lt;br /&gt;
* NTConfig.pol&lt;br /&gt;
* net&lt;br /&gt;
* profiles&lt;br /&gt;
* add machine script&lt;br /&gt;
* profile acls&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.2 Samba4 as an AD compatible Domain Controller (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure Samba 4 as an AD Domain Controller.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure and test Samba 4 as an AD DC&lt;br /&gt;
* Using smbclient to confirm AD operation&lt;br /&gt;
* Understand how Samba integrates with AD services: DNS, Kerberos, NTP, LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* samba-tool domain (with subcommands)&lt;br /&gt;
* samba&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.3 Configure Samba as a Domain Member Server (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to integrate Linux servers into an environment where Active Directory is present.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Joining Samba to an existing NT4 domain&lt;br /&gt;
* Joining Samba to an existing AD domain&lt;br /&gt;
* Ability to obtain a TGT from a KDC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* server security&lt;br /&gt;
* net command&lt;br /&gt;
* kinit, TGT and REALM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 396: Samba Name Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.1 NetBIOS and WINS (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with NetBIOS/WINS concepts and understand network browsing.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand WINS concepts&lt;br /&gt;
* Understand NetBIOS concepts&lt;br /&gt;
* Understand the role of a local master browser&lt;br /&gt;
* Understand the role of a domain master browser&lt;br /&gt;
* Understand the role of Samba as a WINS server&lt;br /&gt;
* Understand name resolution&lt;br /&gt;
* Configure Samba as a WINS server&lt;br /&gt;
* Configure WINS replication&lt;br /&gt;
* Understand NetBIOS browsing and browser elections&lt;br /&gt;
* Understand NETBIOS name types&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* nmblookup&lt;br /&gt;
* smbclient&lt;br /&gt;
* name resolve order&lt;br /&gt;
* lmhosts&lt;br /&gt;
* wins support, wins server, wins proxy, dns proxy&lt;br /&gt;
* domain master, os level, preferred master&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.2 Active Directory Name Resolution (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with the internal DNS server with Samba4.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and manage DNS for Samba4 as an AD Domain Controller&lt;br /&gt;
* DNS forwarding with the internal DNS server of Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba-tool dns (with subcommands)&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dns forwarder&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
* dig, host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 397: Working with Linux and Windows Clients&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.1 CIFS Integration (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be comfortable working with CIFS in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand SMB/CIFS concepts&lt;br /&gt;
* Access and mount remote CIFS shares from a Linux client&lt;br /&gt;
* Securely storing CIFS credentials&lt;br /&gt;
* Understand features and benefits of CIFS&lt;br /&gt;
* Understand permissions and file ownership of remote CIFS shares&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SMB/CIFS&lt;br /&gt;
* mount, mount.cifs&lt;br /&gt;
* smbclient&lt;br /&gt;
* smbget&lt;br /&gt;
* smbtar&lt;br /&gt;
* smbtree&lt;br /&gt;
* findsmb&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.2 Working with Windows Clients (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to interact with remote Windows clients, and configure Windows workstations to access file and print services from Linux servers.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of Windows clients&lt;br /&gt;
* Explore browse lists and SMB clients from Windows&lt;br /&gt;
* Share file / print resources from Windows&lt;br /&gt;
* Use of the smbclient program&lt;br /&gt;
* Use of the Windows net utility&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Windows net command&lt;br /&gt;
* smbclient&lt;br /&gt;
* control panel&lt;br /&gt;
* rdesktop&lt;br /&gt;
* workgroup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4304</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4304"/>
		<updated>2017-12-08T01:32:08Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: Configuración de OpenLDAP&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Replicación de OpenLDAP (Pesot: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con la replicación del servidor disponible con OpenLDAP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conceptos de replicación&lt;br /&gt;
* Configurar la replicación de OpenLDAP&lt;br /&gt;
* Analizar archivos de registro de replicación&lt;br /&gt;
* Comprender los centros de réplica&lt;br /&gt;
* Referencias de LDAP&lt;br /&gt;
* Replicación de sincronización LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* servidor maestro / esclavo&lt;br /&gt;
* replicación multi-master&lt;br /&gt;
* consumer&lt;br /&gt;
* hub de réplica&lt;br /&gt;
* modo one-shot&lt;br /&gt;
* referral&lt;br /&gt;
* syncrepl&lt;br /&gt;
* sincronización basada en pull / basado en push&lt;br /&gt;
* refreshOnly and refreshAndPersist&lt;br /&gt;
* replog&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.2  Asegurar el directorio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder configurar el acceso codificado al directorio LDAP y restringir el acceso al nivel del firewall.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Asegurar el directorio con SSL y TLS&lt;br /&gt;
* Consideraciones de firewall&lt;br /&gt;
* Métodos de acceso no autenticado&lt;br /&gt;
* Métodos de autenticación de usuario / contraseña&lt;br /&gt;
* Mantenimiento del usuario SASL DB&lt;br /&gt;
* Certificados de cliente / servidor&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL / TLS&lt;br /&gt;
* Factores de fortaleza de seguridad (SSF)&lt;br /&gt;
* SASL&lt;br /&gt;
* autorización de proxy&lt;br /&gt;
* StartTLS&lt;br /&gt;
* iptables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.3 OpenLDAP Server Performance Tuning (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be capable of measuring the performance of an LDAP server, and tuning configuration directives.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure OpenLDAP performance&lt;br /&gt;
* Tune software configuration to increase performance&lt;br /&gt;
* Understand indexes&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* index&lt;br /&gt;
* DB_CONFIG&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 391: OpenLDAP as an Authentication Backend&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.1 LDAP Integration with PAM and NSS (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure PAM and NSS to retrieve information from an LDAP directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure PAM to use LDAP for authentication&lt;br /&gt;
* Configure NSS to retrieve information from LDAP&lt;br /&gt;
* Configure PAM modules in various Unix environments&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM&lt;br /&gt;
* NSS&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
* /etc/nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.2 Integrating LDAP with Active Directory and Kerberos (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to integrate LDAP with Active Directory Services.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos integration with LDAP&lt;br /&gt;
* Cross platform authentication&lt;br /&gt;
* Single sign-on concepts&lt;br /&gt;
* Integration and compatibility limitations between OpenLDAP and Active Directory&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos&lt;br /&gt;
* Active Directory&lt;br /&gt;
* single sign-on&lt;br /&gt;
* DNS &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 392: Samba Basics&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.1 Samba Concepts and Architecture (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the essential concepts of Samba.  As well, the major differences between Samba3 and Samba4 should be known.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the roles of the Samba daemons and components&lt;br /&gt;
* Understand key issues regarding heterogeneous networks&lt;br /&gt;
* Identify key TCP/UDP ports used with SMB/CIFS&lt;br /&gt;
* Knowledge of Samba3 and Samba4 differences&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
* Samba daemons: smbd, nmbd, samba, winbindd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.2 Configure Samba (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure the Samba daemons for a wide variety of purposes.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of Samba server configuration file structure&lt;br /&gt;
* Knowledge of Samba variables and configuration parameters&lt;br /&gt;
* Troubleshoot and debug configuration problems with Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smb.conf parameters&lt;br /&gt;
* smb.conf variables&lt;br /&gt;
* testparm&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.3 Regular Samba Maintenance (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should know about the various tools and utilities that are part of a Samba installation.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Monitor and interact with running Samba daemons&lt;br /&gt;
* Perform regular backups of Samba configuration and state data&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smbcontrol&lt;br /&gt;
* smbstatus&lt;br /&gt;
* tdbbackup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.4 Troubleshooting Samba (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the structure of trivial database files and know how troubleshoot problems.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure Samba logging&lt;br /&gt;
* Backup TDB files&lt;br /&gt;
* Restore TDB files&lt;br /&gt;
* Identify TDB file corruption&lt;br /&gt;
* Edit / list TDB file content&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/log/samba/&lt;br /&gt;
* log level&lt;br /&gt;
* debuglevel&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* pdbedit&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
* tdbbackup&lt;br /&gt;
* tdbdump&lt;br /&gt;
* tdbrestore&lt;br /&gt;
* tdbtool&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.5 Internationalization (Peso: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to work with internationalization character codes and code pages.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand internationalization character codes and code pages&lt;br /&gt;
* Understand the difference in the name space between Windows and Linux/Unix with respect to share, file and directory names in a non-English environment&lt;br /&gt;
* Understand the difference in the name space between Windows and Linux/Unix with respect to user and group naming in a non-English environment&lt;br /&gt;
* Understand the difference in the name space between Windows and Linux/Unix with respect to computer naming in a non-English environment&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* internationalization&lt;br /&gt;
* character codes&lt;br /&gt;
* code pages&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dos charset, display charset and unix charset&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 393: Samba Share Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.1 File Services (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to create and configure file shares in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create and configure file sharing&lt;br /&gt;
* Plan file service migration&lt;br /&gt;
* Limit access to IPC$&lt;br /&gt;
* Create scripts for user and group handling of file shares&lt;br /&gt;
* Samba share access configuration parameters&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [homes]&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* smbsh&lt;br /&gt;
* browseable, writeable, valid users, write list, read list, read only and guest ok&lt;br /&gt;
* IPC$&lt;br /&gt;
* mount, smbmount&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.2 Linux File System and Share/Service Permissions (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand file permissions on a Linux file system in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of file / directory permission control&lt;br /&gt;
* Understand how Samba interacts with Linux file system permissions and ACLs&lt;br /&gt;
* Use Samba VFS to store Windows ACLs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* chmod, chown&lt;br /&gt;
* create mask, directory mask, force create mode, force directory mode&lt;br /&gt;
* smbcacls&lt;br /&gt;
* getfacl, setfacl&lt;br /&gt;
* vfs_acl_xattr, vfs_acl_tdb and vfs objects&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.3 Print Services (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to create and manage print shares in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create and configure printer sharing&lt;br /&gt;
* Configure integration between Samba and CUPS&lt;br /&gt;
* Manage Windows print drivers and configure downloading of print drivers&lt;br /&gt;
* Configure [print$]&lt;br /&gt;
* Understand security concerns with printer sharing&lt;br /&gt;
* Uploading printer drivers for Point&#039;n&#039;Print driver installation using &#039;Add Print Driver Wizard&#039; in Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [print$]&lt;br /&gt;
* CUPS&lt;br /&gt;
* cupsd.conf&lt;br /&gt;
* /var/spool/samba/&lt;br /&gt;
* smbspool&lt;br /&gt;
* rpcclient&lt;br /&gt;
* net&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 394: Samba User and Group Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.1 Managing User Accounts and Groups (Peso: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to manage user and group accounts in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Manager user and group accounts&lt;br /&gt;
* Understand user and group mapping&lt;br /&gt;
* Knowledge of user account management tools&lt;br /&gt;
* Use of the smbpasswd program&lt;br /&gt;
* Force ownership of file and directory objects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* pdbedit&lt;br /&gt;
* smb.conf&lt;br /&gt;
* samba-tool user (with subcommands)&lt;br /&gt;
* samba-tool group (with subcommands)&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
* force user, force group&lt;br /&gt;
* idmap&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.2 Authentication, Authorization and Winbind (Peso: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the various authentication mechanisms and configure access control.  Candidates should be able to install and configure the Winbind service.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Setup a local password database&lt;br /&gt;
* Perform password synchronization&lt;br /&gt;
* Knowledge of different passdb backends&lt;br /&gt;
* Convert between Samba passdb backends&lt;br /&gt;
* Integrate Samba with LDAP&lt;br /&gt;
* Configure Winbind service&lt;br /&gt;
* Configure PAM and NSS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbpasswd, tdbsam, ldapsam&lt;br /&gt;
* passdb backend&lt;br /&gt;
* libnss_winbind&lt;br /&gt;
* libpam_winbind&lt;br /&gt;
* libpam_smbpass&lt;br /&gt;
* wbinfo&lt;br /&gt;
* getent&lt;br /&gt;
* SID and foreign SID&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 395: Samba Domain Integration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.1 Samba as a PDC and BDC (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to setup and maintain primary and backup domain controllers.  Candidates should be able to manage Windows/Linux client access to the NT-Style domains.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and configure domain membership and trust relationships&lt;br /&gt;
* Create and maintain a primary domain controller with Samba3 and Samba4&lt;br /&gt;
* Create and maintain a backup domain controller with Samba3 and Samba4&lt;br /&gt;
* Add computers to an existing domain&lt;br /&gt;
* Configure logon scripts&lt;br /&gt;
* Configure roaming profiles&lt;br /&gt;
* Configure system policies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* security mode&lt;br /&gt;
* server role&lt;br /&gt;
* domain logons&lt;br /&gt;
* domain master&lt;br /&gt;
* logon script&lt;br /&gt;
* logon path&lt;br /&gt;
* NTConfig.pol&lt;br /&gt;
* net&lt;br /&gt;
* profiles&lt;br /&gt;
* add machine script&lt;br /&gt;
* profile acls&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.2 Samba4 as an AD compatible Domain Controller (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure Samba 4 as an AD Domain Controller.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure and test Samba 4 as an AD DC&lt;br /&gt;
* Using smbclient to confirm AD operation&lt;br /&gt;
* Understand how Samba integrates with AD services: DNS, Kerberos, NTP, LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* samba-tool domain (with subcommands)&lt;br /&gt;
* samba&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.3 Configure Samba as a Domain Member Server (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to integrate Linux servers into an environment where Active Directory is present.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Joining Samba to an existing NT4 domain&lt;br /&gt;
* Joining Samba to an existing AD domain&lt;br /&gt;
* Ability to obtain a TGT from a KDC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* server security&lt;br /&gt;
* net command&lt;br /&gt;
* kinit, TGT and REALM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 396: Samba Name Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.1 NetBIOS and WINS (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with NetBIOS/WINS concepts and understand network browsing.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand WINS concepts&lt;br /&gt;
* Understand NetBIOS concepts&lt;br /&gt;
* Understand the role of a local master browser&lt;br /&gt;
* Understand the role of a domain master browser&lt;br /&gt;
* Understand the role of Samba as a WINS server&lt;br /&gt;
* Understand name resolution&lt;br /&gt;
* Configure Samba as a WINS server&lt;br /&gt;
* Configure WINS replication&lt;br /&gt;
* Understand NetBIOS browsing and browser elections&lt;br /&gt;
* Understand NETBIOS name types&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* nmblookup&lt;br /&gt;
* smbclient&lt;br /&gt;
* name resolve order&lt;br /&gt;
* lmhosts&lt;br /&gt;
* wins support, wins server, wins proxy, dns proxy&lt;br /&gt;
* domain master, os level, preferred master&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.2 Active Directory Name Resolution (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with the internal DNS server with Samba4.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and manage DNS for Samba4 as an AD Domain Controller&lt;br /&gt;
* DNS forwarding with the internal DNS server of Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba-tool dns (with subcommands)&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dns forwarder&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
* dig, host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 397: Working with Linux and Windows Clients&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.1 CIFS Integration (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be comfortable working with CIFS in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand SMB/CIFS concepts&lt;br /&gt;
* Access and mount remote CIFS shares from a Linux client&lt;br /&gt;
* Securely storing CIFS credentials&lt;br /&gt;
* Understand features and benefits of CIFS&lt;br /&gt;
* Understand permissions and file ownership of remote CIFS shares&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SMB/CIFS&lt;br /&gt;
* mount, mount.cifs&lt;br /&gt;
* smbclient&lt;br /&gt;
* smbget&lt;br /&gt;
* smbtar&lt;br /&gt;
* smbtree&lt;br /&gt;
* findsmb&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.2 Working with Windows Clients (Peso: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to interact with remote Windows clients, and configure Windows workstations to access file and print services from Linux servers.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of Windows clients&lt;br /&gt;
* Explore browse lists and SMB clients from Windows&lt;br /&gt;
* Share file / print resources from Windows&lt;br /&gt;
* Use of the smbclient program&lt;br /&gt;
* Use of the Windows net utility&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Windows net command&lt;br /&gt;
* smbclient&lt;br /&gt;
* control panel&lt;br /&gt;
* rdesktop&lt;br /&gt;
* workgroup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4303</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4303"/>
		<updated>2017-12-08T01:29:02Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: Configuración de OpenLDAP&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Replicación de OpenLDAP (Pesot: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con la replicación del servidor disponible con OpenLDAP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conceptos de replicación&lt;br /&gt;
* Configurar la replicación de OpenLDAP&lt;br /&gt;
* Analizar archivos de registro de replicación&lt;br /&gt;
* Comprender los centros de réplica&lt;br /&gt;
* Referencias de LDAP&lt;br /&gt;
* Replicación de sincronización LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* servidor maestro / esclavo&lt;br /&gt;
* replicación multi-master&lt;br /&gt;
* consumer&lt;br /&gt;
* hub de réplica&lt;br /&gt;
* modo one-shot&lt;br /&gt;
* referral&lt;br /&gt;
* syncrepl&lt;br /&gt;
* sincronización basada en pull / basado en push&lt;br /&gt;
* refreshOnly and refreshAndPersist&lt;br /&gt;
* replog&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.2  Asegurar el directorio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder configurar el acceso codificado al directorio LDAP y restringir el acceso al nivel del firewall.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Asegurar el directorio con SSL y TLS&lt;br /&gt;
* Consideraciones de firewall&lt;br /&gt;
* Métodos de acceso no autenticado&lt;br /&gt;
* Métodos de autenticación de usuario / contraseña&lt;br /&gt;
* Mantenimiento del usuario SASL DB&lt;br /&gt;
* Certificados de cliente / servidor&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL / TLS&lt;br /&gt;
* Factores de fortaleza de seguridad (SSF)&lt;br /&gt;
* SASL&lt;br /&gt;
* autorización de proxy&lt;br /&gt;
* StartTLS&lt;br /&gt;
* iptables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.3 OpenLDAP Server Performance Tuning (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be capable of measuring the performance of an LDAP server, and tuning configuration directives.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Measure OpenLDAP performance&lt;br /&gt;
* Tune software configuration to increase performance&lt;br /&gt;
* Understand indexes&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* index&lt;br /&gt;
* DB_CONFIG&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 391: OpenLDAP as an Authentication Backend&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.1 LDAP Integration with PAM and NSS (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure PAM and NSS to retrieve information from an LDAP directory.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure PAM to use LDAP for authentication&lt;br /&gt;
* Configure NSS to retrieve information from LDAP&lt;br /&gt;
* Configure PAM modules in various Unix environments&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* PAM&lt;br /&gt;
* NSS&lt;br /&gt;
* /etc/pam.d/&lt;br /&gt;
* /etc/nsswitch.conf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;391.2 Integrating LDAP with Active Directory and Kerberos (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to integrate LDAP with Active Directory Services.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos integration with LDAP&lt;br /&gt;
* Cross platform authentication&lt;br /&gt;
* Single sign-on concepts&lt;br /&gt;
* Integration and compatibility limitations between OpenLDAP and Active Directory&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Kerberos&lt;br /&gt;
* Active Directory&lt;br /&gt;
* single sign-on&lt;br /&gt;
* DNS &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 392: Samba Basics&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.1 Samba Concepts and Architecture (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the essential concepts of Samba.  As well, the major differences between Samba3 and Samba4 should be known.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand the roles of the Samba daemons and components&lt;br /&gt;
* Understand key issues regarding heterogeneous networks&lt;br /&gt;
* Identify key TCP/UDP ports used with SMB/CIFS&lt;br /&gt;
* Knowledge of Samba3 and Samba4 differences&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /etc/services&lt;br /&gt;
* Samba daemons: smbd, nmbd, samba, winbindd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.2 Configure Samba (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure the Samba daemons for a wide variety of purposes.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of Samba server configuration file structure&lt;br /&gt;
* Knowledge of Samba variables and configuration parameters&lt;br /&gt;
* Troubleshoot and debug configuration problems with Samba&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smb.conf parameters&lt;br /&gt;
* smb.conf variables&lt;br /&gt;
* testparm&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.3 Regular Samba Maintenance (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should know about the various tools and utilities that are part of a Samba installation.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Monitor and interact with running Samba daemons&lt;br /&gt;
* Perform regular backups of Samba configuration and state data&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smbcontrol&lt;br /&gt;
* smbstatus&lt;br /&gt;
* tdbbackup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.4 Troubleshooting Samba (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the structure of trivial database files and know how troubleshoot problems.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure Samba logging&lt;br /&gt;
* Backup TDB files&lt;br /&gt;
* Restore TDB files&lt;br /&gt;
* Identify TDB file corruption&lt;br /&gt;
* Edit / list TDB file content&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* /var/log/samba/&lt;br /&gt;
* log level&lt;br /&gt;
* debuglevel&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* pdbedit&lt;br /&gt;
* secrets.tdb&lt;br /&gt;
* tdbbackup&lt;br /&gt;
* tdbdump&lt;br /&gt;
* tdbrestore&lt;br /&gt;
* tdbtool&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;392.5 Internationalization (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to work with internationalization character codes and code pages.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand internationalization character codes and code pages&lt;br /&gt;
* Understand the difference in the name space between Windows and Linux/Unix with respect to share, file and directory names in a non-English environment&lt;br /&gt;
* Understand the difference in the name space between Windows and Linux/Unix with respect to user and group naming in a non-English environment&lt;br /&gt;
* Understand the difference in the name space between Windows and Linux/Unix with respect to computer naming in a non-English environment&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* internationalization&lt;br /&gt;
* character codes&lt;br /&gt;
* code pages&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dos charset, display charset and unix charset&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 393: Samba Share Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.1 File Services (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to create and configure file shares in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create and configure file sharing&lt;br /&gt;
* Plan file service migration&lt;br /&gt;
* Limit access to IPC$&lt;br /&gt;
* Create scripts for user and group handling of file shares&lt;br /&gt;
* Samba share access configuration parameters&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [homes]&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* smbsh&lt;br /&gt;
* browseable, writeable, valid users, write list, read list, read only and guest ok&lt;br /&gt;
* IPC$&lt;br /&gt;
* mount, smbmount&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.2 Linux File System and Share/Service Permissions (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand file permissions on a Linux file system in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of file / directory permission control&lt;br /&gt;
* Understand how Samba interacts with Linux file system permissions and ACLs&lt;br /&gt;
* Use Samba VFS to store Windows ACLs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* chmod, chown&lt;br /&gt;
* create mask, directory mask, force create mode, force directory mode&lt;br /&gt;
* smbcacls&lt;br /&gt;
* getfacl, setfacl&lt;br /&gt;
* vfs_acl_xattr, vfs_acl_tdb and vfs objects&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;393.3 Print Services (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to create and manage print shares in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Create and configure printer sharing&lt;br /&gt;
* Configure integration between Samba and CUPS&lt;br /&gt;
* Manage Windows print drivers and configure downloading of print drivers&lt;br /&gt;
* Configure [print$]&lt;br /&gt;
* Understand security concerns with printer sharing&lt;br /&gt;
* Uploading printer drivers for Point&#039;n&#039;Print driver installation using &#039;Add Print Driver Wizard&#039; in Windows&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* [print$]&lt;br /&gt;
* CUPS&lt;br /&gt;
* cupsd.conf&lt;br /&gt;
* /var/spool/samba/&lt;br /&gt;
* smbspool&lt;br /&gt;
* rpcclient&lt;br /&gt;
* net&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 394: Samba User and Group Management&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.1 Managing User Accounts and Groups (weight: 4)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 4&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to manage user and group accounts in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Manager user and group accounts&lt;br /&gt;
* Understand user and group mapping&lt;br /&gt;
* Knowledge of user account management tools&lt;br /&gt;
* Use of the smbpasswd program&lt;br /&gt;
* Force ownership of file and directory objects&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* pdbedit&lt;br /&gt;
* smb.conf&lt;br /&gt;
* samba-tool user (with subcommands)&lt;br /&gt;
* samba-tool group (with subcommands)&lt;br /&gt;
* smbpasswd&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
* force user, force group&lt;br /&gt;
* idmap&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;394.2 Authentication, Authorization and Winbind (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should understand the various authentication mechanisms and configure access control.  Candidates should be able to install and configure the Winbind service.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Setup a local password database&lt;br /&gt;
* Perform password synchronization&lt;br /&gt;
* Knowledge of different passdb backends&lt;br /&gt;
* Convert between Samba passdb backends&lt;br /&gt;
* Integrate Samba with LDAP&lt;br /&gt;
* Configure Winbind service&lt;br /&gt;
* Configure PAM and NSS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbpasswd, tdbsam, ldapsam&lt;br /&gt;
* passdb backend&lt;br /&gt;
* libnss_winbind&lt;br /&gt;
* libpam_winbind&lt;br /&gt;
* libpam_smbpass&lt;br /&gt;
* wbinfo&lt;br /&gt;
* getent&lt;br /&gt;
* SID and foreign SID&lt;br /&gt;
* /etc/passwd&lt;br /&gt;
* /etc/group&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 395: Samba Domain Integration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.1 Samba as a PDC and BDC (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to setup and maintain primary and backup domain controllers.  Candidates should be able to manage Windows/Linux client access to the NT-Style domains.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and configure domain membership and trust relationships&lt;br /&gt;
* Create and maintain a primary domain controller with Samba3 and Samba4&lt;br /&gt;
* Create and maintain a backup domain controller with Samba3 and Samba4&lt;br /&gt;
* Add computers to an existing domain&lt;br /&gt;
* Configure logon scripts&lt;br /&gt;
* Configure roaming profiles&lt;br /&gt;
* Configure system policies&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* security mode&lt;br /&gt;
* server role&lt;br /&gt;
* domain logons&lt;br /&gt;
* domain master&lt;br /&gt;
* logon script&lt;br /&gt;
* logon path&lt;br /&gt;
* NTConfig.pol&lt;br /&gt;
* net&lt;br /&gt;
* profiles&lt;br /&gt;
* add machine script&lt;br /&gt;
* profile acls&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.2 Samba4 as an AD compatible Domain Controller (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to configure Samba 4 as an AD Domain Controller.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Configure and test Samba 4 as an AD DC&lt;br /&gt;
* Using smbclient to confirm AD operation&lt;br /&gt;
* Understand how Samba integrates with AD services: DNS, Kerberos, NTP, LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* samba-tool domain (with subcommands)&lt;br /&gt;
* samba&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;395.3 Configure Samba as a Domain Member Server (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to integrate Linux servers into an environment where Active Directory is present.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Joining Samba to an existing NT4 domain&lt;br /&gt;
* Joining Samba to an existing AD domain&lt;br /&gt;
* Ability to obtain a TGT from a KDC&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* server role&lt;br /&gt;
* server security&lt;br /&gt;
* net command&lt;br /&gt;
* kinit, TGT and REALM&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 396: Samba Name Services&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.1 NetBIOS and WINS (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with NetBIOS/WINS concepts and understand network browsing.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand WINS concepts&lt;br /&gt;
* Understand NetBIOS concepts&lt;br /&gt;
* Understand the role of a local master browser&lt;br /&gt;
* Understand the role of a domain master browser&lt;br /&gt;
* Understand the role of Samba as a WINS server&lt;br /&gt;
* Understand name resolution&lt;br /&gt;
* Configure Samba as a WINS server&lt;br /&gt;
* Configure WINS replication&lt;br /&gt;
* Understand NetBIOS browsing and browser elections&lt;br /&gt;
* Understand NETBIOS name types&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* smb.conf&lt;br /&gt;
* nmblookup&lt;br /&gt;
* smbclient&lt;br /&gt;
* name resolve order&lt;br /&gt;
* lmhosts&lt;br /&gt;
* wins support, wins server, wins proxy, dns proxy&lt;br /&gt;
* domain master, os level, preferred master&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;396.2 Active Directory Name Resolution (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with the internal DNS server with Samba4.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand and manage DNS for Samba4 as an AD Domain Controller&lt;br /&gt;
* DNS forwarding with the internal DNS server of Samba4&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* samba-tool dns (with subcommands)&lt;br /&gt;
* smb.conf&lt;br /&gt;
* dns forwarder&lt;br /&gt;
* /etc/resolv.conf&lt;br /&gt;
* dig, host&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 397: Working with Linux and Windows Clients&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.1 CIFS Integration (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be comfortable working with CIFS in a mixed environment.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Understand SMB/CIFS concepts&lt;br /&gt;
* Access and mount remote CIFS shares from a Linux client&lt;br /&gt;
* Securely storing CIFS credentials&lt;br /&gt;
* Understand features and benefits of CIFS&lt;br /&gt;
* Understand permissions and file ownership of remote CIFS shares&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SMB/CIFS&lt;br /&gt;
* mount, mount.cifs&lt;br /&gt;
* smbclient&lt;br /&gt;
* smbget&lt;br /&gt;
* smbtar&lt;br /&gt;
* smbtree&lt;br /&gt;
* findsmb&lt;br /&gt;
* smb.conf&lt;br /&gt;
* smbcquotas&lt;br /&gt;
* /etc/fstab&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;397.2 Working with Windows Clients (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be able to interact with remote Windows clients, and configure Windows workstations to access file and print services from Linux servers.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Knowledge of Windows clients&lt;br /&gt;
* Explore browse lists and SMB clients from Windows&lt;br /&gt;
* Share file / print resources from Windows&lt;br /&gt;
* Use of the smbclient program&lt;br /&gt;
* Use of the Windows net utility&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Windows net command&lt;br /&gt;
* smbclient&lt;br /&gt;
* control panel&lt;br /&gt;
* rdesktop&lt;br /&gt;
* workgroup&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4302</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4302"/>
		<updated>2017-12-08T01:28:24Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: Configuración de OpenLDAP&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Replicación de OpenLDAP (Pesot: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con la replicación del servidor disponible con OpenLDAP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conceptos de replicación&lt;br /&gt;
* Configurar la replicación de OpenLDAP&lt;br /&gt;
* Analizar archivos de registro de replicación&lt;br /&gt;
* Comprender los centros de réplica&lt;br /&gt;
* Referencias de LDAP&lt;br /&gt;
* Replicación de sincronización LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* servidor maestro / esclavo&lt;br /&gt;
* replicación multi-master&lt;br /&gt;
* consumer&lt;br /&gt;
* hub de réplica&lt;br /&gt;
* modo one-shot&lt;br /&gt;
* referral&lt;br /&gt;
* syncrepl&lt;br /&gt;
* sincronización basada en pull / basado en push&lt;br /&gt;
* refreshOnly and refreshAndPersist&lt;br /&gt;
* replog&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.2  Asegurar el directorio (Peso: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben poder configurar el acceso codificado al directorio LDAP y restringir el acceso al nivel del firewall.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Asegurar el directorio con SSL y TLS&lt;br /&gt;
* Consideraciones de firewall&lt;br /&gt;
* Métodos de acceso no autenticado&lt;br /&gt;
* Métodos de autenticación de usuario / contraseña&lt;br /&gt;
* Mantenimiento del usuario SASL DB&lt;br /&gt;
* Certificados de cliente / servidor&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* SSL / TLS&lt;br /&gt;
* Factores de fortaleza de seguridad (SSF)&lt;br /&gt;
* SASL&lt;br /&gt;
* autorización de proxy&lt;br /&gt;
* StartTLS&lt;br /&gt;
* iptables&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4301</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4301"/>
		<updated>2017-12-08T01:12:08Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: Configuración de OpenLDAP&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 Replicación de OpenLDAP (Pesot: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Los candidatos deben estar familiarizados con la replicación del servidor disponible con OpenLDAP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Áreas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Conceptos de replicación&lt;br /&gt;
* Configurar la replicación de OpenLDAP&lt;br /&gt;
* Analizar archivos de registro de replicación&lt;br /&gt;
* Comprender los centros de réplica&lt;br /&gt;
* Referencias de LDAP&lt;br /&gt;
* Replicación de sincronización LDAP&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* servidor maestro / esclavo&lt;br /&gt;
* replicación multi-master&lt;br /&gt;
* consumer&lt;br /&gt;
* hub de réplica&lt;br /&gt;
* modo one-shot&lt;br /&gt;
* referral&lt;br /&gt;
* syncrepl&lt;br /&gt;
* sincronización basada en pull / basado en push&lt;br /&gt;
* refreshOnly and refreshAndPersist&lt;br /&gt;
* replog&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4300</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4300"/>
		<updated>2017-12-07T12:29:07Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 390: OpenLDAP Configuration&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;390.1 OpenLDAP Replication (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Candidates should be familiar with the server replication available with OpenLDAP.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Replication concepts&lt;br /&gt;
* Configure OpenLDAP replication&lt;br /&gt;
* Analyze replication log files&lt;br /&gt;
* Understand replica hubs&lt;br /&gt;
* LDAP referrals&lt;br /&gt;
* LDAP sync replication&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* master / slave server&lt;br /&gt;
* multi-master replication&lt;br /&gt;
* consumer&lt;br /&gt;
* replica hub&lt;br /&gt;
* one-shot mode&lt;br /&gt;
* referral&lt;br /&gt;
* syncrepl&lt;br /&gt;
* pull-based / push-based synchronization&lt;br /&gt;
* refreshOnly and refreshAndPersist&lt;br /&gt;
* replog&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4299</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4299"/>
		<updated>2017-12-07T12:28:38Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Addenda==&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Version de lanzamiento (1 de Octubre , 2013)&#039;&#039;===&lt;br /&gt;
&lt;br /&gt;
* Version actual  1.0.0&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Translations of Objectives==&lt;br /&gt;
&lt;br /&gt;
Las siguientes traducciones de los objetivos están disponibles en esta wiki:&lt;br /&gt;
&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1|English]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(FR)|Frances]]&lt;br /&gt;
* [[LPIC-3_300_Objectives_V1(ES)|Español]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objetivos==&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4298</id>
		<title>LPIC-3 300 Objectives V1(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-3_300_Objectives_V1(ES)&amp;diff=4298"/>
		<updated>2017-12-07T12:24:20Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: Created page with &amp;quot;__FORCETOC__ ==Introduction==  Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] aqui.  &amp;lt;br /&amp;gt;  ==Información de versi...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Se puede encontrar una descripción completa del  [[LPIC-3|LPIC-3 programa de certificación ] [[LPIC-3|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Información de versión==&lt;br /&gt;
&lt;br /&gt;
Estos objetivos son la versión 1.0.0.&lt;br /&gt;
&lt;br /&gt;
Se formaron parcialmente a partir del contenido en los exámenes [[LPIC-3_301_Objectives|301]] and [[LPIC-3_302_Objectives|302]].  Este también es un  [[LPIC2AndLPIC3SummaryVersion3To4|resumen e información detallada]] sobre los cambios de esos objetivos a la versión 1 de estos objetivos.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4297</id>
		<title>LPIC-304 Objectives V2(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4297"/>
		<updated>2017-12-06T03:30:15Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
Todo el contenido del programa  [[LPIC-3]] se encuentra disponible  [[LPIC-3|aqui]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
==Version Actual==&lt;br /&gt;
&lt;br /&gt;
La version actual de los objetivos es 2.0.0&lt;br /&gt;
&lt;br /&gt;
También se encuentra [[LPIC304SummaryVersion1To2| el resumen con la información detallada]] de los cambios realizados para las versiones 1.0 a 2.0 con sus correspondientes objetivos.&lt;br /&gt;
&lt;br /&gt;
Los [[LPIC-304 Objectives V1| objetivos 1.x]] pueden ser encontrados   [[LPIC-304 Objectives V1|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traduccion de Objetivos==&lt;br /&gt;
Las siguientes traducciones de los objetivos en las  listas de la wiki:&lt;br /&gt;
* [[LPIC-304 Objectives V2|English]]&lt;br /&gt;
* [[LPIC-304 Objectives V2(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectivos==&lt;br /&gt;
===&#039;&#039;Topic 330: Virtualizacion&#039;&#039;===&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 8&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber y comprender los conceptos generales de teoria y terminologia de la Virtualizacion. Esta incluye Xen, KVM y la terminología de libvirt. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Terminologia&lt;br /&gt;
* Ventajas y Desventajas de la Virtualizacion&lt;br /&gt;
* Diferentes Variaciones de monitores de maquinas Virtuales&lt;br /&gt;
* Migration de Equipos Físicos a Maquinas Virtuales&lt;br /&gt;
* Migraciones de Maquinas Virtuales entre diferentes Equipos &lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Hypervisor&lt;br /&gt;
* Hardware Virtual Machine (HVM)&lt;br /&gt;
* Paravirtualization (PV)&lt;br /&gt;
* Virtualizacio de Contenedores&lt;br /&gt;
* Emulacion y Simulacion&lt;br /&gt;
* CPU flags&lt;br /&gt;
* /proc/cpuinfo&lt;br /&gt;
* Migraciones (P2V, V2V)&lt;br /&gt;
* IaaS, PaaS, SaaS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.2 Xen (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de las instalaciones de Xen. El foco está en Xen versión 4.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento Clave:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura Xen , redes y storage&lt;br /&gt;
* Configuracion Xen &lt;br /&gt;
* Utilidades Xen &lt;br /&gt;
* Solucion de problemas de instalaciones  Xen &lt;br /&gt;
* Conocimiento básico de XAPI&lt;br /&gt;
* Conocimiento de XenStore&lt;br /&gt;
* Conocimiento de los parámetros de inicio de  Xen Boot &lt;br /&gt;
* Conocimiento de la utilidad xm&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Domain0 (Dom0), DomainU (DomU)&lt;br /&gt;
* PV-DomU, HVM-DomU&lt;br /&gt;
* /etc/xen/&lt;br /&gt;
* xl&lt;br /&gt;
* xl.cfg&lt;br /&gt;
* xl.conf&lt;br /&gt;
* xe&lt;br /&gt;
* xentop&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.3 KVM (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de instalaciones KVM..&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura KVM, redes y almacenamiento&lt;br /&gt;
* Configuración de KVM&lt;br /&gt;
* Utilidades de KVM&lt;br /&gt;
* Solución de problemas de instalaciones KVM&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Modules del Kernel: kvm, kvm-intel and kvm-amd&lt;br /&gt;
* /etc/kvm/ &lt;br /&gt;
* /dev/kvm&lt;br /&gt;
* kvm&lt;br /&gt;
* KVM monitor&lt;br /&gt;
* qemu&lt;br /&gt;
* qemu-img&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.4 Otras soluciones de virtualización (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben tener algunos conocimientos básicos y experiencia con alternativas a Xen y KVM.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de  conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento básico de OpenVZ y LXC&lt;br /&gt;
* Conocimiento de otras tecnologías de virtualización&lt;br /&gt;
* Conocimiento básico de las herramientas de aprovisionamiento de virtualización&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenVZ&lt;br /&gt;
* VirtualBox&lt;br /&gt;
* LXC&lt;br /&gt;
* docker&lt;br /&gt;
* packer&lt;br /&gt;
* vagrant&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.5 Libvirt y herramientas relacionadas (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos y experiencia con la biblioteca libvirt y las herramientas comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura libvirt, redes y almacenamiento&lt;br /&gt;
* Conocimiento técnico básico de libvirt y virsh&lt;br /&gt;
* Conocimiento de oVirt&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* libvirtd&lt;br /&gt;
* /etc/libvirt/&lt;br /&gt;
* virsh&lt;br /&gt;
* oVirt&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.6 Herramientas de administración de la nube  (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Pesot&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos sobre las herramientas de gestión de la nube comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento de funciones básicas de OpenStack y CloudStack&lt;br /&gt;
* Conocimiento de Eucalyptus y OpenNebula&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenStack&lt;br /&gt;
* CloudStack&lt;br /&gt;
* Eucalyptus&lt;br /&gt;
* OpenNebula&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 334: Gestión de clústeres de alta disponibilidad&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.1 Conceptos y teoría de Alta Disponibilidad (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben comprender las propiedades y los enfoques de diseño de los clusters de alta disponibilidad.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprender las arquitecturas de clúster más importantes.&lt;br /&gt;
* Comprender los mecanismos de recuperación y reorganización de clústeres.&lt;br /&gt;
* Diseñar una arquitectura de clúster apropiada para un propósito dado.&lt;br /&gt;
* Aspectos de la aplicación de alta disponibilidad.&lt;br /&gt;
* Consideraciones operacionales de alta disponibilidad.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizados:&#039;&#039;&#039;&lt;br /&gt;
* Active/Passive Cluster, Active/Active Cluster&lt;br /&gt;
* Failover Cluster, Load Balanced Cluster&lt;br /&gt;
* Shared-Nothing Cluster, Shared-Disk Cluster&lt;br /&gt;
* Cluster resources&lt;br /&gt;
* Cluster services&lt;br /&gt;
* Quorum&lt;br /&gt;
* Fencing&lt;br /&gt;
* Split brain&lt;br /&gt;
* Redundancy&lt;br /&gt;
* Mean Time Before Failure (MTBF)&lt;br /&gt;
* Mean Time To Repair (MTTR)&lt;br /&gt;
* Service Level Agreement (SLA)&lt;br /&gt;
* Desaster Recovery&lt;br /&gt;
* Replication&lt;br /&gt;
* Session handling&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.2 Clusters de balanceo de carga (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber cómo instalar, configurar, mantener y solucionar problemas de LVS. Esto incluye la configuración y el uso de keepalived y ldirectord. Los candidatos también deben poder instalar, configurar, mantener y solucionar problemas de HAProxy.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprensión de LVS / IPVS.&lt;br /&gt;
* Conocimiento básico de VRRP.&lt;br /&gt;
* Configuración de keepalived.&lt;br /&gt;
* Configuración de ldirectord.&lt;br /&gt;
* Configuración de la red del servidor back-end.&lt;br /&gt;
* Comprensión de HAProxy.&lt;br /&gt;
* Configuración de HAProxy.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas::&#039;&#039;&#039;&lt;br /&gt;
* ipvsadm&lt;br /&gt;
* syncd&lt;br /&gt;
* LVS Forwarding (NAT, Direct Routing, Tunneling, Local Node)&lt;br /&gt;
* connection scheduling algorithms&lt;br /&gt;
* Archivo de configuración keepalived&lt;br /&gt;
* Archivo de configuración ldirectord&lt;br /&gt;
* genhash &lt;br /&gt;
* Archivo de configuración de HAProxy&lt;br /&gt;
* Algoritmos de balanceo de carga &lt;br /&gt;
* ACLs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.3 Clústeres de conmutación por error (Failover) (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener experiencia en la instalación, configuración, mantenimiento y solución de problemas de un clústers Pacemaker. Esto incluye el uso de Corosync. El foco está en Pacemaker 1.1 para Corosync 2.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de  conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura y componentes de Pacemaker (CIB, CRMd, PEngine, LRMd, DC, STONITHd).&lt;br /&gt;
* Configuración del clúster Pacemaker.&lt;br /&gt;
* Reglas y restricciones de recursos (ubicación, orden, colocación).&lt;br /&gt;
* Funciones avanzadas de recursos (plantillas, grupos, recursos de clonación, recursos de múltiples estados).&lt;br /&gt;
* Gestión de Pacemaker usando PC.&lt;br /&gt;
* Gestión de Pacermaker usando crmsh.&lt;br /&gt;
* Configuración y gestión de corosync en conjunto con Pacemaker.&lt;br /&gt;
* Conocimiento de otros motores de clúster (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
* Awareness of other cluster engines (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* pcs&lt;br /&gt;
* crm&lt;br /&gt;
* crm_mon&lt;br /&gt;
* crm_verify&lt;br /&gt;
* crm_simulate&lt;br /&gt;
* crm_shadow&lt;br /&gt;
* crm_resource&lt;br /&gt;
* crm_attribute&lt;br /&gt;
* crm_node&lt;br /&gt;
* crm_standby&lt;br /&gt;
* cibadmin&lt;br /&gt;
* corosync.conf&lt;br /&gt;
* authkey&lt;br /&gt;
* corosync-cfgtool&lt;br /&gt;
* corosync-cmapctl&lt;br /&gt;
* corosync-quorumtool&lt;br /&gt;
* stonith_admin&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.4 Alta disponibilidad en Distribuciones Empresariales de Linux (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben ser conscientes de cómo las distribuciones empresariales de Linux integran las tecnologías de alta disponibilidad.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento básico de los Complementos de alta disponibilidad de Red Hat Enterprise Linux.&lt;br /&gt;
* Conocimiento básico de las extensiónes de alta disponibilidad de SUSE Linux Enterprise.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;:&#039;&#039;&#039;&lt;br /&gt;
* Herramientas de confguracion  especificas para la distribución&lt;br /&gt;
* Integración de motores de clúster, balanceados de carga, tecnología de almacenamiento, sistemas de archivos de clúster, etc.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 335: Almacenamiento en clúster de alta disponibilidad&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.1 DRBD / cLVM (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Se espera que los candidatos tengan la experiencia y el conocimiento para instalar, configurar, mantener y solucionar problemas con los dispositivos DRBD. Esto incluye la integración con Pacemaker. La configuración DRBD de la versión 8.4.x está cubierta. Además, se espera que los candidatos sean capaces de administrar la configuración de LVM dentro de un clúster de almacenamiento compartido.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprensión de los recursos DRBD, estados y modos de replicación.&lt;br /&gt;
* Configuración de recursos de DRBD, redes, discos y dispositivos.&lt;br /&gt;
* Configuración de recuperación automática de DRBD y manejo de errores.&lt;br /&gt;
* Manejo de DRBD usando drbdadm.&lt;br /&gt;
* Conocimiento básico de drbdsetup y drbdmeta.&lt;br /&gt;
* Integración de DRBD con Pacemaker.&lt;br /&gt;
* cLVM&lt;br /&gt;
* Integración de cLVM con Pacemaker.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Protocolos A, B and C&lt;br /&gt;
* Primario, Secundario&lt;br /&gt;
* Replicación de tres vías&lt;br /&gt;
* módulo kernel drbd&lt;br /&gt;
* drbdadm&lt;br /&gt;
* drbdsetup&lt;br /&gt;
* drbdmeta&lt;br /&gt;
* /etc/drbd.conf&lt;br /&gt;
* /proc/drbd&lt;br /&gt;
* LVM2&lt;br /&gt;
* clvmd&lt;br /&gt;
* vgchange, vgs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.2 Sistemas de archivos en clusters (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben saber cómo instalar, mantener y solucionar problemas de instalaciones usando GFS2 y OCFS2. Esto incluye la integración con Pacemaker y el conocimiento de otros sistemas de archivos en cluster disponibles en un entorno Linux.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los principios de los sistemas de archivos de clúster.&lt;br /&gt;
* Crear, mantener y solucionar problemas de los sistemas de archivos GFS2 en un clúster.&lt;br /&gt;
* Crear, mantener y solucionar problemas de los sistemas de archivos OCFS2 en un clúster.&lt;br /&gt;
* Integración de GFS2 y OCFS2 con Pacemaker.&lt;br /&gt;
* Conocimiento de la utilidad de  clúster O2CB.&lt;br /&gt;
* Conocimiento de otros sistemas de archivos en cluster comúnmente utilizados.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Distributed Lock Manager (DLM)&lt;br /&gt;
* mkfs.gfs2&lt;br /&gt;
* mount.gfs2&lt;br /&gt;
* fsck.gfs2&lt;br /&gt;
* gfs2_grow&lt;br /&gt;
* gfs2_edit&lt;br /&gt;
* gfs2_jadd&lt;br /&gt;
* mkfs.ocfs2&lt;br /&gt;
* mount.ocfs2&lt;br /&gt;
* fsck.ocfs2&lt;br /&gt;
* tunefs.ocfs2&lt;br /&gt;
* mounted.ocfs2&lt;br /&gt;
* o2info&lt;br /&gt;
* o2image&lt;br /&gt;
* CephFS&lt;br /&gt;
* GlusterFS&lt;br /&gt;
* AFS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Material de referencial&#039;&#039;===&lt;br /&gt;
&#039;&#039;&#039;Teoría de la virtualización y conceptos&#039;&#039;&#039;&lt;br /&gt;
* Xen: http://www.xen.org/support/documentation.html&lt;br /&gt;
* KVM: http://www.linux-kvm.org/page/Documents&lt;br /&gt;
* QEMU: http://wiki.qemu.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Balanceadores de Carga:&#039;&#039;&#039;&lt;br /&gt;
* LVS: http://www.linuxvirtualserver.org/Documents.html&lt;br /&gt;
* HAProxy: http://haproxy.1wt.eu/#docs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Gestión de clúster:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker: http://clusterlabs.org/wiki/Documentation&lt;br /&gt;
** including: cluster glue, resource agents: http://www.linux-ha.org/wiki/Main_Page&lt;br /&gt;
* Red Hat Cluster Suite: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
** including: OpenAIS/corosync: http://www.corosync.org and http://www.openais.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Almacenamiento en clúster:&#039;&#039;&#039;&lt;br /&gt;
* DRBD: http://www.drbd.org/docs/about/&lt;br /&gt;
* GFS: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
* OCFS2: http://oss.oracle.com/projects/ocfs2/documentation/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Consideraciones para cambio a futuro==&lt;br /&gt;
&lt;br /&gt;
Los cambios a futuros para los objetivo incluirán / pueden incluir:&lt;br /&gt;
&lt;br /&gt;
* Agregar alta disponibilidad de enlaces / red&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4296</id>
		<title>LPIC-304 Objectives V2(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4296"/>
		<updated>2017-12-06T03:27:44Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* 335.2 Clustered File Systems (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
Todo el contenido del programa  [[LPIC-3]] se encuentra disponible  [[LPIC-3|aqui]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
==Version Actual==&lt;br /&gt;
&lt;br /&gt;
La version actual de los objetivos es 2.0.0&lt;br /&gt;
&lt;br /&gt;
También se encuentra [[LPIC304SummaryVersion1To2| el resumen con la información detallada]] de los cambios realizados para las versiones 1.0 a 2.0 con sus correspondientes objetivos.&lt;br /&gt;
&lt;br /&gt;
Los [[LPIC-304 Objectives V1| objetivos 1.x]] pueden ser encontrados   [[LPIC-304 Objectives V1|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traduccion de Objetivos==&lt;br /&gt;
Las siguientes traducciones de los objetivos en las  listas de la wiki:&lt;br /&gt;
* [[LPIC-304 Objectives V2|English]]&lt;br /&gt;
* [[LPIC-304 Objectives V2(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectivos==&lt;br /&gt;
===&#039;&#039;Topic 330: Virtualizacion&#039;&#039;===&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 8&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber y comprender los conceptos generales de teoria y terminologia de la Virtualizacion. Esta incluye Xen, KVM y la terminología de libvirt. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Terminologia&lt;br /&gt;
* Ventajas y Desventajas de la Virtualizacion&lt;br /&gt;
* Diferentes Variaciones de monitores de maquinas Virtuales&lt;br /&gt;
* Migration de Equipos Físicos a Maquinas Virtuales&lt;br /&gt;
* Migraciones de Maquinas Virtuales entre diferentes Equipos &lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Hypervisor&lt;br /&gt;
* Hardware Virtual Machine (HVM)&lt;br /&gt;
* Paravirtualization (PV)&lt;br /&gt;
* Virtualizacio de Contenedores&lt;br /&gt;
* Emulacion y Simulacion&lt;br /&gt;
* CPU flags&lt;br /&gt;
* /proc/cpuinfo&lt;br /&gt;
* Migraciones (P2V, V2V)&lt;br /&gt;
* IaaS, PaaS, SaaS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.2 Xen (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de las instalaciones de Xen. El foco está en Xen versión 4.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento Clave:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura Xen , redes y storage&lt;br /&gt;
* Configuracion Xen &lt;br /&gt;
* Utilidades Xen &lt;br /&gt;
* Solucion de problemas de instalaciones  Xen &lt;br /&gt;
* Conocimiento básico de XAPI&lt;br /&gt;
* Conocimiento de XenStore&lt;br /&gt;
* Conocimiento de los parámetros de inicio de  Xen Boot &lt;br /&gt;
* Conocimiento de la utilidad xm&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Domain0 (Dom0), DomainU (DomU)&lt;br /&gt;
* PV-DomU, HVM-DomU&lt;br /&gt;
* /etc/xen/&lt;br /&gt;
* xl&lt;br /&gt;
* xl.cfg&lt;br /&gt;
* xl.conf&lt;br /&gt;
* xe&lt;br /&gt;
* xentop&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.3 KVM (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de instalaciones KVM..&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura KVM, redes y almacenamiento&lt;br /&gt;
* Configuración de KVM&lt;br /&gt;
* Utilidades de KVM&lt;br /&gt;
* Solución de problemas de instalaciones KVM&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Modules del Kernel: kvm, kvm-intel and kvm-amd&lt;br /&gt;
* /etc/kvm/ &lt;br /&gt;
* /dev/kvm&lt;br /&gt;
* kvm&lt;br /&gt;
* KVM monitor&lt;br /&gt;
* qemu&lt;br /&gt;
* qemu-img&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.4 Otras soluciones de virtualización (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben tener algunos conocimientos básicos y experiencia con alternativas a Xen y KVM.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de  conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento básico de OpenVZ y LXC&lt;br /&gt;
* Conocimiento de otras tecnologías de virtualización&lt;br /&gt;
* Conocimiento básico de las herramientas de aprovisionamiento de virtualización&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenVZ&lt;br /&gt;
* VirtualBox&lt;br /&gt;
* LXC&lt;br /&gt;
* docker&lt;br /&gt;
* packer&lt;br /&gt;
* vagrant&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.5 Libvirt y herramientas relacionadas (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos y experiencia con la biblioteca libvirt y las herramientas comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura libvirt, redes y almacenamiento&lt;br /&gt;
* Conocimiento técnico básico de libvirt y virsh&lt;br /&gt;
* Conocimiento de oVirt&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* libvirtd&lt;br /&gt;
* /etc/libvirt/&lt;br /&gt;
* virsh&lt;br /&gt;
* oVirt&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.6 Herramientas de administración de la nube  (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Pesot&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos sobre las herramientas de gestión de la nube comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento de funciones básicas de OpenStack y CloudStack&lt;br /&gt;
* Conocimiento de Eucalyptus y OpenNebula&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenStack&lt;br /&gt;
* CloudStack&lt;br /&gt;
* Eucalyptus&lt;br /&gt;
* OpenNebula&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 334: Gestión de clústeres de alta disponibilidad&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.1 Conceptos y teoría de Alta Disponibilidad (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben comprender las propiedades y los enfoques de diseño de los clusters de alta disponibilidad.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprender las arquitecturas de clúster más importantes.&lt;br /&gt;
* Comprender los mecanismos de recuperación y reorganización de clústeres.&lt;br /&gt;
* Diseñar una arquitectura de clúster apropiada para un propósito dado.&lt;br /&gt;
* Aspectos de la aplicación de alta disponibilidad.&lt;br /&gt;
* Consideraciones operacionales de alta disponibilidad.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizados:&#039;&#039;&#039;&lt;br /&gt;
* Active/Passive Cluster, Active/Active Cluster&lt;br /&gt;
* Failover Cluster, Load Balanced Cluster&lt;br /&gt;
* Shared-Nothing Cluster, Shared-Disk Cluster&lt;br /&gt;
* Cluster resources&lt;br /&gt;
* Cluster services&lt;br /&gt;
* Quorum&lt;br /&gt;
* Fencing&lt;br /&gt;
* Split brain&lt;br /&gt;
* Redundancy&lt;br /&gt;
* Mean Time Before Failure (MTBF)&lt;br /&gt;
* Mean Time To Repair (MTTR)&lt;br /&gt;
* Service Level Agreement (SLA)&lt;br /&gt;
* Desaster Recovery&lt;br /&gt;
* Replication&lt;br /&gt;
* Session handling&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.2 Clusters de balanceo de carga (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber cómo instalar, configurar, mantener y solucionar problemas de LVS. Esto incluye la configuración y el uso de keepalived y ldirectord. Los candidatos también deben poder instalar, configurar, mantener y solucionar problemas de HAProxy.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprensión de LVS / IPVS.&lt;br /&gt;
* Conocimiento básico de VRRP.&lt;br /&gt;
* Configuración de keepalived.&lt;br /&gt;
* Configuración de ldirectord.&lt;br /&gt;
* Configuración de la red del servidor back-end.&lt;br /&gt;
* Comprensión de HAProxy.&lt;br /&gt;
* Configuración de HAProxy.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas::&#039;&#039;&#039;&lt;br /&gt;
* ipvsadm&lt;br /&gt;
* syncd&lt;br /&gt;
* LVS Forwarding (NAT, Direct Routing, Tunneling, Local Node)&lt;br /&gt;
* connection scheduling algorithms&lt;br /&gt;
* Archivo de configuración keepalived&lt;br /&gt;
* Archivo de configuración ldirectord&lt;br /&gt;
* genhash &lt;br /&gt;
* Archivo de configuración de HAProxy&lt;br /&gt;
* Algoritmos de balanceo de carga &lt;br /&gt;
* ACLs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.3 Clústeres de conmutación por error (Failover) (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener experiencia en la instalación, configuración, mantenimiento y solución de problemas de un clústers Pacemaker. Esto incluye el uso de Corosync. El foco está en Pacemaker 1.1 para Corosync 2.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de  conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura y componentes de Pacemaker (CIB, CRMd, PEngine, LRMd, DC, STONITHd).&lt;br /&gt;
* Configuración del clúster Pacemaker.&lt;br /&gt;
* Reglas y restricciones de recursos (ubicación, orden, colocación).&lt;br /&gt;
* Funciones avanzadas de recursos (plantillas, grupos, recursos de clonación, recursos de múltiples estados).&lt;br /&gt;
* Gestión de Pacemaker usando PC.&lt;br /&gt;
* Gestión de Pacermaker usando crmsh.&lt;br /&gt;
* Configuración y gestión de corosync en conjunto con Pacemaker.&lt;br /&gt;
* Conocimiento de otros motores de clúster (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
* Awareness of other cluster engines (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* pcs&lt;br /&gt;
* crm&lt;br /&gt;
* crm_mon&lt;br /&gt;
* crm_verify&lt;br /&gt;
* crm_simulate&lt;br /&gt;
* crm_shadow&lt;br /&gt;
* crm_resource&lt;br /&gt;
* crm_attribute&lt;br /&gt;
* crm_node&lt;br /&gt;
* crm_standby&lt;br /&gt;
* cibadmin&lt;br /&gt;
* corosync.conf&lt;br /&gt;
* authkey&lt;br /&gt;
* corosync-cfgtool&lt;br /&gt;
* corosync-cmapctl&lt;br /&gt;
* corosync-quorumtool&lt;br /&gt;
* stonith_admin&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.4 Alta disponibilidad en Distribuciones Empresariales de Linux (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben ser conscientes de cómo las distribuciones empresariales de Linux integran las tecnologías de alta disponibilidad.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento básico de los Complementos de alta disponibilidad de Red Hat Enterprise Linux.&lt;br /&gt;
* Conocimiento básico de las extensiónes de alta disponibilidad de SUSE Linux Enterprise.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;:&#039;&#039;&#039;&lt;br /&gt;
* Herramientas de confguracion  especificas para la distribución&lt;br /&gt;
* Integración de motores de clúster, balanceados de carga, tecnología de almacenamiento, sistemas de archivos de clúster, etc.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 335: Almacenamiento en clúster de alta disponibilidad&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.1 DRBD / cLVM (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Se espera que los candidatos tengan la experiencia y el conocimiento para instalar, configurar, mantener y solucionar problemas con los dispositivos DRBD. Esto incluye la integración con Pacemaker. La configuración DRBD de la versión 8.4.x está cubierta. Además, se espera que los candidatos sean capaces de administrar la configuración de LVM dentro de un clúster de almacenamiento compartido.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprensión de los recursos DRBD, estados y modos de replicación.&lt;br /&gt;
* Configuración de recursos de DRBD, redes, discos y dispositivos.&lt;br /&gt;
* Configuración de recuperación automática de DRBD y manejo de errores.&lt;br /&gt;
* Manejo de DRBD usando drbdadm.&lt;br /&gt;
* Conocimiento básico de drbdsetup y drbdmeta.&lt;br /&gt;
* Integración de DRBD con Pacemaker.&lt;br /&gt;
* cLVM&lt;br /&gt;
* Integración de cLVM con Pacemaker.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Protocolos A, B and C&lt;br /&gt;
* Primario, Secundario&lt;br /&gt;
* Replicación de tres vías&lt;br /&gt;
* módulo kernel drbd&lt;br /&gt;
* drbdadm&lt;br /&gt;
* drbdsetup&lt;br /&gt;
* drbdmeta&lt;br /&gt;
* /etc/drbd.conf&lt;br /&gt;
* /proc/drbd&lt;br /&gt;
* LVM2&lt;br /&gt;
* clvmd&lt;br /&gt;
* vgchange, vgs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.2 Sistemas de archivos en clusters (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben saber cómo instalar, mantener y solucionar problemas de instalaciones usando GFS2 y OCFS2. Esto incluye la integración con Pacemaker y el conocimiento de otros sistemas de archivos en cluster disponibles en un entorno Linux.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprender los principios de los sistemas de archivos de clúster.&lt;br /&gt;
* Crear, mantener y solucionar problemas de los sistemas de archivos GFS2 en un clúster.&lt;br /&gt;
* Crear, mantener y solucionar problemas de los sistemas de archivos OCFS2 en un clúster.&lt;br /&gt;
* Integración de GFS2 y OCFS2 con Pacemaker.&lt;br /&gt;
* Conocimiento de la utilidad de  clúster O2CB.&lt;br /&gt;
* Conocimiento de otros sistemas de archivos en cluster comúnmente utilizados.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Distributed Lock Manager (DLM)&lt;br /&gt;
* mkfs.gfs2&lt;br /&gt;
* mount.gfs2&lt;br /&gt;
* fsck.gfs2&lt;br /&gt;
* gfs2_grow&lt;br /&gt;
* gfs2_edit&lt;br /&gt;
* gfs2_jadd&lt;br /&gt;
* mkfs.ocfs2&lt;br /&gt;
* mount.ocfs2&lt;br /&gt;
* fsck.ocfs2&lt;br /&gt;
* tunefs.ocfs2&lt;br /&gt;
* mounted.ocfs2&lt;br /&gt;
* o2info&lt;br /&gt;
* o2image&lt;br /&gt;
* CephFS&lt;br /&gt;
* GlusterFS&lt;br /&gt;
* AFS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Reference Material&#039;&#039;===&lt;br /&gt;
&#039;&#039;&#039;Virtualization Theory and Concepts:&#039;&#039;&#039;&lt;br /&gt;
* Xen: http://www.xen.org/support/documentation.html&lt;br /&gt;
* KVM: http://www.linux-kvm.org/page/Documents&lt;br /&gt;
* QEMU: http://wiki.qemu.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
* LVS: http://www.linuxvirtualserver.org/Documents.html&lt;br /&gt;
* HAProxy: http://haproxy.1wt.eu/#docs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Management:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker: http://clusterlabs.org/wiki/Documentation&lt;br /&gt;
** including: cluster glue, resource agents: http://www.linux-ha.org/wiki/Main_Page&lt;br /&gt;
* Red Hat Cluster Suite: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
** including: OpenAIS/corosync: http://www.corosync.org and http://www.openais.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Storage:&#039;&#039;&#039;&lt;br /&gt;
* DRBD: http://www.drbd.org/docs/about/&lt;br /&gt;
* GFS: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
* OCFS2: http://oss.oracle.com/projects/ocfs2/documentation/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Add Bonding / network high availability&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4295</id>
		<title>LPIC-304 Objectives V2(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4295"/>
		<updated>2017-12-06T03:24:33Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* Topic 335: High Availability Cluster Storage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
Todo el contenido del programa  [[LPIC-3]] se encuentra disponible  [[LPIC-3|aqui]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
==Version Actual==&lt;br /&gt;
&lt;br /&gt;
La version actual de los objetivos es 2.0.0&lt;br /&gt;
&lt;br /&gt;
También se encuentra [[LPIC304SummaryVersion1To2| el resumen con la información detallada]] de los cambios realizados para las versiones 1.0 a 2.0 con sus correspondientes objetivos.&lt;br /&gt;
&lt;br /&gt;
Los [[LPIC-304 Objectives V1| objetivos 1.x]] pueden ser encontrados   [[LPIC-304 Objectives V1|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traduccion de Objetivos==&lt;br /&gt;
Las siguientes traducciones de los objetivos en las  listas de la wiki:&lt;br /&gt;
* [[LPIC-304 Objectives V2|English]]&lt;br /&gt;
* [[LPIC-304 Objectives V2(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectivos==&lt;br /&gt;
===&#039;&#039;Topic 330: Virtualizacion&#039;&#039;===&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 8&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber y comprender los conceptos generales de teoria y terminologia de la Virtualizacion. Esta incluye Xen, KVM y la terminología de libvirt. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Terminologia&lt;br /&gt;
* Ventajas y Desventajas de la Virtualizacion&lt;br /&gt;
* Diferentes Variaciones de monitores de maquinas Virtuales&lt;br /&gt;
* Migration de Equipos Físicos a Maquinas Virtuales&lt;br /&gt;
* Migraciones de Maquinas Virtuales entre diferentes Equipos &lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Hypervisor&lt;br /&gt;
* Hardware Virtual Machine (HVM)&lt;br /&gt;
* Paravirtualization (PV)&lt;br /&gt;
* Virtualizacio de Contenedores&lt;br /&gt;
* Emulacion y Simulacion&lt;br /&gt;
* CPU flags&lt;br /&gt;
* /proc/cpuinfo&lt;br /&gt;
* Migraciones (P2V, V2V)&lt;br /&gt;
* IaaS, PaaS, SaaS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.2 Xen (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de las instalaciones de Xen. El foco está en Xen versión 4.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento Clave:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura Xen , redes y storage&lt;br /&gt;
* Configuracion Xen &lt;br /&gt;
* Utilidades Xen &lt;br /&gt;
* Solucion de problemas de instalaciones  Xen &lt;br /&gt;
* Conocimiento básico de XAPI&lt;br /&gt;
* Conocimiento de XenStore&lt;br /&gt;
* Conocimiento de los parámetros de inicio de  Xen Boot &lt;br /&gt;
* Conocimiento de la utilidad xm&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Domain0 (Dom0), DomainU (DomU)&lt;br /&gt;
* PV-DomU, HVM-DomU&lt;br /&gt;
* /etc/xen/&lt;br /&gt;
* xl&lt;br /&gt;
* xl.cfg&lt;br /&gt;
* xl.conf&lt;br /&gt;
* xe&lt;br /&gt;
* xentop&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.3 KVM (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de instalaciones KVM..&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura KVM, redes y almacenamiento&lt;br /&gt;
* Configuración de KVM&lt;br /&gt;
* Utilidades de KVM&lt;br /&gt;
* Solución de problemas de instalaciones KVM&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Modules del Kernel: kvm, kvm-intel and kvm-amd&lt;br /&gt;
* /etc/kvm/ &lt;br /&gt;
* /dev/kvm&lt;br /&gt;
* kvm&lt;br /&gt;
* KVM monitor&lt;br /&gt;
* qemu&lt;br /&gt;
* qemu-img&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.4 Otras soluciones de virtualización (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben tener algunos conocimientos básicos y experiencia con alternativas a Xen y KVM.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de  conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento básico de OpenVZ y LXC&lt;br /&gt;
* Conocimiento de otras tecnologías de virtualización&lt;br /&gt;
* Conocimiento básico de las herramientas de aprovisionamiento de virtualización&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenVZ&lt;br /&gt;
* VirtualBox&lt;br /&gt;
* LXC&lt;br /&gt;
* docker&lt;br /&gt;
* packer&lt;br /&gt;
* vagrant&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.5 Libvirt y herramientas relacionadas (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos y experiencia con la biblioteca libvirt y las herramientas comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura libvirt, redes y almacenamiento&lt;br /&gt;
* Conocimiento técnico básico de libvirt y virsh&lt;br /&gt;
* Conocimiento de oVirt&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* libvirtd&lt;br /&gt;
* /etc/libvirt/&lt;br /&gt;
* virsh&lt;br /&gt;
* oVirt&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.6 Herramientas de administración de la nube  (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Pesot&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos sobre las herramientas de gestión de la nube comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento de funciones básicas de OpenStack y CloudStack&lt;br /&gt;
* Conocimiento de Eucalyptus y OpenNebula&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenStack&lt;br /&gt;
* CloudStack&lt;br /&gt;
* Eucalyptus&lt;br /&gt;
* OpenNebula&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 334: Gestión de clústeres de alta disponibilidad&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.1 Conceptos y teoría de Alta Disponibilidad (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben comprender las propiedades y los enfoques de diseño de los clusters de alta disponibilidad.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprender las arquitecturas de clúster más importantes.&lt;br /&gt;
* Comprender los mecanismos de recuperación y reorganización de clústeres.&lt;br /&gt;
* Diseñar una arquitectura de clúster apropiada para un propósito dado.&lt;br /&gt;
* Aspectos de la aplicación de alta disponibilidad.&lt;br /&gt;
* Consideraciones operacionales de alta disponibilidad.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizados:&#039;&#039;&#039;&lt;br /&gt;
* Active/Passive Cluster, Active/Active Cluster&lt;br /&gt;
* Failover Cluster, Load Balanced Cluster&lt;br /&gt;
* Shared-Nothing Cluster, Shared-Disk Cluster&lt;br /&gt;
* Cluster resources&lt;br /&gt;
* Cluster services&lt;br /&gt;
* Quorum&lt;br /&gt;
* Fencing&lt;br /&gt;
* Split brain&lt;br /&gt;
* Redundancy&lt;br /&gt;
* Mean Time Before Failure (MTBF)&lt;br /&gt;
* Mean Time To Repair (MTTR)&lt;br /&gt;
* Service Level Agreement (SLA)&lt;br /&gt;
* Desaster Recovery&lt;br /&gt;
* Replication&lt;br /&gt;
* Session handling&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.2 Clusters de balanceo de carga (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber cómo instalar, configurar, mantener y solucionar problemas de LVS. Esto incluye la configuración y el uso de keepalived y ldirectord. Los candidatos también deben poder instalar, configurar, mantener y solucionar problemas de HAProxy.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprensión de LVS / IPVS.&lt;br /&gt;
* Conocimiento básico de VRRP.&lt;br /&gt;
* Configuración de keepalived.&lt;br /&gt;
* Configuración de ldirectord.&lt;br /&gt;
* Configuración de la red del servidor back-end.&lt;br /&gt;
* Comprensión de HAProxy.&lt;br /&gt;
* Configuración de HAProxy.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas::&#039;&#039;&#039;&lt;br /&gt;
* ipvsadm&lt;br /&gt;
* syncd&lt;br /&gt;
* LVS Forwarding (NAT, Direct Routing, Tunneling, Local Node)&lt;br /&gt;
* connection scheduling algorithms&lt;br /&gt;
* Archivo de configuración keepalived&lt;br /&gt;
* Archivo de configuración ldirectord&lt;br /&gt;
* genhash &lt;br /&gt;
* Archivo de configuración de HAProxy&lt;br /&gt;
* Algoritmos de balanceo de carga &lt;br /&gt;
* ACLs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.3 Clústeres de conmutación por error (Failover) (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener experiencia en la instalación, configuración, mantenimiento y solución de problemas de un clústers Pacemaker. Esto incluye el uso de Corosync. El foco está en Pacemaker 1.1 para Corosync 2.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de  conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura y componentes de Pacemaker (CIB, CRMd, PEngine, LRMd, DC, STONITHd).&lt;br /&gt;
* Configuración del clúster Pacemaker.&lt;br /&gt;
* Reglas y restricciones de recursos (ubicación, orden, colocación).&lt;br /&gt;
* Funciones avanzadas de recursos (plantillas, grupos, recursos de clonación, recursos de múltiples estados).&lt;br /&gt;
* Gestión de Pacemaker usando PC.&lt;br /&gt;
* Gestión de Pacermaker usando crmsh.&lt;br /&gt;
* Configuración y gestión de corosync en conjunto con Pacemaker.&lt;br /&gt;
* Conocimiento de otros motores de clúster (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
* Awareness of other cluster engines (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* pcs&lt;br /&gt;
* crm&lt;br /&gt;
* crm_mon&lt;br /&gt;
* crm_verify&lt;br /&gt;
* crm_simulate&lt;br /&gt;
* crm_shadow&lt;br /&gt;
* crm_resource&lt;br /&gt;
* crm_attribute&lt;br /&gt;
* crm_node&lt;br /&gt;
* crm_standby&lt;br /&gt;
* cibadmin&lt;br /&gt;
* corosync.conf&lt;br /&gt;
* authkey&lt;br /&gt;
* corosync-cfgtool&lt;br /&gt;
* corosync-cmapctl&lt;br /&gt;
* corosync-quorumtool&lt;br /&gt;
* stonith_admin&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.4 Alta disponibilidad en Distribuciones Empresariales de Linux (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben ser conscientes de cómo las distribuciones empresariales de Linux integran las tecnologías de alta disponibilidad.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento básico de los Complementos de alta disponibilidad de Red Hat Enterprise Linux.&lt;br /&gt;
* Conocimiento básico de las extensiónes de alta disponibilidad de SUSE Linux Enterprise.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;:&#039;&#039;&#039;&lt;br /&gt;
* Herramientas de confguracion  especificas para la distribución&lt;br /&gt;
* Integración de motores de clúster, balanceados de carga, tecnología de almacenamiento, sistemas de archivos de clúster, etc.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 335: Almacenamiento en clúster de alta disponibilidad&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.1 DRBD / cLVM (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Se espera que los candidatos tengan la experiencia y el conocimiento para instalar, configurar, mantener y solucionar problemas con los dispositivos DRBD. Esto incluye la integración con Pacemaker. La configuración DRBD de la versión 8.4.x está cubierta. Además, se espera que los candidatos sean capaces de administrar la configuración de LVM dentro de un clúster de almacenamiento compartido.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprensión de los recursos DRBD, estados y modos de replicación.&lt;br /&gt;
* Configuración de recursos de DRBD, redes, discos y dispositivos.&lt;br /&gt;
* Configuración de recuperación automática de DRBD y manejo de errores.&lt;br /&gt;
* Manejo de DRBD usando drbdadm.&lt;br /&gt;
* Conocimiento básico de drbdsetup y drbdmeta.&lt;br /&gt;
* Integración de DRBD con Pacemaker.&lt;br /&gt;
* cLVM&lt;br /&gt;
* Integración de cLVM con Pacemaker.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Protocolos A, B and C&lt;br /&gt;
* Primario, Secundario&lt;br /&gt;
* Replicación de tres vías&lt;br /&gt;
* módulo kernel drbd&lt;br /&gt;
* drbdadm&lt;br /&gt;
* drbdsetup&lt;br /&gt;
* drbdmeta&lt;br /&gt;
* /etc/drbd.conf&lt;br /&gt;
* /proc/drbd&lt;br /&gt;
* LVM2&lt;br /&gt;
* clvmd&lt;br /&gt;
* vgchange, vgs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.2 Clustered File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, maintain and troubleshoot installations using GFS2 and OCFS2. This includes integration with Pacemaker as well as awareness of other clustered filesystems available in a Linux environment.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the principles of cluster file systems.&lt;br /&gt;
* Create, maintain and troubleshoot GFS2 file systems in a cluster.&lt;br /&gt;
* Create, maintain and troubleshoot OCFS2 file systems in a cluster.&lt;br /&gt;
* Integration of GFS2 and OCFS2 with Pacemaker.&lt;br /&gt;
* Awareness of the O2CB cluster stack.&lt;br /&gt;
* Awareness of other commonly used clustered file systems.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distributed Lock Manager (DLM)&lt;br /&gt;
* mkfs.gfs2&lt;br /&gt;
* mount.gfs2&lt;br /&gt;
* fsck.gfs2&lt;br /&gt;
* gfs2_grow&lt;br /&gt;
* gfs2_edit&lt;br /&gt;
* gfs2_jadd&lt;br /&gt;
* mkfs.ocfs2&lt;br /&gt;
* mount.ocfs2&lt;br /&gt;
* fsck.ocfs2&lt;br /&gt;
* tunefs.ocfs2&lt;br /&gt;
* mounted.ocfs2&lt;br /&gt;
* o2info&lt;br /&gt;
* o2image&lt;br /&gt;
* CephFS&lt;br /&gt;
* GlusterFS&lt;br /&gt;
* AFS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Reference Material&#039;&#039;===&lt;br /&gt;
&#039;&#039;&#039;Virtualization Theory and Concepts:&#039;&#039;&#039;&lt;br /&gt;
* Xen: http://www.xen.org/support/documentation.html&lt;br /&gt;
* KVM: http://www.linux-kvm.org/page/Documents&lt;br /&gt;
* QEMU: http://wiki.qemu.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
* LVS: http://www.linuxvirtualserver.org/Documents.html&lt;br /&gt;
* HAProxy: http://haproxy.1wt.eu/#docs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Management:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker: http://clusterlabs.org/wiki/Documentation&lt;br /&gt;
** including: cluster glue, resource agents: http://www.linux-ha.org/wiki/Main_Page&lt;br /&gt;
* Red Hat Cluster Suite: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
** including: OpenAIS/corosync: http://www.corosync.org and http://www.openais.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Storage:&#039;&#039;&#039;&lt;br /&gt;
* DRBD: http://www.drbd.org/docs/about/&lt;br /&gt;
* GFS: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
* OCFS2: http://oss.oracle.com/projects/ocfs2/documentation/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Add Bonding / network high availability&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4294</id>
		<title>LPIC-304 Objectives V2(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4294"/>
		<updated>2017-12-06T03:21:29Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* 334.4 High Availability in Enterprise Linux Distributions (weight: 1) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
Todo el contenido del programa  [[LPIC-3]] se encuentra disponible  [[LPIC-3|aqui]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
==Version Actual==&lt;br /&gt;
&lt;br /&gt;
La version actual de los objetivos es 2.0.0&lt;br /&gt;
&lt;br /&gt;
También se encuentra [[LPIC304SummaryVersion1To2| el resumen con la información detallada]] de los cambios realizados para las versiones 1.0 a 2.0 con sus correspondientes objetivos.&lt;br /&gt;
&lt;br /&gt;
Los [[LPIC-304 Objectives V1| objetivos 1.x]] pueden ser encontrados   [[LPIC-304 Objectives V1|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traduccion de Objetivos==&lt;br /&gt;
Las siguientes traducciones de los objetivos en las  listas de la wiki:&lt;br /&gt;
* [[LPIC-304 Objectives V2|English]]&lt;br /&gt;
* [[LPIC-304 Objectives V2(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectivos==&lt;br /&gt;
===&#039;&#039;Topic 330: Virtualizacion&#039;&#039;===&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 8&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber y comprender los conceptos generales de teoria y terminologia de la Virtualizacion. Esta incluye Xen, KVM y la terminología de libvirt. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Terminologia&lt;br /&gt;
* Ventajas y Desventajas de la Virtualizacion&lt;br /&gt;
* Diferentes Variaciones de monitores de maquinas Virtuales&lt;br /&gt;
* Migration de Equipos Físicos a Maquinas Virtuales&lt;br /&gt;
* Migraciones de Maquinas Virtuales entre diferentes Equipos &lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Hypervisor&lt;br /&gt;
* Hardware Virtual Machine (HVM)&lt;br /&gt;
* Paravirtualization (PV)&lt;br /&gt;
* Virtualizacio de Contenedores&lt;br /&gt;
* Emulacion y Simulacion&lt;br /&gt;
* CPU flags&lt;br /&gt;
* /proc/cpuinfo&lt;br /&gt;
* Migraciones (P2V, V2V)&lt;br /&gt;
* IaaS, PaaS, SaaS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.2 Xen (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de las instalaciones de Xen. El foco está en Xen versión 4.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento Clave:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura Xen , redes y storage&lt;br /&gt;
* Configuracion Xen &lt;br /&gt;
* Utilidades Xen &lt;br /&gt;
* Solucion de problemas de instalaciones  Xen &lt;br /&gt;
* Conocimiento básico de XAPI&lt;br /&gt;
* Conocimiento de XenStore&lt;br /&gt;
* Conocimiento de los parámetros de inicio de  Xen Boot &lt;br /&gt;
* Conocimiento de la utilidad xm&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Domain0 (Dom0), DomainU (DomU)&lt;br /&gt;
* PV-DomU, HVM-DomU&lt;br /&gt;
* /etc/xen/&lt;br /&gt;
* xl&lt;br /&gt;
* xl.cfg&lt;br /&gt;
* xl.conf&lt;br /&gt;
* xe&lt;br /&gt;
* xentop&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.3 KVM (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de instalaciones KVM..&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura KVM, redes y almacenamiento&lt;br /&gt;
* Configuración de KVM&lt;br /&gt;
* Utilidades de KVM&lt;br /&gt;
* Solución de problemas de instalaciones KVM&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Modules del Kernel: kvm, kvm-intel and kvm-amd&lt;br /&gt;
* /etc/kvm/ &lt;br /&gt;
* /dev/kvm&lt;br /&gt;
* kvm&lt;br /&gt;
* KVM monitor&lt;br /&gt;
* qemu&lt;br /&gt;
* qemu-img&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.4 Otras soluciones de virtualización (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben tener algunos conocimientos básicos y experiencia con alternativas a Xen y KVM.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de  conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento básico de OpenVZ y LXC&lt;br /&gt;
* Conocimiento de otras tecnologías de virtualización&lt;br /&gt;
* Conocimiento básico de las herramientas de aprovisionamiento de virtualización&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenVZ&lt;br /&gt;
* VirtualBox&lt;br /&gt;
* LXC&lt;br /&gt;
* docker&lt;br /&gt;
* packer&lt;br /&gt;
* vagrant&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.5 Libvirt y herramientas relacionadas (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos y experiencia con la biblioteca libvirt y las herramientas comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura libvirt, redes y almacenamiento&lt;br /&gt;
* Conocimiento técnico básico de libvirt y virsh&lt;br /&gt;
* Conocimiento de oVirt&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* libvirtd&lt;br /&gt;
* /etc/libvirt/&lt;br /&gt;
* virsh&lt;br /&gt;
* oVirt&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.6 Herramientas de administración de la nube  (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Pesot&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos sobre las herramientas de gestión de la nube comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento de funciones básicas de OpenStack y CloudStack&lt;br /&gt;
* Conocimiento de Eucalyptus y OpenNebula&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenStack&lt;br /&gt;
* CloudStack&lt;br /&gt;
* Eucalyptus&lt;br /&gt;
* OpenNebula&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 334: Gestión de clústeres de alta disponibilidad&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.1 Conceptos y teoría de Alta Disponibilidad (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben comprender las propiedades y los enfoques de diseño de los clusters de alta disponibilidad.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprender las arquitecturas de clúster más importantes.&lt;br /&gt;
* Comprender los mecanismos de recuperación y reorganización de clústeres.&lt;br /&gt;
* Diseñar una arquitectura de clúster apropiada para un propósito dado.&lt;br /&gt;
* Aspectos de la aplicación de alta disponibilidad.&lt;br /&gt;
* Consideraciones operacionales de alta disponibilidad.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizados:&#039;&#039;&#039;&lt;br /&gt;
* Active/Passive Cluster, Active/Active Cluster&lt;br /&gt;
* Failover Cluster, Load Balanced Cluster&lt;br /&gt;
* Shared-Nothing Cluster, Shared-Disk Cluster&lt;br /&gt;
* Cluster resources&lt;br /&gt;
* Cluster services&lt;br /&gt;
* Quorum&lt;br /&gt;
* Fencing&lt;br /&gt;
* Split brain&lt;br /&gt;
* Redundancy&lt;br /&gt;
* Mean Time Before Failure (MTBF)&lt;br /&gt;
* Mean Time To Repair (MTTR)&lt;br /&gt;
* Service Level Agreement (SLA)&lt;br /&gt;
* Desaster Recovery&lt;br /&gt;
* Replication&lt;br /&gt;
* Session handling&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.2 Clusters de balanceo de carga (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber cómo instalar, configurar, mantener y solucionar problemas de LVS. Esto incluye la configuración y el uso de keepalived y ldirectord. Los candidatos también deben poder instalar, configurar, mantener y solucionar problemas de HAProxy.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprensión de LVS / IPVS.&lt;br /&gt;
* Conocimiento básico de VRRP.&lt;br /&gt;
* Configuración de keepalived.&lt;br /&gt;
* Configuración de ldirectord.&lt;br /&gt;
* Configuración de la red del servidor back-end.&lt;br /&gt;
* Comprensión de HAProxy.&lt;br /&gt;
* Configuración de HAProxy.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas::&#039;&#039;&#039;&lt;br /&gt;
* ipvsadm&lt;br /&gt;
* syncd&lt;br /&gt;
* LVS Forwarding (NAT, Direct Routing, Tunneling, Local Node)&lt;br /&gt;
* connection scheduling algorithms&lt;br /&gt;
* Archivo de configuración keepalived&lt;br /&gt;
* Archivo de configuración ldirectord&lt;br /&gt;
* genhash &lt;br /&gt;
* Archivo de configuración de HAProxy&lt;br /&gt;
* Algoritmos de balanceo de carga &lt;br /&gt;
* ACLs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.3 Clústeres de conmutación por error (Failover) (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener experiencia en la instalación, configuración, mantenimiento y solución de problemas de un clústers Pacemaker. Esto incluye el uso de Corosync. El foco está en Pacemaker 1.1 para Corosync 2.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de  conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura y componentes de Pacemaker (CIB, CRMd, PEngine, LRMd, DC, STONITHd).&lt;br /&gt;
* Configuración del clúster Pacemaker.&lt;br /&gt;
* Reglas y restricciones de recursos (ubicación, orden, colocación).&lt;br /&gt;
* Funciones avanzadas de recursos (plantillas, grupos, recursos de clonación, recursos de múltiples estados).&lt;br /&gt;
* Gestión de Pacemaker usando PC.&lt;br /&gt;
* Gestión de Pacermaker usando crmsh.&lt;br /&gt;
* Configuración y gestión de corosync en conjunto con Pacemaker.&lt;br /&gt;
* Conocimiento de otros motores de clúster (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
* Awareness of other cluster engines (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* pcs&lt;br /&gt;
* crm&lt;br /&gt;
* crm_mon&lt;br /&gt;
* crm_verify&lt;br /&gt;
* crm_simulate&lt;br /&gt;
* crm_shadow&lt;br /&gt;
* crm_resource&lt;br /&gt;
* crm_attribute&lt;br /&gt;
* crm_node&lt;br /&gt;
* crm_standby&lt;br /&gt;
* cibadmin&lt;br /&gt;
* corosync.conf&lt;br /&gt;
* authkey&lt;br /&gt;
* corosync-cfgtool&lt;br /&gt;
* corosync-cmapctl&lt;br /&gt;
* corosync-quorumtool&lt;br /&gt;
* stonith_admin&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.4 Alta disponibilidad en Distribuciones Empresariales de Linux (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben ser conscientes de cómo las distribuciones empresariales de Linux integran las tecnologías de alta disponibilidad.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento básico de los Complementos de alta disponibilidad de Red Hat Enterprise Linux.&lt;br /&gt;
* Conocimiento básico de las extensiónes de alta disponibilidad de SUSE Linux Enterprise.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;:&#039;&#039;&#039;&lt;br /&gt;
* Herramientas de confguracion  especificas para la distribución&lt;br /&gt;
* Integración de motores de clúster, balanceados de carga, tecnología de almacenamiento, sistemas de archivos de clúster, etc.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 335: High Availability Cluster Storage&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.1 DRBD / cLVM (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are expected to have the experience and knowledge to install, configure, maintain and troubleshoot DRBD devices.  This includes integration with Pacemaker. DRBD configuration of version 8.4.x is covered. Candidates are further expected to be able to manage LVM configuration within a shared storage cluster.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DRBD resources, states and replication modes.&lt;br /&gt;
* Configuration of DRBD resources, networking, disks and devices. &lt;br /&gt;
* Configuration of DRBD automatic recovery and error handling.&lt;br /&gt;
* Management of DRBD using drbdadm.&lt;br /&gt;
* Basic knowledge of drbdsetup and drbdmeta.&lt;br /&gt;
* Integration of DRBD with Pacemaker.&lt;br /&gt;
* cLVM&lt;br /&gt;
* Integration of cLVM with Pacemaker.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Protocol A, B and C&lt;br /&gt;
* Primary, Secondary&lt;br /&gt;
* Three-way replication&lt;br /&gt;
* drbd kernel module&lt;br /&gt;
* drbdadm&lt;br /&gt;
* drbdsetup&lt;br /&gt;
* drbdmeta&lt;br /&gt;
* /etc/drbd.conf&lt;br /&gt;
* /proc/drbd&lt;br /&gt;
* LVM2&lt;br /&gt;
* clvmd&lt;br /&gt;
* vgchange, vgs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.2 Clustered File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, maintain and troubleshoot installations using GFS2 and OCFS2. This includes integration with Pacemaker as well as awareness of other clustered filesystems available in a Linux environment.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the principles of cluster file systems.&lt;br /&gt;
* Create, maintain and troubleshoot GFS2 file systems in a cluster.&lt;br /&gt;
* Create, maintain and troubleshoot OCFS2 file systems in a cluster.&lt;br /&gt;
* Integration of GFS2 and OCFS2 with Pacemaker.&lt;br /&gt;
* Awareness of the O2CB cluster stack.&lt;br /&gt;
* Awareness of other commonly used clustered file systems.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distributed Lock Manager (DLM)&lt;br /&gt;
* mkfs.gfs2&lt;br /&gt;
* mount.gfs2&lt;br /&gt;
* fsck.gfs2&lt;br /&gt;
* gfs2_grow&lt;br /&gt;
* gfs2_edit&lt;br /&gt;
* gfs2_jadd&lt;br /&gt;
* mkfs.ocfs2&lt;br /&gt;
* mount.ocfs2&lt;br /&gt;
* fsck.ocfs2&lt;br /&gt;
* tunefs.ocfs2&lt;br /&gt;
* mounted.ocfs2&lt;br /&gt;
* o2info&lt;br /&gt;
* o2image&lt;br /&gt;
* CephFS&lt;br /&gt;
* GlusterFS&lt;br /&gt;
* AFS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Reference Material&#039;&#039;===&lt;br /&gt;
&#039;&#039;&#039;Virtualization Theory and Concepts:&#039;&#039;&#039;&lt;br /&gt;
* Xen: http://www.xen.org/support/documentation.html&lt;br /&gt;
* KVM: http://www.linux-kvm.org/page/Documents&lt;br /&gt;
* QEMU: http://wiki.qemu.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
* LVS: http://www.linuxvirtualserver.org/Documents.html&lt;br /&gt;
* HAProxy: http://haproxy.1wt.eu/#docs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Management:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker: http://clusterlabs.org/wiki/Documentation&lt;br /&gt;
** including: cluster glue, resource agents: http://www.linux-ha.org/wiki/Main_Page&lt;br /&gt;
* Red Hat Cluster Suite: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
** including: OpenAIS/corosync: http://www.corosync.org and http://www.openais.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Storage:&#039;&#039;&#039;&lt;br /&gt;
* DRBD: http://www.drbd.org/docs/about/&lt;br /&gt;
* GFS: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
* OCFS2: http://oss.oracle.com/projects/ocfs2/documentation/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Add Bonding / network high availability&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4293</id>
		<title>LPIC-304 Objectives V2(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4293"/>
		<updated>2017-12-06T03:17:06Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* 334.3 Failover Clusters (weight: 6) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
Todo el contenido del programa  [[LPIC-3]] se encuentra disponible  [[LPIC-3|aqui]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
==Version Actual==&lt;br /&gt;
&lt;br /&gt;
La version actual de los objetivos es 2.0.0&lt;br /&gt;
&lt;br /&gt;
También se encuentra [[LPIC304SummaryVersion1To2| el resumen con la información detallada]] de los cambios realizados para las versiones 1.0 a 2.0 con sus correspondientes objetivos.&lt;br /&gt;
&lt;br /&gt;
Los [[LPIC-304 Objectives V1| objetivos 1.x]] pueden ser encontrados   [[LPIC-304 Objectives V1|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traduccion de Objetivos==&lt;br /&gt;
Las siguientes traducciones de los objetivos en las  listas de la wiki:&lt;br /&gt;
* [[LPIC-304 Objectives V2|English]]&lt;br /&gt;
* [[LPIC-304 Objectives V2(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectivos==&lt;br /&gt;
===&#039;&#039;Topic 330: Virtualizacion&#039;&#039;===&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 8&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber y comprender los conceptos generales de teoria y terminologia de la Virtualizacion. Esta incluye Xen, KVM y la terminología de libvirt. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Terminologia&lt;br /&gt;
* Ventajas y Desventajas de la Virtualizacion&lt;br /&gt;
* Diferentes Variaciones de monitores de maquinas Virtuales&lt;br /&gt;
* Migration de Equipos Físicos a Maquinas Virtuales&lt;br /&gt;
* Migraciones de Maquinas Virtuales entre diferentes Equipos &lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Hypervisor&lt;br /&gt;
* Hardware Virtual Machine (HVM)&lt;br /&gt;
* Paravirtualization (PV)&lt;br /&gt;
* Virtualizacio de Contenedores&lt;br /&gt;
* Emulacion y Simulacion&lt;br /&gt;
* CPU flags&lt;br /&gt;
* /proc/cpuinfo&lt;br /&gt;
* Migraciones (P2V, V2V)&lt;br /&gt;
* IaaS, PaaS, SaaS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.2 Xen (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de las instalaciones de Xen. El foco está en Xen versión 4.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento Clave:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura Xen , redes y storage&lt;br /&gt;
* Configuracion Xen &lt;br /&gt;
* Utilidades Xen &lt;br /&gt;
* Solucion de problemas de instalaciones  Xen &lt;br /&gt;
* Conocimiento básico de XAPI&lt;br /&gt;
* Conocimiento de XenStore&lt;br /&gt;
* Conocimiento de los parámetros de inicio de  Xen Boot &lt;br /&gt;
* Conocimiento de la utilidad xm&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Domain0 (Dom0), DomainU (DomU)&lt;br /&gt;
* PV-DomU, HVM-DomU&lt;br /&gt;
* /etc/xen/&lt;br /&gt;
* xl&lt;br /&gt;
* xl.cfg&lt;br /&gt;
* xl.conf&lt;br /&gt;
* xe&lt;br /&gt;
* xentop&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.3 KVM (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de instalaciones KVM..&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura KVM, redes y almacenamiento&lt;br /&gt;
* Configuración de KVM&lt;br /&gt;
* Utilidades de KVM&lt;br /&gt;
* Solución de problemas de instalaciones KVM&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Modules del Kernel: kvm, kvm-intel and kvm-amd&lt;br /&gt;
* /etc/kvm/ &lt;br /&gt;
* /dev/kvm&lt;br /&gt;
* kvm&lt;br /&gt;
* KVM monitor&lt;br /&gt;
* qemu&lt;br /&gt;
* qemu-img&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.4 Otras soluciones de virtualización (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben tener algunos conocimientos básicos y experiencia con alternativas a Xen y KVM.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de  conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento básico de OpenVZ y LXC&lt;br /&gt;
* Conocimiento de otras tecnologías de virtualización&lt;br /&gt;
* Conocimiento básico de las herramientas de aprovisionamiento de virtualización&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenVZ&lt;br /&gt;
* VirtualBox&lt;br /&gt;
* LXC&lt;br /&gt;
* docker&lt;br /&gt;
* packer&lt;br /&gt;
* vagrant&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.5 Libvirt y herramientas relacionadas (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos y experiencia con la biblioteca libvirt y las herramientas comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura libvirt, redes y almacenamiento&lt;br /&gt;
* Conocimiento técnico básico de libvirt y virsh&lt;br /&gt;
* Conocimiento de oVirt&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* libvirtd&lt;br /&gt;
* /etc/libvirt/&lt;br /&gt;
* virsh&lt;br /&gt;
* oVirt&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.6 Herramientas de administración de la nube  (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Pesot&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos sobre las herramientas de gestión de la nube comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento de funciones básicas de OpenStack y CloudStack&lt;br /&gt;
* Conocimiento de Eucalyptus y OpenNebula&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenStack&lt;br /&gt;
* CloudStack&lt;br /&gt;
* Eucalyptus&lt;br /&gt;
* OpenNebula&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 334: Gestión de clústeres de alta disponibilidad&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.1 Conceptos y teoría de Alta Disponibilidad (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben comprender las propiedades y los enfoques de diseño de los clusters de alta disponibilidad.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprender las arquitecturas de clúster más importantes.&lt;br /&gt;
* Comprender los mecanismos de recuperación y reorganización de clústeres.&lt;br /&gt;
* Diseñar una arquitectura de clúster apropiada para un propósito dado.&lt;br /&gt;
* Aspectos de la aplicación de alta disponibilidad.&lt;br /&gt;
* Consideraciones operacionales de alta disponibilidad.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizados:&#039;&#039;&#039;&lt;br /&gt;
* Active/Passive Cluster, Active/Active Cluster&lt;br /&gt;
* Failover Cluster, Load Balanced Cluster&lt;br /&gt;
* Shared-Nothing Cluster, Shared-Disk Cluster&lt;br /&gt;
* Cluster resources&lt;br /&gt;
* Cluster services&lt;br /&gt;
* Quorum&lt;br /&gt;
* Fencing&lt;br /&gt;
* Split brain&lt;br /&gt;
* Redundancy&lt;br /&gt;
* Mean Time Before Failure (MTBF)&lt;br /&gt;
* Mean Time To Repair (MTTR)&lt;br /&gt;
* Service Level Agreement (SLA)&lt;br /&gt;
* Desaster Recovery&lt;br /&gt;
* Replication&lt;br /&gt;
* Session handling&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.2 Clusters de balanceo de carga (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber cómo instalar, configurar, mantener y solucionar problemas de LVS. Esto incluye la configuración y el uso de keepalived y ldirectord. Los candidatos también deben poder instalar, configurar, mantener y solucionar problemas de HAProxy.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprensión de LVS / IPVS.&lt;br /&gt;
* Conocimiento básico de VRRP.&lt;br /&gt;
* Configuración de keepalived.&lt;br /&gt;
* Configuración de ldirectord.&lt;br /&gt;
* Configuración de la red del servidor back-end.&lt;br /&gt;
* Comprensión de HAProxy.&lt;br /&gt;
* Configuración de HAProxy.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas::&#039;&#039;&#039;&lt;br /&gt;
* ipvsadm&lt;br /&gt;
* syncd&lt;br /&gt;
* LVS Forwarding (NAT, Direct Routing, Tunneling, Local Node)&lt;br /&gt;
* connection scheduling algorithms&lt;br /&gt;
* Archivo de configuración keepalived&lt;br /&gt;
* Archivo de configuración ldirectord&lt;br /&gt;
* genhash &lt;br /&gt;
* Archivo de configuración de HAProxy&lt;br /&gt;
* Algoritmos de balanceo de carga &lt;br /&gt;
* ACLs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.3 Clústeres de conmutación por error (Failover) (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener experiencia en la instalación, configuración, mantenimiento y solución de problemas de un clústers Pacemaker. Esto incluye el uso de Corosync. El foco está en Pacemaker 1.1 para Corosync 2.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de  conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura y componentes de Pacemaker (CIB, CRMd, PEngine, LRMd, DC, STONITHd).&lt;br /&gt;
* Configuración del clúster Pacemaker.&lt;br /&gt;
* Reglas y restricciones de recursos (ubicación, orden, colocación).&lt;br /&gt;
* Funciones avanzadas de recursos (plantillas, grupos, recursos de clonación, recursos de múltiples estados).&lt;br /&gt;
* Gestión de Pacemaker usando PC.&lt;br /&gt;
* Gestión de Pacermaker usando crmsh.&lt;br /&gt;
* Configuración y gestión de corosync en conjunto con Pacemaker.&lt;br /&gt;
* Conocimiento de otros motores de clúster (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
* Awareness of other cluster engines (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* pcs&lt;br /&gt;
* crm&lt;br /&gt;
* crm_mon&lt;br /&gt;
* crm_verify&lt;br /&gt;
* crm_simulate&lt;br /&gt;
* crm_shadow&lt;br /&gt;
* crm_resource&lt;br /&gt;
* crm_attribute&lt;br /&gt;
* crm_node&lt;br /&gt;
* crm_standby&lt;br /&gt;
* cibadmin&lt;br /&gt;
* corosync.conf&lt;br /&gt;
* authkey&lt;br /&gt;
* corosync-cfgtool&lt;br /&gt;
* corosync-cmapctl&lt;br /&gt;
* corosync-quorumtool&lt;br /&gt;
* stonith_admin&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.4 High Availability in Enterprise Linux Distributions (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of how enterprise Linux distributions integrate High Availability technologies.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Basic knowledge of Red Hat Enterprise Linux High Availability Add-On.&lt;br /&gt;
* Basic knowledge of SUSE Linux Enterprise High Availability Extension.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distribution specific configuration tools&lt;br /&gt;
* Integration of cluster engines, load balancers, storage technology, cluster filesystems, etc.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 335: High Availability Cluster Storage&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.1 DRBD / cLVM (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are expected to have the experience and knowledge to install, configure, maintain and troubleshoot DRBD devices.  This includes integration with Pacemaker. DRBD configuration of version 8.4.x is covered. Candidates are further expected to be able to manage LVM configuration within a shared storage cluster.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DRBD resources, states and replication modes.&lt;br /&gt;
* Configuration of DRBD resources, networking, disks and devices. &lt;br /&gt;
* Configuration of DRBD automatic recovery and error handling.&lt;br /&gt;
* Management of DRBD using drbdadm.&lt;br /&gt;
* Basic knowledge of drbdsetup and drbdmeta.&lt;br /&gt;
* Integration of DRBD with Pacemaker.&lt;br /&gt;
* cLVM&lt;br /&gt;
* Integration of cLVM with Pacemaker.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Protocol A, B and C&lt;br /&gt;
* Primary, Secondary&lt;br /&gt;
* Three-way replication&lt;br /&gt;
* drbd kernel module&lt;br /&gt;
* drbdadm&lt;br /&gt;
* drbdsetup&lt;br /&gt;
* drbdmeta&lt;br /&gt;
* /etc/drbd.conf&lt;br /&gt;
* /proc/drbd&lt;br /&gt;
* LVM2&lt;br /&gt;
* clvmd&lt;br /&gt;
* vgchange, vgs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.2 Clustered File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, maintain and troubleshoot installations using GFS2 and OCFS2. This includes integration with Pacemaker as well as awareness of other clustered filesystems available in a Linux environment.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the principles of cluster file systems.&lt;br /&gt;
* Create, maintain and troubleshoot GFS2 file systems in a cluster.&lt;br /&gt;
* Create, maintain and troubleshoot OCFS2 file systems in a cluster.&lt;br /&gt;
* Integration of GFS2 and OCFS2 with Pacemaker.&lt;br /&gt;
* Awareness of the O2CB cluster stack.&lt;br /&gt;
* Awareness of other commonly used clustered file systems.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distributed Lock Manager (DLM)&lt;br /&gt;
* mkfs.gfs2&lt;br /&gt;
* mount.gfs2&lt;br /&gt;
* fsck.gfs2&lt;br /&gt;
* gfs2_grow&lt;br /&gt;
* gfs2_edit&lt;br /&gt;
* gfs2_jadd&lt;br /&gt;
* mkfs.ocfs2&lt;br /&gt;
* mount.ocfs2&lt;br /&gt;
* fsck.ocfs2&lt;br /&gt;
* tunefs.ocfs2&lt;br /&gt;
* mounted.ocfs2&lt;br /&gt;
* o2info&lt;br /&gt;
* o2image&lt;br /&gt;
* CephFS&lt;br /&gt;
* GlusterFS&lt;br /&gt;
* AFS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Reference Material&#039;&#039;===&lt;br /&gt;
&#039;&#039;&#039;Virtualization Theory and Concepts:&#039;&#039;&#039;&lt;br /&gt;
* Xen: http://www.xen.org/support/documentation.html&lt;br /&gt;
* KVM: http://www.linux-kvm.org/page/Documents&lt;br /&gt;
* QEMU: http://wiki.qemu.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
* LVS: http://www.linuxvirtualserver.org/Documents.html&lt;br /&gt;
* HAProxy: http://haproxy.1wt.eu/#docs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Management:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker: http://clusterlabs.org/wiki/Documentation&lt;br /&gt;
** including: cluster glue, resource agents: http://www.linux-ha.org/wiki/Main_Page&lt;br /&gt;
* Red Hat Cluster Suite: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
** including: OpenAIS/corosync: http://www.corosync.org and http://www.openais.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Storage:&#039;&#039;&#039;&lt;br /&gt;
* DRBD: http://www.drbd.org/docs/about/&lt;br /&gt;
* GFS: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
* OCFS2: http://oss.oracle.com/projects/ocfs2/documentation/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Add Bonding / network high availability&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4292</id>
		<title>LPIC-304 Objectives V2(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4292"/>
		<updated>2017-12-06T03:13:06Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* 334.2 Load Balanced Clusters (weight: 6) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
Todo el contenido del programa  [[LPIC-3]] se encuentra disponible  [[LPIC-3|aqui]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
==Version Actual==&lt;br /&gt;
&lt;br /&gt;
La version actual de los objetivos es 2.0.0&lt;br /&gt;
&lt;br /&gt;
También se encuentra [[LPIC304SummaryVersion1To2| el resumen con la información detallada]] de los cambios realizados para las versiones 1.0 a 2.0 con sus correspondientes objetivos.&lt;br /&gt;
&lt;br /&gt;
Los [[LPIC-304 Objectives V1| objetivos 1.x]] pueden ser encontrados   [[LPIC-304 Objectives V1|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traduccion de Objetivos==&lt;br /&gt;
Las siguientes traducciones de los objetivos en las  listas de la wiki:&lt;br /&gt;
* [[LPIC-304 Objectives V2|English]]&lt;br /&gt;
* [[LPIC-304 Objectives V2(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectivos==&lt;br /&gt;
===&#039;&#039;Topic 330: Virtualizacion&#039;&#039;===&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 8&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber y comprender los conceptos generales de teoria y terminologia de la Virtualizacion. Esta incluye Xen, KVM y la terminología de libvirt. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Terminologia&lt;br /&gt;
* Ventajas y Desventajas de la Virtualizacion&lt;br /&gt;
* Diferentes Variaciones de monitores de maquinas Virtuales&lt;br /&gt;
* Migration de Equipos Físicos a Maquinas Virtuales&lt;br /&gt;
* Migraciones de Maquinas Virtuales entre diferentes Equipos &lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Hypervisor&lt;br /&gt;
* Hardware Virtual Machine (HVM)&lt;br /&gt;
* Paravirtualization (PV)&lt;br /&gt;
* Virtualizacio de Contenedores&lt;br /&gt;
* Emulacion y Simulacion&lt;br /&gt;
* CPU flags&lt;br /&gt;
* /proc/cpuinfo&lt;br /&gt;
* Migraciones (P2V, V2V)&lt;br /&gt;
* IaaS, PaaS, SaaS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.2 Xen (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de las instalaciones de Xen. El foco está en Xen versión 4.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento Clave:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura Xen , redes y storage&lt;br /&gt;
* Configuracion Xen &lt;br /&gt;
* Utilidades Xen &lt;br /&gt;
* Solucion de problemas de instalaciones  Xen &lt;br /&gt;
* Conocimiento básico de XAPI&lt;br /&gt;
* Conocimiento de XenStore&lt;br /&gt;
* Conocimiento de los parámetros de inicio de  Xen Boot &lt;br /&gt;
* Conocimiento de la utilidad xm&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Domain0 (Dom0), DomainU (DomU)&lt;br /&gt;
* PV-DomU, HVM-DomU&lt;br /&gt;
* /etc/xen/&lt;br /&gt;
* xl&lt;br /&gt;
* xl.cfg&lt;br /&gt;
* xl.conf&lt;br /&gt;
* xe&lt;br /&gt;
* xentop&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.3 KVM (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de instalaciones KVM..&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura KVM, redes y almacenamiento&lt;br /&gt;
* Configuración de KVM&lt;br /&gt;
* Utilidades de KVM&lt;br /&gt;
* Solución de problemas de instalaciones KVM&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Modules del Kernel: kvm, kvm-intel and kvm-amd&lt;br /&gt;
* /etc/kvm/ &lt;br /&gt;
* /dev/kvm&lt;br /&gt;
* kvm&lt;br /&gt;
* KVM monitor&lt;br /&gt;
* qemu&lt;br /&gt;
* qemu-img&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.4 Otras soluciones de virtualización (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben tener algunos conocimientos básicos y experiencia con alternativas a Xen y KVM.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de  conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento básico de OpenVZ y LXC&lt;br /&gt;
* Conocimiento de otras tecnologías de virtualización&lt;br /&gt;
* Conocimiento básico de las herramientas de aprovisionamiento de virtualización&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenVZ&lt;br /&gt;
* VirtualBox&lt;br /&gt;
* LXC&lt;br /&gt;
* docker&lt;br /&gt;
* packer&lt;br /&gt;
* vagrant&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.5 Libvirt y herramientas relacionadas (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos y experiencia con la biblioteca libvirt y las herramientas comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura libvirt, redes y almacenamiento&lt;br /&gt;
* Conocimiento técnico básico de libvirt y virsh&lt;br /&gt;
* Conocimiento de oVirt&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* libvirtd&lt;br /&gt;
* /etc/libvirt/&lt;br /&gt;
* virsh&lt;br /&gt;
* oVirt&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.6 Herramientas de administración de la nube  (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Pesot&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos sobre las herramientas de gestión de la nube comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento de funciones básicas de OpenStack y CloudStack&lt;br /&gt;
* Conocimiento de Eucalyptus y OpenNebula&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenStack&lt;br /&gt;
* CloudStack&lt;br /&gt;
* Eucalyptus&lt;br /&gt;
* OpenNebula&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 334: Gestión de clústeres de alta disponibilidad&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.1 Conceptos y teoría de Alta Disponibilidad (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben comprender las propiedades y los enfoques de diseño de los clusters de alta disponibilidad.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprender las arquitecturas de clúster más importantes.&lt;br /&gt;
* Comprender los mecanismos de recuperación y reorganización de clústeres.&lt;br /&gt;
* Diseñar una arquitectura de clúster apropiada para un propósito dado.&lt;br /&gt;
* Aspectos de la aplicación de alta disponibilidad.&lt;br /&gt;
* Consideraciones operacionales de alta disponibilidad.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizados:&#039;&#039;&#039;&lt;br /&gt;
* Active/Passive Cluster, Active/Active Cluster&lt;br /&gt;
* Failover Cluster, Load Balanced Cluster&lt;br /&gt;
* Shared-Nothing Cluster, Shared-Disk Cluster&lt;br /&gt;
* Cluster resources&lt;br /&gt;
* Cluster services&lt;br /&gt;
* Quorum&lt;br /&gt;
* Fencing&lt;br /&gt;
* Split brain&lt;br /&gt;
* Redundancy&lt;br /&gt;
* Mean Time Before Failure (MTBF)&lt;br /&gt;
* Mean Time To Repair (MTTR)&lt;br /&gt;
* Service Level Agreement (SLA)&lt;br /&gt;
* Desaster Recovery&lt;br /&gt;
* Replication&lt;br /&gt;
* Session handling&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.2 Clusters de balanceo de carga (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber cómo instalar, configurar, mantener y solucionar problemas de LVS. Esto incluye la configuración y el uso de keepalived y ldirectord. Los candidatos también deben poder instalar, configurar, mantener y solucionar problemas de HAProxy.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprensión de LVS / IPVS.&lt;br /&gt;
* Conocimiento básico de VRRP.&lt;br /&gt;
* Configuración de keepalived.&lt;br /&gt;
* Configuración de ldirectord.&lt;br /&gt;
* Configuración de la red del servidor back-end.&lt;br /&gt;
* Comprensión de HAProxy.&lt;br /&gt;
* Configuración de HAProxy.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas::&#039;&#039;&#039;&lt;br /&gt;
* ipvsadm&lt;br /&gt;
* syncd&lt;br /&gt;
* LVS Forwarding (NAT, Direct Routing, Tunneling, Local Node)&lt;br /&gt;
* connection scheduling algorithms&lt;br /&gt;
* Archivo de configuración keepalived&lt;br /&gt;
* Archivo de configuración ldirectord&lt;br /&gt;
* genhash &lt;br /&gt;
* Archivo de configuración de HAProxy&lt;br /&gt;
* Algoritmos de balanceo de carga &lt;br /&gt;
* ACLs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.3 Failover Clusters (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience in the installation, configuration, maintenance and troubleshooting of a Pacemaker cluster. This includes the use of Corosync. The focus is on Pacemaker 1.1 for Corosync 2.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd).&lt;br /&gt;
* Pacemaker cluster configuration.&lt;br /&gt;
* Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios).&lt;br /&gt;
* Resource rules and constraints (location, order, colocation).&lt;br /&gt;
* Advanced resource features (templates, groups, clone resources, multi-state resources).&lt;br /&gt;
* Pacemaker management using pcs.&lt;br /&gt;
* Pacemaker management using crmsh.&lt;br /&gt;
* Configuration and Management of corosync in conjunction with Pacemaker.&lt;br /&gt;
* Awareness of other cluster engines (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* pcs&lt;br /&gt;
* crm&lt;br /&gt;
* crm_mon&lt;br /&gt;
* crm_verify&lt;br /&gt;
* crm_simulate&lt;br /&gt;
* crm_shadow&lt;br /&gt;
* crm_resource&lt;br /&gt;
* crm_attribute&lt;br /&gt;
* crm_node&lt;br /&gt;
* crm_standby&lt;br /&gt;
* cibadmin&lt;br /&gt;
* corosync.conf&lt;br /&gt;
* authkey&lt;br /&gt;
* corosync-cfgtool&lt;br /&gt;
* corosync-cmapctl&lt;br /&gt;
* corosync-quorumtool&lt;br /&gt;
* stonith_admin&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.4 High Availability in Enterprise Linux Distributions (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of how enterprise Linux distributions integrate High Availability technologies.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Basic knowledge of Red Hat Enterprise Linux High Availability Add-On.&lt;br /&gt;
* Basic knowledge of SUSE Linux Enterprise High Availability Extension.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distribution specific configuration tools&lt;br /&gt;
* Integration of cluster engines, load balancers, storage technology, cluster filesystems, etc.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 335: High Availability Cluster Storage&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.1 DRBD / cLVM (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are expected to have the experience and knowledge to install, configure, maintain and troubleshoot DRBD devices.  This includes integration with Pacemaker. DRBD configuration of version 8.4.x is covered. Candidates are further expected to be able to manage LVM configuration within a shared storage cluster.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DRBD resources, states and replication modes.&lt;br /&gt;
* Configuration of DRBD resources, networking, disks and devices. &lt;br /&gt;
* Configuration of DRBD automatic recovery and error handling.&lt;br /&gt;
* Management of DRBD using drbdadm.&lt;br /&gt;
* Basic knowledge of drbdsetup and drbdmeta.&lt;br /&gt;
* Integration of DRBD with Pacemaker.&lt;br /&gt;
* cLVM&lt;br /&gt;
* Integration of cLVM with Pacemaker.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Protocol A, B and C&lt;br /&gt;
* Primary, Secondary&lt;br /&gt;
* Three-way replication&lt;br /&gt;
* drbd kernel module&lt;br /&gt;
* drbdadm&lt;br /&gt;
* drbdsetup&lt;br /&gt;
* drbdmeta&lt;br /&gt;
* /etc/drbd.conf&lt;br /&gt;
* /proc/drbd&lt;br /&gt;
* LVM2&lt;br /&gt;
* clvmd&lt;br /&gt;
* vgchange, vgs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.2 Clustered File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, maintain and troubleshoot installations using GFS2 and OCFS2. This includes integration with Pacemaker as well as awareness of other clustered filesystems available in a Linux environment.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the principles of cluster file systems.&lt;br /&gt;
* Create, maintain and troubleshoot GFS2 file systems in a cluster.&lt;br /&gt;
* Create, maintain and troubleshoot OCFS2 file systems in a cluster.&lt;br /&gt;
* Integration of GFS2 and OCFS2 with Pacemaker.&lt;br /&gt;
* Awareness of the O2CB cluster stack.&lt;br /&gt;
* Awareness of other commonly used clustered file systems.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distributed Lock Manager (DLM)&lt;br /&gt;
* mkfs.gfs2&lt;br /&gt;
* mount.gfs2&lt;br /&gt;
* fsck.gfs2&lt;br /&gt;
* gfs2_grow&lt;br /&gt;
* gfs2_edit&lt;br /&gt;
* gfs2_jadd&lt;br /&gt;
* mkfs.ocfs2&lt;br /&gt;
* mount.ocfs2&lt;br /&gt;
* fsck.ocfs2&lt;br /&gt;
* tunefs.ocfs2&lt;br /&gt;
* mounted.ocfs2&lt;br /&gt;
* o2info&lt;br /&gt;
* o2image&lt;br /&gt;
* CephFS&lt;br /&gt;
* GlusterFS&lt;br /&gt;
* AFS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Reference Material&#039;&#039;===&lt;br /&gt;
&#039;&#039;&#039;Virtualization Theory and Concepts:&#039;&#039;&#039;&lt;br /&gt;
* Xen: http://www.xen.org/support/documentation.html&lt;br /&gt;
* KVM: http://www.linux-kvm.org/page/Documents&lt;br /&gt;
* QEMU: http://wiki.qemu.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
* LVS: http://www.linuxvirtualserver.org/Documents.html&lt;br /&gt;
* HAProxy: http://haproxy.1wt.eu/#docs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Management:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker: http://clusterlabs.org/wiki/Documentation&lt;br /&gt;
** including: cluster glue, resource agents: http://www.linux-ha.org/wiki/Main_Page&lt;br /&gt;
* Red Hat Cluster Suite: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
** including: OpenAIS/corosync: http://www.corosync.org and http://www.openais.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Storage:&#039;&#039;&#039;&lt;br /&gt;
* DRBD: http://www.drbd.org/docs/about/&lt;br /&gt;
* GFS: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
* OCFS2: http://oss.oracle.com/projects/ocfs2/documentation/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Add Bonding / network high availability&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4291</id>
		<title>LPIC-304 Objectives V2(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4291"/>
		<updated>2017-12-06T03:09:07Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* Topic 334: High Availability Cluster Management */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
Todo el contenido del programa  [[LPIC-3]] se encuentra disponible  [[LPIC-3|aqui]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
==Version Actual==&lt;br /&gt;
&lt;br /&gt;
La version actual de los objetivos es 2.0.0&lt;br /&gt;
&lt;br /&gt;
También se encuentra [[LPIC304SummaryVersion1To2| el resumen con la información detallada]] de los cambios realizados para las versiones 1.0 a 2.0 con sus correspondientes objetivos.&lt;br /&gt;
&lt;br /&gt;
Los [[LPIC-304 Objectives V1| objetivos 1.x]] pueden ser encontrados   [[LPIC-304 Objectives V1|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traduccion de Objetivos==&lt;br /&gt;
Las siguientes traducciones de los objetivos en las  listas de la wiki:&lt;br /&gt;
* [[LPIC-304 Objectives V2|English]]&lt;br /&gt;
* [[LPIC-304 Objectives V2(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectivos==&lt;br /&gt;
===&#039;&#039;Topic 330: Virtualizacion&#039;&#039;===&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 8&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber y comprender los conceptos generales de teoria y terminologia de la Virtualizacion. Esta incluye Xen, KVM y la terminología de libvirt. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Terminologia&lt;br /&gt;
* Ventajas y Desventajas de la Virtualizacion&lt;br /&gt;
* Diferentes Variaciones de monitores de maquinas Virtuales&lt;br /&gt;
* Migration de Equipos Físicos a Maquinas Virtuales&lt;br /&gt;
* Migraciones de Maquinas Virtuales entre diferentes Equipos &lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Hypervisor&lt;br /&gt;
* Hardware Virtual Machine (HVM)&lt;br /&gt;
* Paravirtualization (PV)&lt;br /&gt;
* Virtualizacio de Contenedores&lt;br /&gt;
* Emulacion y Simulacion&lt;br /&gt;
* CPU flags&lt;br /&gt;
* /proc/cpuinfo&lt;br /&gt;
* Migraciones (P2V, V2V)&lt;br /&gt;
* IaaS, PaaS, SaaS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.2 Xen (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de las instalaciones de Xen. El foco está en Xen versión 4.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento Clave:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura Xen , redes y storage&lt;br /&gt;
* Configuracion Xen &lt;br /&gt;
* Utilidades Xen &lt;br /&gt;
* Solucion de problemas de instalaciones  Xen &lt;br /&gt;
* Conocimiento básico de XAPI&lt;br /&gt;
* Conocimiento de XenStore&lt;br /&gt;
* Conocimiento de los parámetros de inicio de  Xen Boot &lt;br /&gt;
* Conocimiento de la utilidad xm&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Domain0 (Dom0), DomainU (DomU)&lt;br /&gt;
* PV-DomU, HVM-DomU&lt;br /&gt;
* /etc/xen/&lt;br /&gt;
* xl&lt;br /&gt;
* xl.cfg&lt;br /&gt;
* xl.conf&lt;br /&gt;
* xe&lt;br /&gt;
* xentop&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.3 KVM (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de instalaciones KVM..&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura KVM, redes y almacenamiento&lt;br /&gt;
* Configuración de KVM&lt;br /&gt;
* Utilidades de KVM&lt;br /&gt;
* Solución de problemas de instalaciones KVM&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Modules del Kernel: kvm, kvm-intel and kvm-amd&lt;br /&gt;
* /etc/kvm/ &lt;br /&gt;
* /dev/kvm&lt;br /&gt;
* kvm&lt;br /&gt;
* KVM monitor&lt;br /&gt;
* qemu&lt;br /&gt;
* qemu-img&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.4 Otras soluciones de virtualización (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben tener algunos conocimientos básicos y experiencia con alternativas a Xen y KVM.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de  conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento básico de OpenVZ y LXC&lt;br /&gt;
* Conocimiento de otras tecnologías de virtualización&lt;br /&gt;
* Conocimiento básico de las herramientas de aprovisionamiento de virtualización&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenVZ&lt;br /&gt;
* VirtualBox&lt;br /&gt;
* LXC&lt;br /&gt;
* docker&lt;br /&gt;
* packer&lt;br /&gt;
* vagrant&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.5 Libvirt y herramientas relacionadas (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos y experiencia con la biblioteca libvirt y las herramientas comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura libvirt, redes y almacenamiento&lt;br /&gt;
* Conocimiento técnico básico de libvirt y virsh&lt;br /&gt;
* Conocimiento de oVirt&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* libvirtd&lt;br /&gt;
* /etc/libvirt/&lt;br /&gt;
* virsh&lt;br /&gt;
* oVirt&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.6 Herramientas de administración de la nube  (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Pesot&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos sobre las herramientas de gestión de la nube comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento de funciones básicas de OpenStack y CloudStack&lt;br /&gt;
* Conocimiento de Eucalyptus y OpenNebula&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenStack&lt;br /&gt;
* CloudStack&lt;br /&gt;
* Eucalyptus&lt;br /&gt;
* OpenNebula&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 334: Gestión de clústeres de alta disponibilidad&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.1 Conceptos y teoría de Alta Disponibilidad (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben comprender las propiedades y los enfoques de diseño de los clusters de alta disponibilidad.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Comprender las arquitecturas de clúster más importantes.&lt;br /&gt;
* Comprender los mecanismos de recuperación y reorganización de clústeres.&lt;br /&gt;
* Diseñar una arquitectura de clúster apropiada para un propósito dado.&lt;br /&gt;
* Aspectos de la aplicación de alta disponibilidad.&lt;br /&gt;
* Consideraciones operacionales de alta disponibilidad.&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizados:&#039;&#039;&#039;&lt;br /&gt;
* Active/Passive Cluster, Active/Active Cluster&lt;br /&gt;
* Failover Cluster, Load Balanced Cluster&lt;br /&gt;
* Shared-Nothing Cluster, Shared-Disk Cluster&lt;br /&gt;
* Cluster resources&lt;br /&gt;
* Cluster services&lt;br /&gt;
* Quorum&lt;br /&gt;
* Fencing&lt;br /&gt;
* Split brain&lt;br /&gt;
* Redundancy&lt;br /&gt;
* Mean Time Before Failure (MTBF)&lt;br /&gt;
* Mean Time To Repair (MTTR)&lt;br /&gt;
* Service Level Agreement (SLA)&lt;br /&gt;
* Desaster Recovery&lt;br /&gt;
* Replication&lt;br /&gt;
* Session handling&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.2 Load Balanced Clusters (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, configure, maintain and troubleshoot LVS.  This includes the configuration and use of keepalived and ldirectord. Candidates should further be able to install, configure, maintain and troubleshoot HAProxy.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of LVS / IPVS.&lt;br /&gt;
* Basic knowledge of VRRP.&lt;br /&gt;
* Configuration of keepalived.&lt;br /&gt;
* Configuration of ldirectord.&lt;br /&gt;
* Backend server network configuration.&lt;br /&gt;
* Understanding of HAProxy.&lt;br /&gt;
* Configuration of HAProxy.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ipvsadm&lt;br /&gt;
* syncd&lt;br /&gt;
* LVS Forwarding (NAT, Direct Routing, Tunneling, Local Node)&lt;br /&gt;
* connection scheduling algorithms&lt;br /&gt;
* keepalived configuration file&lt;br /&gt;
* ldirectord configuration file&lt;br /&gt;
* genhash &lt;br /&gt;
* HAProxy configuration file&lt;br /&gt;
* load balancing algorithms&lt;br /&gt;
* ACLs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.3 Failover Clusters (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience in the installation, configuration, maintenance and troubleshooting of a Pacemaker cluster. This includes the use of Corosync. The focus is on Pacemaker 1.1 for Corosync 2.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd).&lt;br /&gt;
* Pacemaker cluster configuration.&lt;br /&gt;
* Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios).&lt;br /&gt;
* Resource rules and constraints (location, order, colocation).&lt;br /&gt;
* Advanced resource features (templates, groups, clone resources, multi-state resources).&lt;br /&gt;
* Pacemaker management using pcs.&lt;br /&gt;
* Pacemaker management using crmsh.&lt;br /&gt;
* Configuration and Management of corosync in conjunction with Pacemaker.&lt;br /&gt;
* Awareness of other cluster engines (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* pcs&lt;br /&gt;
* crm&lt;br /&gt;
* crm_mon&lt;br /&gt;
* crm_verify&lt;br /&gt;
* crm_simulate&lt;br /&gt;
* crm_shadow&lt;br /&gt;
* crm_resource&lt;br /&gt;
* crm_attribute&lt;br /&gt;
* crm_node&lt;br /&gt;
* crm_standby&lt;br /&gt;
* cibadmin&lt;br /&gt;
* corosync.conf&lt;br /&gt;
* authkey&lt;br /&gt;
* corosync-cfgtool&lt;br /&gt;
* corosync-cmapctl&lt;br /&gt;
* corosync-quorumtool&lt;br /&gt;
* stonith_admin&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.4 High Availability in Enterprise Linux Distributions (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of how enterprise Linux distributions integrate High Availability technologies.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Basic knowledge of Red Hat Enterprise Linux High Availability Add-On.&lt;br /&gt;
* Basic knowledge of SUSE Linux Enterprise High Availability Extension.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distribution specific configuration tools&lt;br /&gt;
* Integration of cluster engines, load balancers, storage technology, cluster filesystems, etc.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 335: High Availability Cluster Storage&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.1 DRBD / cLVM (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are expected to have the experience and knowledge to install, configure, maintain and troubleshoot DRBD devices.  This includes integration with Pacemaker. DRBD configuration of version 8.4.x is covered. Candidates are further expected to be able to manage LVM configuration within a shared storage cluster.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DRBD resources, states and replication modes.&lt;br /&gt;
* Configuration of DRBD resources, networking, disks and devices. &lt;br /&gt;
* Configuration of DRBD automatic recovery and error handling.&lt;br /&gt;
* Management of DRBD using drbdadm.&lt;br /&gt;
* Basic knowledge of drbdsetup and drbdmeta.&lt;br /&gt;
* Integration of DRBD with Pacemaker.&lt;br /&gt;
* cLVM&lt;br /&gt;
* Integration of cLVM with Pacemaker.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Protocol A, B and C&lt;br /&gt;
* Primary, Secondary&lt;br /&gt;
* Three-way replication&lt;br /&gt;
* drbd kernel module&lt;br /&gt;
* drbdadm&lt;br /&gt;
* drbdsetup&lt;br /&gt;
* drbdmeta&lt;br /&gt;
* /etc/drbd.conf&lt;br /&gt;
* /proc/drbd&lt;br /&gt;
* LVM2&lt;br /&gt;
* clvmd&lt;br /&gt;
* vgchange, vgs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.2 Clustered File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, maintain and troubleshoot installations using GFS2 and OCFS2. This includes integration with Pacemaker as well as awareness of other clustered filesystems available in a Linux environment.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the principles of cluster file systems.&lt;br /&gt;
* Create, maintain and troubleshoot GFS2 file systems in a cluster.&lt;br /&gt;
* Create, maintain and troubleshoot OCFS2 file systems in a cluster.&lt;br /&gt;
* Integration of GFS2 and OCFS2 with Pacemaker.&lt;br /&gt;
* Awareness of the O2CB cluster stack.&lt;br /&gt;
* Awareness of other commonly used clustered file systems.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distributed Lock Manager (DLM)&lt;br /&gt;
* mkfs.gfs2&lt;br /&gt;
* mount.gfs2&lt;br /&gt;
* fsck.gfs2&lt;br /&gt;
* gfs2_grow&lt;br /&gt;
* gfs2_edit&lt;br /&gt;
* gfs2_jadd&lt;br /&gt;
* mkfs.ocfs2&lt;br /&gt;
* mount.ocfs2&lt;br /&gt;
* fsck.ocfs2&lt;br /&gt;
* tunefs.ocfs2&lt;br /&gt;
* mounted.ocfs2&lt;br /&gt;
* o2info&lt;br /&gt;
* o2image&lt;br /&gt;
* CephFS&lt;br /&gt;
* GlusterFS&lt;br /&gt;
* AFS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Reference Material&#039;&#039;===&lt;br /&gt;
&#039;&#039;&#039;Virtualization Theory and Concepts:&#039;&#039;&#039;&lt;br /&gt;
* Xen: http://www.xen.org/support/documentation.html&lt;br /&gt;
* KVM: http://www.linux-kvm.org/page/Documents&lt;br /&gt;
* QEMU: http://wiki.qemu.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
* LVS: http://www.linuxvirtualserver.org/Documents.html&lt;br /&gt;
* HAProxy: http://haproxy.1wt.eu/#docs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Management:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker: http://clusterlabs.org/wiki/Documentation&lt;br /&gt;
** including: cluster glue, resource agents: http://www.linux-ha.org/wiki/Main_Page&lt;br /&gt;
* Red Hat Cluster Suite: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
** including: OpenAIS/corosync: http://www.corosync.org and http://www.openais.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Storage:&#039;&#039;&#039;&lt;br /&gt;
* DRBD: http://www.drbd.org/docs/about/&lt;br /&gt;
* GFS: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
* OCFS2: http://oss.oracle.com/projects/ocfs2/documentation/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Add Bonding / network high availability&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4290</id>
		<title>LPIC-304 Objectives V2(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4290"/>
		<updated>2017-12-06T03:04:32Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* 330.6 Cloud Management Tools (weight: 2) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
Todo el contenido del programa  [[LPIC-3]] se encuentra disponible  [[LPIC-3|aqui]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
==Version Actual==&lt;br /&gt;
&lt;br /&gt;
La version actual de los objetivos es 2.0.0&lt;br /&gt;
&lt;br /&gt;
También se encuentra [[LPIC304SummaryVersion1To2| el resumen con la información detallada]] de los cambios realizados para las versiones 1.0 a 2.0 con sus correspondientes objetivos.&lt;br /&gt;
&lt;br /&gt;
Los [[LPIC-304 Objectives V1| objetivos 1.x]] pueden ser encontrados   [[LPIC-304 Objectives V1|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traduccion de Objetivos==&lt;br /&gt;
Las siguientes traducciones de los objetivos en las  listas de la wiki:&lt;br /&gt;
* [[LPIC-304 Objectives V2|English]]&lt;br /&gt;
* [[LPIC-304 Objectives V2(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectivos==&lt;br /&gt;
===&#039;&#039;Topic 330: Virtualizacion&#039;&#039;===&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 8&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber y comprender los conceptos generales de teoria y terminologia de la Virtualizacion. Esta incluye Xen, KVM y la terminología de libvirt. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Terminologia&lt;br /&gt;
* Ventajas y Desventajas de la Virtualizacion&lt;br /&gt;
* Diferentes Variaciones de monitores de maquinas Virtuales&lt;br /&gt;
* Migration de Equipos Físicos a Maquinas Virtuales&lt;br /&gt;
* Migraciones de Maquinas Virtuales entre diferentes Equipos &lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Hypervisor&lt;br /&gt;
* Hardware Virtual Machine (HVM)&lt;br /&gt;
* Paravirtualization (PV)&lt;br /&gt;
* Virtualizacio de Contenedores&lt;br /&gt;
* Emulacion y Simulacion&lt;br /&gt;
* CPU flags&lt;br /&gt;
* /proc/cpuinfo&lt;br /&gt;
* Migraciones (P2V, V2V)&lt;br /&gt;
* IaaS, PaaS, SaaS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.2 Xen (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de las instalaciones de Xen. El foco está en Xen versión 4.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento Clave:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura Xen , redes y storage&lt;br /&gt;
* Configuracion Xen &lt;br /&gt;
* Utilidades Xen &lt;br /&gt;
* Solucion de problemas de instalaciones  Xen &lt;br /&gt;
* Conocimiento básico de XAPI&lt;br /&gt;
* Conocimiento de XenStore&lt;br /&gt;
* Conocimiento de los parámetros de inicio de  Xen Boot &lt;br /&gt;
* Conocimiento de la utilidad xm&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Domain0 (Dom0), DomainU (DomU)&lt;br /&gt;
* PV-DomU, HVM-DomU&lt;br /&gt;
* /etc/xen/&lt;br /&gt;
* xl&lt;br /&gt;
* xl.cfg&lt;br /&gt;
* xl.conf&lt;br /&gt;
* xe&lt;br /&gt;
* xentop&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.3 KVM (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de instalaciones KVM..&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura KVM, redes y almacenamiento&lt;br /&gt;
* Configuración de KVM&lt;br /&gt;
* Utilidades de KVM&lt;br /&gt;
* Solución de problemas de instalaciones KVM&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Modules del Kernel: kvm, kvm-intel and kvm-amd&lt;br /&gt;
* /etc/kvm/ &lt;br /&gt;
* /dev/kvm&lt;br /&gt;
* kvm&lt;br /&gt;
* KVM monitor&lt;br /&gt;
* qemu&lt;br /&gt;
* qemu-img&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.4 Otras soluciones de virtualización (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben tener algunos conocimientos básicos y experiencia con alternativas a Xen y KVM.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de  conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento básico de OpenVZ y LXC&lt;br /&gt;
* Conocimiento de otras tecnologías de virtualización&lt;br /&gt;
* Conocimiento básico de las herramientas de aprovisionamiento de virtualización&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenVZ&lt;br /&gt;
* VirtualBox&lt;br /&gt;
* LXC&lt;br /&gt;
* docker&lt;br /&gt;
* packer&lt;br /&gt;
* vagrant&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.5 Libvirt y herramientas relacionadas (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos y experiencia con la biblioteca libvirt y las herramientas comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura libvirt, redes y almacenamiento&lt;br /&gt;
* Conocimiento técnico básico de libvirt y virsh&lt;br /&gt;
* Conocimiento de oVirt&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* libvirtd&lt;br /&gt;
* /etc/libvirt/&lt;br /&gt;
* virsh&lt;br /&gt;
* oVirt&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.6 Herramientas de administración de la nube  (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Pesot&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos sobre las herramientas de gestión de la nube comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento de funciones básicas de OpenStack y CloudStack&lt;br /&gt;
* Conocimiento de Eucalyptus y OpenNebula&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenStack&lt;br /&gt;
* CloudStack&lt;br /&gt;
* Eucalyptus&lt;br /&gt;
* OpenNebula&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 334: High Availability Cluster Management&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.1 High Availability Concepts and Theory (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the properties and design approaches of high availability clusters.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the most important cluster architectures.&lt;br /&gt;
* Understand recovery and cluster reorganization mechanisms.&lt;br /&gt;
* Design an appropriate cluster architecture for a given purpose.&lt;br /&gt;
* Application aspects of high availability.&lt;br /&gt;
* Operational considerations of high availability.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Active/Passive Cluster, Active/Active Cluster&lt;br /&gt;
* Failover Cluster, Load Balanced Cluster&lt;br /&gt;
* Shared-Nothing Cluster, Shared-Disk Cluster&lt;br /&gt;
* Cluster resources&lt;br /&gt;
* Cluster services&lt;br /&gt;
* Quorum&lt;br /&gt;
* Fencing&lt;br /&gt;
* Split brain&lt;br /&gt;
* Redundancy&lt;br /&gt;
* Mean Time Before Failure (MTBF)&lt;br /&gt;
* Mean Time To Repair (MTTR)&lt;br /&gt;
* Service Level Agreement (SLA)&lt;br /&gt;
* Desaster Recovery&lt;br /&gt;
* Replication&lt;br /&gt;
* Session handling&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.2 Load Balanced Clusters (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, configure, maintain and troubleshoot LVS.  This includes the configuration and use of keepalived and ldirectord. Candidates should further be able to install, configure, maintain and troubleshoot HAProxy.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of LVS / IPVS.&lt;br /&gt;
* Basic knowledge of VRRP.&lt;br /&gt;
* Configuration of keepalived.&lt;br /&gt;
* Configuration of ldirectord.&lt;br /&gt;
* Backend server network configuration.&lt;br /&gt;
* Understanding of HAProxy.&lt;br /&gt;
* Configuration of HAProxy.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ipvsadm&lt;br /&gt;
* syncd&lt;br /&gt;
* LVS Forwarding (NAT, Direct Routing, Tunneling, Local Node)&lt;br /&gt;
* connection scheduling algorithms&lt;br /&gt;
* keepalived configuration file&lt;br /&gt;
* ldirectord configuration file&lt;br /&gt;
* genhash &lt;br /&gt;
* HAProxy configuration file&lt;br /&gt;
* load balancing algorithms&lt;br /&gt;
* ACLs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.3 Failover Clusters (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience in the installation, configuration, maintenance and troubleshooting of a Pacemaker cluster. This includes the use of Corosync. The focus is on Pacemaker 1.1 for Corosync 2.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd).&lt;br /&gt;
* Pacemaker cluster configuration.&lt;br /&gt;
* Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios).&lt;br /&gt;
* Resource rules and constraints (location, order, colocation).&lt;br /&gt;
* Advanced resource features (templates, groups, clone resources, multi-state resources).&lt;br /&gt;
* Pacemaker management using pcs.&lt;br /&gt;
* Pacemaker management using crmsh.&lt;br /&gt;
* Configuration and Management of corosync in conjunction with Pacemaker.&lt;br /&gt;
* Awareness of other cluster engines (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* pcs&lt;br /&gt;
* crm&lt;br /&gt;
* crm_mon&lt;br /&gt;
* crm_verify&lt;br /&gt;
* crm_simulate&lt;br /&gt;
* crm_shadow&lt;br /&gt;
* crm_resource&lt;br /&gt;
* crm_attribute&lt;br /&gt;
* crm_node&lt;br /&gt;
* crm_standby&lt;br /&gt;
* cibadmin&lt;br /&gt;
* corosync.conf&lt;br /&gt;
* authkey&lt;br /&gt;
* corosync-cfgtool&lt;br /&gt;
* corosync-cmapctl&lt;br /&gt;
* corosync-quorumtool&lt;br /&gt;
* stonith_admin&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.4 High Availability in Enterprise Linux Distributions (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of how enterprise Linux distributions integrate High Availability technologies.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Basic knowledge of Red Hat Enterprise Linux High Availability Add-On.&lt;br /&gt;
* Basic knowledge of SUSE Linux Enterprise High Availability Extension.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distribution specific configuration tools&lt;br /&gt;
* Integration of cluster engines, load balancers, storage technology, cluster filesystems, etc.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 335: High Availability Cluster Storage&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.1 DRBD / cLVM (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are expected to have the experience and knowledge to install, configure, maintain and troubleshoot DRBD devices.  This includes integration with Pacemaker. DRBD configuration of version 8.4.x is covered. Candidates are further expected to be able to manage LVM configuration within a shared storage cluster.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DRBD resources, states and replication modes.&lt;br /&gt;
* Configuration of DRBD resources, networking, disks and devices. &lt;br /&gt;
* Configuration of DRBD automatic recovery and error handling.&lt;br /&gt;
* Management of DRBD using drbdadm.&lt;br /&gt;
* Basic knowledge of drbdsetup and drbdmeta.&lt;br /&gt;
* Integration of DRBD with Pacemaker.&lt;br /&gt;
* cLVM&lt;br /&gt;
* Integration of cLVM with Pacemaker.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Protocol A, B and C&lt;br /&gt;
* Primary, Secondary&lt;br /&gt;
* Three-way replication&lt;br /&gt;
* drbd kernel module&lt;br /&gt;
* drbdadm&lt;br /&gt;
* drbdsetup&lt;br /&gt;
* drbdmeta&lt;br /&gt;
* /etc/drbd.conf&lt;br /&gt;
* /proc/drbd&lt;br /&gt;
* LVM2&lt;br /&gt;
* clvmd&lt;br /&gt;
* vgchange, vgs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.2 Clustered File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, maintain and troubleshoot installations using GFS2 and OCFS2. This includes integration with Pacemaker as well as awareness of other clustered filesystems available in a Linux environment.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the principles of cluster file systems.&lt;br /&gt;
* Create, maintain and troubleshoot GFS2 file systems in a cluster.&lt;br /&gt;
* Create, maintain and troubleshoot OCFS2 file systems in a cluster.&lt;br /&gt;
* Integration of GFS2 and OCFS2 with Pacemaker.&lt;br /&gt;
* Awareness of the O2CB cluster stack.&lt;br /&gt;
* Awareness of other commonly used clustered file systems.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distributed Lock Manager (DLM)&lt;br /&gt;
* mkfs.gfs2&lt;br /&gt;
* mount.gfs2&lt;br /&gt;
* fsck.gfs2&lt;br /&gt;
* gfs2_grow&lt;br /&gt;
* gfs2_edit&lt;br /&gt;
* gfs2_jadd&lt;br /&gt;
* mkfs.ocfs2&lt;br /&gt;
* mount.ocfs2&lt;br /&gt;
* fsck.ocfs2&lt;br /&gt;
* tunefs.ocfs2&lt;br /&gt;
* mounted.ocfs2&lt;br /&gt;
* o2info&lt;br /&gt;
* o2image&lt;br /&gt;
* CephFS&lt;br /&gt;
* GlusterFS&lt;br /&gt;
* AFS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Reference Material&#039;&#039;===&lt;br /&gt;
&#039;&#039;&#039;Virtualization Theory and Concepts:&#039;&#039;&#039;&lt;br /&gt;
* Xen: http://www.xen.org/support/documentation.html&lt;br /&gt;
* KVM: http://www.linux-kvm.org/page/Documents&lt;br /&gt;
* QEMU: http://wiki.qemu.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
* LVS: http://www.linuxvirtualserver.org/Documents.html&lt;br /&gt;
* HAProxy: http://haproxy.1wt.eu/#docs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Management:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker: http://clusterlabs.org/wiki/Documentation&lt;br /&gt;
** including: cluster glue, resource agents: http://www.linux-ha.org/wiki/Main_Page&lt;br /&gt;
* Red Hat Cluster Suite: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
** including: OpenAIS/corosync: http://www.corosync.org and http://www.openais.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Storage:&#039;&#039;&#039;&lt;br /&gt;
* DRBD: http://www.drbd.org/docs/about/&lt;br /&gt;
* GFS: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
* OCFS2: http://oss.oracle.com/projects/ocfs2/documentation/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Add Bonding / network high availability&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4289</id>
		<title>LPIC-304 Objectives V2(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4289"/>
		<updated>2017-12-06T03:02:44Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* 330.5 Libvirt and Related Tools (weight: 5) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
Todo el contenido del programa  [[LPIC-3]] se encuentra disponible  [[LPIC-3|aqui]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
==Version Actual==&lt;br /&gt;
&lt;br /&gt;
La version actual de los objetivos es 2.0.0&lt;br /&gt;
&lt;br /&gt;
También se encuentra [[LPIC304SummaryVersion1To2| el resumen con la información detallada]] de los cambios realizados para las versiones 1.0 a 2.0 con sus correspondientes objetivos.&lt;br /&gt;
&lt;br /&gt;
Los [[LPIC-304 Objectives V1| objetivos 1.x]] pueden ser encontrados   [[LPIC-304 Objectives V1|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traduccion de Objetivos==&lt;br /&gt;
Las siguientes traducciones de los objetivos en las  listas de la wiki:&lt;br /&gt;
* [[LPIC-304 Objectives V2|English]]&lt;br /&gt;
* [[LPIC-304 Objectives V2(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectivos==&lt;br /&gt;
===&#039;&#039;Topic 330: Virtualizacion&#039;&#039;===&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 8&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber y comprender los conceptos generales de teoria y terminologia de la Virtualizacion. Esta incluye Xen, KVM y la terminología de libvirt. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Terminologia&lt;br /&gt;
* Ventajas y Desventajas de la Virtualizacion&lt;br /&gt;
* Diferentes Variaciones de monitores de maquinas Virtuales&lt;br /&gt;
* Migration de Equipos Físicos a Maquinas Virtuales&lt;br /&gt;
* Migraciones de Maquinas Virtuales entre diferentes Equipos &lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Hypervisor&lt;br /&gt;
* Hardware Virtual Machine (HVM)&lt;br /&gt;
* Paravirtualization (PV)&lt;br /&gt;
* Virtualizacio de Contenedores&lt;br /&gt;
* Emulacion y Simulacion&lt;br /&gt;
* CPU flags&lt;br /&gt;
* /proc/cpuinfo&lt;br /&gt;
* Migraciones (P2V, V2V)&lt;br /&gt;
* IaaS, PaaS, SaaS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.2 Xen (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de las instalaciones de Xen. El foco está en Xen versión 4.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento Clave:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura Xen , redes y storage&lt;br /&gt;
* Configuracion Xen &lt;br /&gt;
* Utilidades Xen &lt;br /&gt;
* Solucion de problemas de instalaciones  Xen &lt;br /&gt;
* Conocimiento básico de XAPI&lt;br /&gt;
* Conocimiento de XenStore&lt;br /&gt;
* Conocimiento de los parámetros de inicio de  Xen Boot &lt;br /&gt;
* Conocimiento de la utilidad xm&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Domain0 (Dom0), DomainU (DomU)&lt;br /&gt;
* PV-DomU, HVM-DomU&lt;br /&gt;
* /etc/xen/&lt;br /&gt;
* xl&lt;br /&gt;
* xl.cfg&lt;br /&gt;
* xl.conf&lt;br /&gt;
* xe&lt;br /&gt;
* xentop&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.3 KVM (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de instalaciones KVM..&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura KVM, redes y almacenamiento&lt;br /&gt;
* Configuración de KVM&lt;br /&gt;
* Utilidades de KVM&lt;br /&gt;
* Solución de problemas de instalaciones KVM&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Modules del Kernel: kvm, kvm-intel and kvm-amd&lt;br /&gt;
* /etc/kvm/ &lt;br /&gt;
* /dev/kvm&lt;br /&gt;
* kvm&lt;br /&gt;
* KVM monitor&lt;br /&gt;
* qemu&lt;br /&gt;
* qemu-img&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.4 Otras soluciones de virtualización (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben tener algunos conocimientos básicos y experiencia con alternativas a Xen y KVM.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de  conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento básico de OpenVZ y LXC&lt;br /&gt;
* Conocimiento de otras tecnologías de virtualización&lt;br /&gt;
* Conocimiento básico de las herramientas de aprovisionamiento de virtualización&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenVZ&lt;br /&gt;
* VirtualBox&lt;br /&gt;
* LXC&lt;br /&gt;
* docker&lt;br /&gt;
* packer&lt;br /&gt;
* vagrant&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.5 Libvirt y herramientas relacionadas (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben tener conocimientos básicos y experiencia con la biblioteca libvirt y las herramientas comúnmente disponibles.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura libvirt, redes y almacenamiento&lt;br /&gt;
* Conocimiento técnico básico de libvirt y virsh&lt;br /&gt;
* Conocimiento de oVirt&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* libvirtd&lt;br /&gt;
* /etc/libvirt/&lt;br /&gt;
* virsh&lt;br /&gt;
* oVirt&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.6 Cloud Management Tools (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Pesot&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have basic feature knowledge of commonly available cloud management tools.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Basic feature knowledge of OpenStack and CloudStack&lt;br /&gt;
* Awareness of Eucalyptus and OpenNebula&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenStack&lt;br /&gt;
* CloudStack&lt;br /&gt;
* Eucalyptus&lt;br /&gt;
* OpenNebula&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 334: High Availability Cluster Management&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.1 High Availability Concepts and Theory (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the properties and design approaches of high availability clusters.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the most important cluster architectures.&lt;br /&gt;
* Understand recovery and cluster reorganization mechanisms.&lt;br /&gt;
* Design an appropriate cluster architecture for a given purpose.&lt;br /&gt;
* Application aspects of high availability.&lt;br /&gt;
* Operational considerations of high availability.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Active/Passive Cluster, Active/Active Cluster&lt;br /&gt;
* Failover Cluster, Load Balanced Cluster&lt;br /&gt;
* Shared-Nothing Cluster, Shared-Disk Cluster&lt;br /&gt;
* Cluster resources&lt;br /&gt;
* Cluster services&lt;br /&gt;
* Quorum&lt;br /&gt;
* Fencing&lt;br /&gt;
* Split brain&lt;br /&gt;
* Redundancy&lt;br /&gt;
* Mean Time Before Failure (MTBF)&lt;br /&gt;
* Mean Time To Repair (MTTR)&lt;br /&gt;
* Service Level Agreement (SLA)&lt;br /&gt;
* Desaster Recovery&lt;br /&gt;
* Replication&lt;br /&gt;
* Session handling&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.2 Load Balanced Clusters (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, configure, maintain and troubleshoot LVS.  This includes the configuration and use of keepalived and ldirectord. Candidates should further be able to install, configure, maintain and troubleshoot HAProxy.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of LVS / IPVS.&lt;br /&gt;
* Basic knowledge of VRRP.&lt;br /&gt;
* Configuration of keepalived.&lt;br /&gt;
* Configuration of ldirectord.&lt;br /&gt;
* Backend server network configuration.&lt;br /&gt;
* Understanding of HAProxy.&lt;br /&gt;
* Configuration of HAProxy.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ipvsadm&lt;br /&gt;
* syncd&lt;br /&gt;
* LVS Forwarding (NAT, Direct Routing, Tunneling, Local Node)&lt;br /&gt;
* connection scheduling algorithms&lt;br /&gt;
* keepalived configuration file&lt;br /&gt;
* ldirectord configuration file&lt;br /&gt;
* genhash &lt;br /&gt;
* HAProxy configuration file&lt;br /&gt;
* load balancing algorithms&lt;br /&gt;
* ACLs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.3 Failover Clusters (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience in the installation, configuration, maintenance and troubleshooting of a Pacemaker cluster. This includes the use of Corosync. The focus is on Pacemaker 1.1 for Corosync 2.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd).&lt;br /&gt;
* Pacemaker cluster configuration.&lt;br /&gt;
* Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios).&lt;br /&gt;
* Resource rules and constraints (location, order, colocation).&lt;br /&gt;
* Advanced resource features (templates, groups, clone resources, multi-state resources).&lt;br /&gt;
* Pacemaker management using pcs.&lt;br /&gt;
* Pacemaker management using crmsh.&lt;br /&gt;
* Configuration and Management of corosync in conjunction with Pacemaker.&lt;br /&gt;
* Awareness of other cluster engines (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* pcs&lt;br /&gt;
* crm&lt;br /&gt;
* crm_mon&lt;br /&gt;
* crm_verify&lt;br /&gt;
* crm_simulate&lt;br /&gt;
* crm_shadow&lt;br /&gt;
* crm_resource&lt;br /&gt;
* crm_attribute&lt;br /&gt;
* crm_node&lt;br /&gt;
* crm_standby&lt;br /&gt;
* cibadmin&lt;br /&gt;
* corosync.conf&lt;br /&gt;
* authkey&lt;br /&gt;
* corosync-cfgtool&lt;br /&gt;
* corosync-cmapctl&lt;br /&gt;
* corosync-quorumtool&lt;br /&gt;
* stonith_admin&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.4 High Availability in Enterprise Linux Distributions (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of how enterprise Linux distributions integrate High Availability technologies.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Basic knowledge of Red Hat Enterprise Linux High Availability Add-On.&lt;br /&gt;
* Basic knowledge of SUSE Linux Enterprise High Availability Extension.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distribution specific configuration tools&lt;br /&gt;
* Integration of cluster engines, load balancers, storage technology, cluster filesystems, etc.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 335: High Availability Cluster Storage&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.1 DRBD / cLVM (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are expected to have the experience and knowledge to install, configure, maintain and troubleshoot DRBD devices.  This includes integration with Pacemaker. DRBD configuration of version 8.4.x is covered. Candidates are further expected to be able to manage LVM configuration within a shared storage cluster.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DRBD resources, states and replication modes.&lt;br /&gt;
* Configuration of DRBD resources, networking, disks and devices. &lt;br /&gt;
* Configuration of DRBD automatic recovery and error handling.&lt;br /&gt;
* Management of DRBD using drbdadm.&lt;br /&gt;
* Basic knowledge of drbdsetup and drbdmeta.&lt;br /&gt;
* Integration of DRBD with Pacemaker.&lt;br /&gt;
* cLVM&lt;br /&gt;
* Integration of cLVM with Pacemaker.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Protocol A, B and C&lt;br /&gt;
* Primary, Secondary&lt;br /&gt;
* Three-way replication&lt;br /&gt;
* drbd kernel module&lt;br /&gt;
* drbdadm&lt;br /&gt;
* drbdsetup&lt;br /&gt;
* drbdmeta&lt;br /&gt;
* /etc/drbd.conf&lt;br /&gt;
* /proc/drbd&lt;br /&gt;
* LVM2&lt;br /&gt;
* clvmd&lt;br /&gt;
* vgchange, vgs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.2 Clustered File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, maintain and troubleshoot installations using GFS2 and OCFS2. This includes integration with Pacemaker as well as awareness of other clustered filesystems available in a Linux environment.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the principles of cluster file systems.&lt;br /&gt;
* Create, maintain and troubleshoot GFS2 file systems in a cluster.&lt;br /&gt;
* Create, maintain and troubleshoot OCFS2 file systems in a cluster.&lt;br /&gt;
* Integration of GFS2 and OCFS2 with Pacemaker.&lt;br /&gt;
* Awareness of the O2CB cluster stack.&lt;br /&gt;
* Awareness of other commonly used clustered file systems.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distributed Lock Manager (DLM)&lt;br /&gt;
* mkfs.gfs2&lt;br /&gt;
* mount.gfs2&lt;br /&gt;
* fsck.gfs2&lt;br /&gt;
* gfs2_grow&lt;br /&gt;
* gfs2_edit&lt;br /&gt;
* gfs2_jadd&lt;br /&gt;
* mkfs.ocfs2&lt;br /&gt;
* mount.ocfs2&lt;br /&gt;
* fsck.ocfs2&lt;br /&gt;
* tunefs.ocfs2&lt;br /&gt;
* mounted.ocfs2&lt;br /&gt;
* o2info&lt;br /&gt;
* o2image&lt;br /&gt;
* CephFS&lt;br /&gt;
* GlusterFS&lt;br /&gt;
* AFS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Reference Material&#039;&#039;===&lt;br /&gt;
&#039;&#039;&#039;Virtualization Theory and Concepts:&#039;&#039;&#039;&lt;br /&gt;
* Xen: http://www.xen.org/support/documentation.html&lt;br /&gt;
* KVM: http://www.linux-kvm.org/page/Documents&lt;br /&gt;
* QEMU: http://wiki.qemu.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
* LVS: http://www.linuxvirtualserver.org/Documents.html&lt;br /&gt;
* HAProxy: http://haproxy.1wt.eu/#docs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Management:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker: http://clusterlabs.org/wiki/Documentation&lt;br /&gt;
** including: cluster glue, resource agents: http://www.linux-ha.org/wiki/Main_Page&lt;br /&gt;
* Red Hat Cluster Suite: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
** including: OpenAIS/corosync: http://www.corosync.org and http://www.openais.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Storage:&#039;&#039;&#039;&lt;br /&gt;
* DRBD: http://www.drbd.org/docs/about/&lt;br /&gt;
* GFS: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
* OCFS2: http://oss.oracle.com/projects/ocfs2/documentation/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Add Bonding / network high availability&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4288</id>
		<title>LPIC-304 Objectives V2(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4288"/>
		<updated>2017-12-06T03:01:08Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* 330.4 Other Virtualization Solutions (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
Todo el contenido del programa  [[LPIC-3]] se encuentra disponible  [[LPIC-3|aqui]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
==Version Actual==&lt;br /&gt;
&lt;br /&gt;
La version actual de los objetivos es 2.0.0&lt;br /&gt;
&lt;br /&gt;
También se encuentra [[LPIC304SummaryVersion1To2| el resumen con la información detallada]] de los cambios realizados para las versiones 1.0 a 2.0 con sus correspondientes objetivos.&lt;br /&gt;
&lt;br /&gt;
Los [[LPIC-304 Objectives V1| objetivos 1.x]] pueden ser encontrados   [[LPIC-304 Objectives V1|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traduccion de Objetivos==&lt;br /&gt;
Las siguientes traducciones de los objetivos en las  listas de la wiki:&lt;br /&gt;
* [[LPIC-304 Objectives V2|English]]&lt;br /&gt;
* [[LPIC-304 Objectives V2(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectivos==&lt;br /&gt;
===&#039;&#039;Topic 330: Virtualizacion&#039;&#039;===&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 8&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber y comprender los conceptos generales de teoria y terminologia de la Virtualizacion. Esta incluye Xen, KVM y la terminología de libvirt. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Terminologia&lt;br /&gt;
* Ventajas y Desventajas de la Virtualizacion&lt;br /&gt;
* Diferentes Variaciones de monitores de maquinas Virtuales&lt;br /&gt;
* Migration de Equipos Físicos a Maquinas Virtuales&lt;br /&gt;
* Migraciones de Maquinas Virtuales entre diferentes Equipos &lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Hypervisor&lt;br /&gt;
* Hardware Virtual Machine (HVM)&lt;br /&gt;
* Paravirtualization (PV)&lt;br /&gt;
* Virtualizacio de Contenedores&lt;br /&gt;
* Emulacion y Simulacion&lt;br /&gt;
* CPU flags&lt;br /&gt;
* /proc/cpuinfo&lt;br /&gt;
* Migraciones (P2V, V2V)&lt;br /&gt;
* IaaS, PaaS, SaaS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.2 Xen (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de las instalaciones de Xen. El foco está en Xen versión 4.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento Clave:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura Xen , redes y storage&lt;br /&gt;
* Configuracion Xen &lt;br /&gt;
* Utilidades Xen &lt;br /&gt;
* Solucion de problemas de instalaciones  Xen &lt;br /&gt;
* Conocimiento básico de XAPI&lt;br /&gt;
* Conocimiento de XenStore&lt;br /&gt;
* Conocimiento de los parámetros de inicio de  Xen Boot &lt;br /&gt;
* Conocimiento de la utilidad xm&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Domain0 (Dom0), DomainU (DomU)&lt;br /&gt;
* PV-DomU, HVM-DomU&lt;br /&gt;
* /etc/xen/&lt;br /&gt;
* xl&lt;br /&gt;
* xl.cfg&lt;br /&gt;
* xl.conf&lt;br /&gt;
* xe&lt;br /&gt;
* xentop&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.3 KVM (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de instalaciones KVM..&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura KVM, redes y almacenamiento&lt;br /&gt;
* Configuración de KVM&lt;br /&gt;
* Utilidades de KVM&lt;br /&gt;
* Solución de problemas de instalaciones KVM&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Modules del Kernel: kvm, kvm-intel and kvm-amd&lt;br /&gt;
* /etc/kvm/ &lt;br /&gt;
* /dev/kvm&lt;br /&gt;
* kvm&lt;br /&gt;
* KVM monitor&lt;br /&gt;
* qemu&lt;br /&gt;
* qemu-img&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.4 Otras soluciones de virtualización (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben tener algunos conocimientos básicos y experiencia con alternativas a Xen y KVM.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de  conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento básico de OpenVZ y LXC&lt;br /&gt;
* Conocimiento de otras tecnologías de virtualización&lt;br /&gt;
* Conocimiento básico de las herramientas de aprovisionamiento de virtualización&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenVZ&lt;br /&gt;
* VirtualBox&lt;br /&gt;
* LXC&lt;br /&gt;
* docker&lt;br /&gt;
* packer&lt;br /&gt;
* vagrant&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.5 Libvirt and Related Tools (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have basic knowledge and experience with the libvirt library and commonly available tools.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* libvirt architecture, networking and storage&lt;br /&gt;
* Basic technical knowledge of libvirt and virsh&lt;br /&gt;
* Awareness of oVirt&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* libvirtd&lt;br /&gt;
* /etc/libvirt/&lt;br /&gt;
* virsh&lt;br /&gt;
* oVirt&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.6 Cloud Management Tools (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Pesot&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have basic feature knowledge of commonly available cloud management tools.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Basic feature knowledge of OpenStack and CloudStack&lt;br /&gt;
* Awareness of Eucalyptus and OpenNebula&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenStack&lt;br /&gt;
* CloudStack&lt;br /&gt;
* Eucalyptus&lt;br /&gt;
* OpenNebula&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 334: High Availability Cluster Management&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.1 High Availability Concepts and Theory (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the properties and design approaches of high availability clusters.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the most important cluster architectures.&lt;br /&gt;
* Understand recovery and cluster reorganization mechanisms.&lt;br /&gt;
* Design an appropriate cluster architecture for a given purpose.&lt;br /&gt;
* Application aspects of high availability.&lt;br /&gt;
* Operational considerations of high availability.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Active/Passive Cluster, Active/Active Cluster&lt;br /&gt;
* Failover Cluster, Load Balanced Cluster&lt;br /&gt;
* Shared-Nothing Cluster, Shared-Disk Cluster&lt;br /&gt;
* Cluster resources&lt;br /&gt;
* Cluster services&lt;br /&gt;
* Quorum&lt;br /&gt;
* Fencing&lt;br /&gt;
* Split brain&lt;br /&gt;
* Redundancy&lt;br /&gt;
* Mean Time Before Failure (MTBF)&lt;br /&gt;
* Mean Time To Repair (MTTR)&lt;br /&gt;
* Service Level Agreement (SLA)&lt;br /&gt;
* Desaster Recovery&lt;br /&gt;
* Replication&lt;br /&gt;
* Session handling&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.2 Load Balanced Clusters (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, configure, maintain and troubleshoot LVS.  This includes the configuration and use of keepalived and ldirectord. Candidates should further be able to install, configure, maintain and troubleshoot HAProxy.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of LVS / IPVS.&lt;br /&gt;
* Basic knowledge of VRRP.&lt;br /&gt;
* Configuration of keepalived.&lt;br /&gt;
* Configuration of ldirectord.&lt;br /&gt;
* Backend server network configuration.&lt;br /&gt;
* Understanding of HAProxy.&lt;br /&gt;
* Configuration of HAProxy.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ipvsadm&lt;br /&gt;
* syncd&lt;br /&gt;
* LVS Forwarding (NAT, Direct Routing, Tunneling, Local Node)&lt;br /&gt;
* connection scheduling algorithms&lt;br /&gt;
* keepalived configuration file&lt;br /&gt;
* ldirectord configuration file&lt;br /&gt;
* genhash &lt;br /&gt;
* HAProxy configuration file&lt;br /&gt;
* load balancing algorithms&lt;br /&gt;
* ACLs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.3 Failover Clusters (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience in the installation, configuration, maintenance and troubleshooting of a Pacemaker cluster. This includes the use of Corosync. The focus is on Pacemaker 1.1 for Corosync 2.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd).&lt;br /&gt;
* Pacemaker cluster configuration.&lt;br /&gt;
* Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios).&lt;br /&gt;
* Resource rules and constraints (location, order, colocation).&lt;br /&gt;
* Advanced resource features (templates, groups, clone resources, multi-state resources).&lt;br /&gt;
* Pacemaker management using pcs.&lt;br /&gt;
* Pacemaker management using crmsh.&lt;br /&gt;
* Configuration and Management of corosync in conjunction with Pacemaker.&lt;br /&gt;
* Awareness of other cluster engines (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* pcs&lt;br /&gt;
* crm&lt;br /&gt;
* crm_mon&lt;br /&gt;
* crm_verify&lt;br /&gt;
* crm_simulate&lt;br /&gt;
* crm_shadow&lt;br /&gt;
* crm_resource&lt;br /&gt;
* crm_attribute&lt;br /&gt;
* crm_node&lt;br /&gt;
* crm_standby&lt;br /&gt;
* cibadmin&lt;br /&gt;
* corosync.conf&lt;br /&gt;
* authkey&lt;br /&gt;
* corosync-cfgtool&lt;br /&gt;
* corosync-cmapctl&lt;br /&gt;
* corosync-quorumtool&lt;br /&gt;
* stonith_admin&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.4 High Availability in Enterprise Linux Distributions (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of how enterprise Linux distributions integrate High Availability technologies.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Basic knowledge of Red Hat Enterprise Linux High Availability Add-On.&lt;br /&gt;
* Basic knowledge of SUSE Linux Enterprise High Availability Extension.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distribution specific configuration tools&lt;br /&gt;
* Integration of cluster engines, load balancers, storage technology, cluster filesystems, etc.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 335: High Availability Cluster Storage&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.1 DRBD / cLVM (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are expected to have the experience and knowledge to install, configure, maintain and troubleshoot DRBD devices.  This includes integration with Pacemaker. DRBD configuration of version 8.4.x is covered. Candidates are further expected to be able to manage LVM configuration within a shared storage cluster.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DRBD resources, states and replication modes.&lt;br /&gt;
* Configuration of DRBD resources, networking, disks and devices. &lt;br /&gt;
* Configuration of DRBD automatic recovery and error handling.&lt;br /&gt;
* Management of DRBD using drbdadm.&lt;br /&gt;
* Basic knowledge of drbdsetup and drbdmeta.&lt;br /&gt;
* Integration of DRBD with Pacemaker.&lt;br /&gt;
* cLVM&lt;br /&gt;
* Integration of cLVM with Pacemaker.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Protocol A, B and C&lt;br /&gt;
* Primary, Secondary&lt;br /&gt;
* Three-way replication&lt;br /&gt;
* drbd kernel module&lt;br /&gt;
* drbdadm&lt;br /&gt;
* drbdsetup&lt;br /&gt;
* drbdmeta&lt;br /&gt;
* /etc/drbd.conf&lt;br /&gt;
* /proc/drbd&lt;br /&gt;
* LVM2&lt;br /&gt;
* clvmd&lt;br /&gt;
* vgchange, vgs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.2 Clustered File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, maintain and troubleshoot installations using GFS2 and OCFS2. This includes integration with Pacemaker as well as awareness of other clustered filesystems available in a Linux environment.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the principles of cluster file systems.&lt;br /&gt;
* Create, maintain and troubleshoot GFS2 file systems in a cluster.&lt;br /&gt;
* Create, maintain and troubleshoot OCFS2 file systems in a cluster.&lt;br /&gt;
* Integration of GFS2 and OCFS2 with Pacemaker.&lt;br /&gt;
* Awareness of the O2CB cluster stack.&lt;br /&gt;
* Awareness of other commonly used clustered file systems.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distributed Lock Manager (DLM)&lt;br /&gt;
* mkfs.gfs2&lt;br /&gt;
* mount.gfs2&lt;br /&gt;
* fsck.gfs2&lt;br /&gt;
* gfs2_grow&lt;br /&gt;
* gfs2_edit&lt;br /&gt;
* gfs2_jadd&lt;br /&gt;
* mkfs.ocfs2&lt;br /&gt;
* mount.ocfs2&lt;br /&gt;
* fsck.ocfs2&lt;br /&gt;
* tunefs.ocfs2&lt;br /&gt;
* mounted.ocfs2&lt;br /&gt;
* o2info&lt;br /&gt;
* o2image&lt;br /&gt;
* CephFS&lt;br /&gt;
* GlusterFS&lt;br /&gt;
* AFS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Reference Material&#039;&#039;===&lt;br /&gt;
&#039;&#039;&#039;Virtualization Theory and Concepts:&#039;&#039;&#039;&lt;br /&gt;
* Xen: http://www.xen.org/support/documentation.html&lt;br /&gt;
* KVM: http://www.linux-kvm.org/page/Documents&lt;br /&gt;
* QEMU: http://wiki.qemu.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
* LVS: http://www.linuxvirtualserver.org/Documents.html&lt;br /&gt;
* HAProxy: http://haproxy.1wt.eu/#docs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Management:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker: http://clusterlabs.org/wiki/Documentation&lt;br /&gt;
** including: cluster glue, resource agents: http://www.linux-ha.org/wiki/Main_Page&lt;br /&gt;
* Red Hat Cluster Suite: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
** including: OpenAIS/corosync: http://www.corosync.org and http://www.openais.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Storage:&#039;&#039;&#039;&lt;br /&gt;
* DRBD: http://www.drbd.org/docs/about/&lt;br /&gt;
* GFS: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
* OCFS2: http://oss.oracle.com/projects/ocfs2/documentation/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Add Bonding / network high availability&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4287</id>
		<title>LPIC-304 Objectives V2(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4287"/>
		<updated>2017-12-06T03:00:38Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* 330.4 Other Virtualization Solutions (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
Todo el contenido del programa  [[LPIC-3]] se encuentra disponible  [[LPIC-3|aqui]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
==Version Actual==&lt;br /&gt;
&lt;br /&gt;
La version actual de los objetivos es 2.0.0&lt;br /&gt;
&lt;br /&gt;
También se encuentra [[LPIC304SummaryVersion1To2| el resumen con la información detallada]] de los cambios realizados para las versiones 1.0 a 2.0 con sus correspondientes objetivos.&lt;br /&gt;
&lt;br /&gt;
Los [[LPIC-304 Objectives V1| objetivos 1.x]] pueden ser encontrados   [[LPIC-304 Objectives V1|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traduccion de Objetivos==&lt;br /&gt;
Las siguientes traducciones de los objetivos en las  listas de la wiki:&lt;br /&gt;
* [[LPIC-304 Objectives V2|English]]&lt;br /&gt;
* [[LPIC-304 Objectives V2(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectivos==&lt;br /&gt;
===&#039;&#039;Topic 330: Virtualizacion&#039;&#039;===&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 8&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber y comprender los conceptos generales de teoria y terminologia de la Virtualizacion. Esta incluye Xen, KVM y la terminología de libvirt. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Terminologia&lt;br /&gt;
* Ventajas y Desventajas de la Virtualizacion&lt;br /&gt;
* Diferentes Variaciones de monitores de maquinas Virtuales&lt;br /&gt;
* Migration de Equipos Físicos a Maquinas Virtuales&lt;br /&gt;
* Migraciones de Maquinas Virtuales entre diferentes Equipos &lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Hypervisor&lt;br /&gt;
* Hardware Virtual Machine (HVM)&lt;br /&gt;
* Paravirtualization (PV)&lt;br /&gt;
* Virtualizacio de Contenedores&lt;br /&gt;
* Emulacion y Simulacion&lt;br /&gt;
* CPU flags&lt;br /&gt;
* /proc/cpuinfo&lt;br /&gt;
* Migraciones (P2V, V2V)&lt;br /&gt;
* IaaS, PaaS, SaaS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.2 Xen (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de las instalaciones de Xen. El foco está en Xen versión 4.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento Clave:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura Xen , redes y storage&lt;br /&gt;
* Configuracion Xen &lt;br /&gt;
* Utilidades Xen &lt;br /&gt;
* Solucion de problemas de instalaciones  Xen &lt;br /&gt;
* Conocimiento básico de XAPI&lt;br /&gt;
* Conocimiento de XenStore&lt;br /&gt;
* Conocimiento de los parámetros de inicio de  Xen Boot &lt;br /&gt;
* Conocimiento de la utilidad xm&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Domain0 (Dom0), DomainU (DomU)&lt;br /&gt;
* PV-DomU, HVM-DomU&lt;br /&gt;
* /etc/xen/&lt;br /&gt;
* xl&lt;br /&gt;
* xl.cfg&lt;br /&gt;
* xl.conf&lt;br /&gt;
* xe&lt;br /&gt;
* xentop&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.3 KVM (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de instalaciones KVM..&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura KVM, redes y almacenamiento&lt;br /&gt;
* Configuración de KVM&lt;br /&gt;
* Utilidades de KVM&lt;br /&gt;
* Solución de problemas de instalaciones KVM&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Modules del Kernel: kvm, kvm-intel and kvm-amd&lt;br /&gt;
* /etc/kvm/ &lt;br /&gt;
* /dev/kvm&lt;br /&gt;
* kvm&lt;br /&gt;
* KVM monitor&lt;br /&gt;
* qemu&lt;br /&gt;
* qemu-img&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.4 Other Virtualization Solutions (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben tener algunos conocimientos básicos y experiencia con alternativas a Xen y KVM.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas clave de  conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento básico de OpenVZ y LXC&lt;br /&gt;
* Conocimiento de otras tecnologías de virtualización&lt;br /&gt;
* Conocimiento básico de las herramientas de aprovisionamiento de virtualización&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenVZ&lt;br /&gt;
* VirtualBox&lt;br /&gt;
* LXC&lt;br /&gt;
* docker&lt;br /&gt;
* packer&lt;br /&gt;
* vagrant&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.5 Libvirt and Related Tools (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have basic knowledge and experience with the libvirt library and commonly available tools.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* libvirt architecture, networking and storage&lt;br /&gt;
* Basic technical knowledge of libvirt and virsh&lt;br /&gt;
* Awareness of oVirt&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* libvirtd&lt;br /&gt;
* /etc/libvirt/&lt;br /&gt;
* virsh&lt;br /&gt;
* oVirt&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.6 Cloud Management Tools (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Pesot&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have basic feature knowledge of commonly available cloud management tools.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Basic feature knowledge of OpenStack and CloudStack&lt;br /&gt;
* Awareness of Eucalyptus and OpenNebula&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenStack&lt;br /&gt;
* CloudStack&lt;br /&gt;
* Eucalyptus&lt;br /&gt;
* OpenNebula&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 334: High Availability Cluster Management&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.1 High Availability Concepts and Theory (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the properties and design approaches of high availability clusters.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the most important cluster architectures.&lt;br /&gt;
* Understand recovery and cluster reorganization mechanisms.&lt;br /&gt;
* Design an appropriate cluster architecture for a given purpose.&lt;br /&gt;
* Application aspects of high availability.&lt;br /&gt;
* Operational considerations of high availability.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Active/Passive Cluster, Active/Active Cluster&lt;br /&gt;
* Failover Cluster, Load Balanced Cluster&lt;br /&gt;
* Shared-Nothing Cluster, Shared-Disk Cluster&lt;br /&gt;
* Cluster resources&lt;br /&gt;
* Cluster services&lt;br /&gt;
* Quorum&lt;br /&gt;
* Fencing&lt;br /&gt;
* Split brain&lt;br /&gt;
* Redundancy&lt;br /&gt;
* Mean Time Before Failure (MTBF)&lt;br /&gt;
* Mean Time To Repair (MTTR)&lt;br /&gt;
* Service Level Agreement (SLA)&lt;br /&gt;
* Desaster Recovery&lt;br /&gt;
* Replication&lt;br /&gt;
* Session handling&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.2 Load Balanced Clusters (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, configure, maintain and troubleshoot LVS.  This includes the configuration and use of keepalived and ldirectord. Candidates should further be able to install, configure, maintain and troubleshoot HAProxy.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of LVS / IPVS.&lt;br /&gt;
* Basic knowledge of VRRP.&lt;br /&gt;
* Configuration of keepalived.&lt;br /&gt;
* Configuration of ldirectord.&lt;br /&gt;
* Backend server network configuration.&lt;br /&gt;
* Understanding of HAProxy.&lt;br /&gt;
* Configuration of HAProxy.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ipvsadm&lt;br /&gt;
* syncd&lt;br /&gt;
* LVS Forwarding (NAT, Direct Routing, Tunneling, Local Node)&lt;br /&gt;
* connection scheduling algorithms&lt;br /&gt;
* keepalived configuration file&lt;br /&gt;
* ldirectord configuration file&lt;br /&gt;
* genhash &lt;br /&gt;
* HAProxy configuration file&lt;br /&gt;
* load balancing algorithms&lt;br /&gt;
* ACLs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.3 Failover Clusters (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience in the installation, configuration, maintenance and troubleshooting of a Pacemaker cluster. This includes the use of Corosync. The focus is on Pacemaker 1.1 for Corosync 2.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd).&lt;br /&gt;
* Pacemaker cluster configuration.&lt;br /&gt;
* Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios).&lt;br /&gt;
* Resource rules and constraints (location, order, colocation).&lt;br /&gt;
* Advanced resource features (templates, groups, clone resources, multi-state resources).&lt;br /&gt;
* Pacemaker management using pcs.&lt;br /&gt;
* Pacemaker management using crmsh.&lt;br /&gt;
* Configuration and Management of corosync in conjunction with Pacemaker.&lt;br /&gt;
* Awareness of other cluster engines (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* pcs&lt;br /&gt;
* crm&lt;br /&gt;
* crm_mon&lt;br /&gt;
* crm_verify&lt;br /&gt;
* crm_simulate&lt;br /&gt;
* crm_shadow&lt;br /&gt;
* crm_resource&lt;br /&gt;
* crm_attribute&lt;br /&gt;
* crm_node&lt;br /&gt;
* crm_standby&lt;br /&gt;
* cibadmin&lt;br /&gt;
* corosync.conf&lt;br /&gt;
* authkey&lt;br /&gt;
* corosync-cfgtool&lt;br /&gt;
* corosync-cmapctl&lt;br /&gt;
* corosync-quorumtool&lt;br /&gt;
* stonith_admin&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.4 High Availability in Enterprise Linux Distributions (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of how enterprise Linux distributions integrate High Availability technologies.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Basic knowledge of Red Hat Enterprise Linux High Availability Add-On.&lt;br /&gt;
* Basic knowledge of SUSE Linux Enterprise High Availability Extension.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distribution specific configuration tools&lt;br /&gt;
* Integration of cluster engines, load balancers, storage technology, cluster filesystems, etc.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 335: High Availability Cluster Storage&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.1 DRBD / cLVM (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are expected to have the experience and knowledge to install, configure, maintain and troubleshoot DRBD devices.  This includes integration with Pacemaker. DRBD configuration of version 8.4.x is covered. Candidates are further expected to be able to manage LVM configuration within a shared storage cluster.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DRBD resources, states and replication modes.&lt;br /&gt;
* Configuration of DRBD resources, networking, disks and devices. &lt;br /&gt;
* Configuration of DRBD automatic recovery and error handling.&lt;br /&gt;
* Management of DRBD using drbdadm.&lt;br /&gt;
* Basic knowledge of drbdsetup and drbdmeta.&lt;br /&gt;
* Integration of DRBD with Pacemaker.&lt;br /&gt;
* cLVM&lt;br /&gt;
* Integration of cLVM with Pacemaker.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Protocol A, B and C&lt;br /&gt;
* Primary, Secondary&lt;br /&gt;
* Three-way replication&lt;br /&gt;
* drbd kernel module&lt;br /&gt;
* drbdadm&lt;br /&gt;
* drbdsetup&lt;br /&gt;
* drbdmeta&lt;br /&gt;
* /etc/drbd.conf&lt;br /&gt;
* /proc/drbd&lt;br /&gt;
* LVM2&lt;br /&gt;
* clvmd&lt;br /&gt;
* vgchange, vgs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.2 Clustered File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, maintain and troubleshoot installations using GFS2 and OCFS2. This includes integration with Pacemaker as well as awareness of other clustered filesystems available in a Linux environment.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the principles of cluster file systems.&lt;br /&gt;
* Create, maintain and troubleshoot GFS2 file systems in a cluster.&lt;br /&gt;
* Create, maintain and troubleshoot OCFS2 file systems in a cluster.&lt;br /&gt;
* Integration of GFS2 and OCFS2 with Pacemaker.&lt;br /&gt;
* Awareness of the O2CB cluster stack.&lt;br /&gt;
* Awareness of other commonly used clustered file systems.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distributed Lock Manager (DLM)&lt;br /&gt;
* mkfs.gfs2&lt;br /&gt;
* mount.gfs2&lt;br /&gt;
* fsck.gfs2&lt;br /&gt;
* gfs2_grow&lt;br /&gt;
* gfs2_edit&lt;br /&gt;
* gfs2_jadd&lt;br /&gt;
* mkfs.ocfs2&lt;br /&gt;
* mount.ocfs2&lt;br /&gt;
* fsck.ocfs2&lt;br /&gt;
* tunefs.ocfs2&lt;br /&gt;
* mounted.ocfs2&lt;br /&gt;
* o2info&lt;br /&gt;
* o2image&lt;br /&gt;
* CephFS&lt;br /&gt;
* GlusterFS&lt;br /&gt;
* AFS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Reference Material&#039;&#039;===&lt;br /&gt;
&#039;&#039;&#039;Virtualization Theory and Concepts:&#039;&#039;&#039;&lt;br /&gt;
* Xen: http://www.xen.org/support/documentation.html&lt;br /&gt;
* KVM: http://www.linux-kvm.org/page/Documents&lt;br /&gt;
* QEMU: http://wiki.qemu.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
* LVS: http://www.linuxvirtualserver.org/Documents.html&lt;br /&gt;
* HAProxy: http://haproxy.1wt.eu/#docs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Management:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker: http://clusterlabs.org/wiki/Documentation&lt;br /&gt;
** including: cluster glue, resource agents: http://www.linux-ha.org/wiki/Main_Page&lt;br /&gt;
* Red Hat Cluster Suite: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
** including: OpenAIS/corosync: http://www.corosync.org and http://www.openais.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Storage:&#039;&#039;&#039;&lt;br /&gt;
* DRBD: http://www.drbd.org/docs/about/&lt;br /&gt;
* GFS: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
* OCFS2: http://oss.oracle.com/projects/ocfs2/documentation/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Add Bonding / network high availability&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4286</id>
		<title>LPIC-304 Objectives V2(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4286"/>
		<updated>2017-12-06T02:59:33Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* 330.4 Other Virtualization Solutions (weight: 3) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
Todo el contenido del programa  [[LPIC-3]] se encuentra disponible  [[LPIC-3|aqui]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
==Version Actual==&lt;br /&gt;
&lt;br /&gt;
La version actual de los objetivos es 2.0.0&lt;br /&gt;
&lt;br /&gt;
También se encuentra [[LPIC304SummaryVersion1To2| el resumen con la información detallada]] de los cambios realizados para las versiones 1.0 a 2.0 con sus correspondientes objetivos.&lt;br /&gt;
&lt;br /&gt;
Los [[LPIC-304 Objectives V1| objetivos 1.x]] pueden ser encontrados   [[LPIC-304 Objectives V1|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traduccion de Objetivos==&lt;br /&gt;
Las siguientes traducciones de los objetivos en las  listas de la wiki:&lt;br /&gt;
* [[LPIC-304 Objectives V2|English]]&lt;br /&gt;
* [[LPIC-304 Objectives V2(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectivos==&lt;br /&gt;
===&#039;&#039;Topic 330: Virtualizacion&#039;&#039;===&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 8&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber y comprender los conceptos generales de teoria y terminologia de la Virtualizacion. Esta incluye Xen, KVM y la terminología de libvirt. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Terminologia&lt;br /&gt;
* Ventajas y Desventajas de la Virtualizacion&lt;br /&gt;
* Diferentes Variaciones de monitores de maquinas Virtuales&lt;br /&gt;
* Migration de Equipos Físicos a Maquinas Virtuales&lt;br /&gt;
* Migraciones de Maquinas Virtuales entre diferentes Equipos &lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Hypervisor&lt;br /&gt;
* Hardware Virtual Machine (HVM)&lt;br /&gt;
* Paravirtualization (PV)&lt;br /&gt;
* Virtualizacio de Contenedores&lt;br /&gt;
* Emulacion y Simulacion&lt;br /&gt;
* CPU flags&lt;br /&gt;
* /proc/cpuinfo&lt;br /&gt;
* Migraciones (P2V, V2V)&lt;br /&gt;
* IaaS, PaaS, SaaS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.2 Xen (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de las instalaciones de Xen. El foco está en Xen versión 4.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento Clave:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura Xen , redes y storage&lt;br /&gt;
* Configuracion Xen &lt;br /&gt;
* Utilidades Xen &lt;br /&gt;
* Solucion de problemas de instalaciones  Xen &lt;br /&gt;
* Conocimiento básico de XAPI&lt;br /&gt;
* Conocimiento de XenStore&lt;br /&gt;
* Conocimiento de los parámetros de inicio de  Xen Boot &lt;br /&gt;
* Conocimiento de la utilidad xm&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Domain0 (Dom0), DomainU (DomU)&lt;br /&gt;
* PV-DomU, HVM-DomU&lt;br /&gt;
* /etc/xen/&lt;br /&gt;
* xl&lt;br /&gt;
* xl.cfg&lt;br /&gt;
* xl.conf&lt;br /&gt;
* xe&lt;br /&gt;
* xentop&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.3 KVM (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de instalaciones KVM..&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura KVM, redes y almacenamiento&lt;br /&gt;
* Configuración de KVM&lt;br /&gt;
* Utilidades de KVM&lt;br /&gt;
* Solución de problemas de instalaciones KVM&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Modules del Kernel: kvm, kvm-intel and kvm-amd&lt;br /&gt;
* /etc/kvm/ &lt;br /&gt;
* /dev/kvm&lt;br /&gt;
* kvm&lt;br /&gt;
* KVM monitor&lt;br /&gt;
* qemu&lt;br /&gt;
* qemu-img&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.4 Other Virtualization Solutions (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; |Los candidatos deben tener algunos conocimientos básicos y experiencia con alternativas a Xen y KVM.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Conocimiento básico de OpenVZ y LXC&lt;br /&gt;
* Conocimiento de otras tecnologías de virtualización&lt;br /&gt;
* Conocimiento básico de las herramientas de aprovisionamiento de virtualización&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenVZ&lt;br /&gt;
* VirtualBox&lt;br /&gt;
* LXC&lt;br /&gt;
* docker&lt;br /&gt;
* packer&lt;br /&gt;
* vagrant&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.5 Libvirt and Related Tools (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have basic knowledge and experience with the libvirt library and commonly available tools.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* libvirt architecture, networking and storage&lt;br /&gt;
* Basic technical knowledge of libvirt and virsh&lt;br /&gt;
* Awareness of oVirt&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* libvirtd&lt;br /&gt;
* /etc/libvirt/&lt;br /&gt;
* virsh&lt;br /&gt;
* oVirt&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.6 Cloud Management Tools (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Pesot&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have basic feature knowledge of commonly available cloud management tools.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Basic feature knowledge of OpenStack and CloudStack&lt;br /&gt;
* Awareness of Eucalyptus and OpenNebula&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenStack&lt;br /&gt;
* CloudStack&lt;br /&gt;
* Eucalyptus&lt;br /&gt;
* OpenNebula&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 334: High Availability Cluster Management&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.1 High Availability Concepts and Theory (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the properties and design approaches of high availability clusters.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the most important cluster architectures.&lt;br /&gt;
* Understand recovery and cluster reorganization mechanisms.&lt;br /&gt;
* Design an appropriate cluster architecture for a given purpose.&lt;br /&gt;
* Application aspects of high availability.&lt;br /&gt;
* Operational considerations of high availability.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Active/Passive Cluster, Active/Active Cluster&lt;br /&gt;
* Failover Cluster, Load Balanced Cluster&lt;br /&gt;
* Shared-Nothing Cluster, Shared-Disk Cluster&lt;br /&gt;
* Cluster resources&lt;br /&gt;
* Cluster services&lt;br /&gt;
* Quorum&lt;br /&gt;
* Fencing&lt;br /&gt;
* Split brain&lt;br /&gt;
* Redundancy&lt;br /&gt;
* Mean Time Before Failure (MTBF)&lt;br /&gt;
* Mean Time To Repair (MTTR)&lt;br /&gt;
* Service Level Agreement (SLA)&lt;br /&gt;
* Desaster Recovery&lt;br /&gt;
* Replication&lt;br /&gt;
* Session handling&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.2 Load Balanced Clusters (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, configure, maintain and troubleshoot LVS.  This includes the configuration and use of keepalived and ldirectord. Candidates should further be able to install, configure, maintain and troubleshoot HAProxy.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of LVS / IPVS.&lt;br /&gt;
* Basic knowledge of VRRP.&lt;br /&gt;
* Configuration of keepalived.&lt;br /&gt;
* Configuration of ldirectord.&lt;br /&gt;
* Backend server network configuration.&lt;br /&gt;
* Understanding of HAProxy.&lt;br /&gt;
* Configuration of HAProxy.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ipvsadm&lt;br /&gt;
* syncd&lt;br /&gt;
* LVS Forwarding (NAT, Direct Routing, Tunneling, Local Node)&lt;br /&gt;
* connection scheduling algorithms&lt;br /&gt;
* keepalived configuration file&lt;br /&gt;
* ldirectord configuration file&lt;br /&gt;
* genhash &lt;br /&gt;
* HAProxy configuration file&lt;br /&gt;
* load balancing algorithms&lt;br /&gt;
* ACLs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.3 Failover Clusters (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience in the installation, configuration, maintenance and troubleshooting of a Pacemaker cluster. This includes the use of Corosync. The focus is on Pacemaker 1.1 for Corosync 2.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd).&lt;br /&gt;
* Pacemaker cluster configuration.&lt;br /&gt;
* Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios).&lt;br /&gt;
* Resource rules and constraints (location, order, colocation).&lt;br /&gt;
* Advanced resource features (templates, groups, clone resources, multi-state resources).&lt;br /&gt;
* Pacemaker management using pcs.&lt;br /&gt;
* Pacemaker management using crmsh.&lt;br /&gt;
* Configuration and Management of corosync in conjunction with Pacemaker.&lt;br /&gt;
* Awareness of other cluster engines (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* pcs&lt;br /&gt;
* crm&lt;br /&gt;
* crm_mon&lt;br /&gt;
* crm_verify&lt;br /&gt;
* crm_simulate&lt;br /&gt;
* crm_shadow&lt;br /&gt;
* crm_resource&lt;br /&gt;
* crm_attribute&lt;br /&gt;
* crm_node&lt;br /&gt;
* crm_standby&lt;br /&gt;
* cibadmin&lt;br /&gt;
* corosync.conf&lt;br /&gt;
* authkey&lt;br /&gt;
* corosync-cfgtool&lt;br /&gt;
* corosync-cmapctl&lt;br /&gt;
* corosync-quorumtool&lt;br /&gt;
* stonith_admin&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.4 High Availability in Enterprise Linux Distributions (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of how enterprise Linux distributions integrate High Availability technologies.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Basic knowledge of Red Hat Enterprise Linux High Availability Add-On.&lt;br /&gt;
* Basic knowledge of SUSE Linux Enterprise High Availability Extension.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distribution specific configuration tools&lt;br /&gt;
* Integration of cluster engines, load balancers, storage technology, cluster filesystems, etc.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 335: High Availability Cluster Storage&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.1 DRBD / cLVM (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are expected to have the experience and knowledge to install, configure, maintain and troubleshoot DRBD devices.  This includes integration with Pacemaker. DRBD configuration of version 8.4.x is covered. Candidates are further expected to be able to manage LVM configuration within a shared storage cluster.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DRBD resources, states and replication modes.&lt;br /&gt;
* Configuration of DRBD resources, networking, disks and devices. &lt;br /&gt;
* Configuration of DRBD automatic recovery and error handling.&lt;br /&gt;
* Management of DRBD using drbdadm.&lt;br /&gt;
* Basic knowledge of drbdsetup and drbdmeta.&lt;br /&gt;
* Integration of DRBD with Pacemaker.&lt;br /&gt;
* cLVM&lt;br /&gt;
* Integration of cLVM with Pacemaker.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Protocol A, B and C&lt;br /&gt;
* Primary, Secondary&lt;br /&gt;
* Three-way replication&lt;br /&gt;
* drbd kernel module&lt;br /&gt;
* drbdadm&lt;br /&gt;
* drbdsetup&lt;br /&gt;
* drbdmeta&lt;br /&gt;
* /etc/drbd.conf&lt;br /&gt;
* /proc/drbd&lt;br /&gt;
* LVM2&lt;br /&gt;
* clvmd&lt;br /&gt;
* vgchange, vgs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.2 Clustered File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, maintain and troubleshoot installations using GFS2 and OCFS2. This includes integration with Pacemaker as well as awareness of other clustered filesystems available in a Linux environment.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the principles of cluster file systems.&lt;br /&gt;
* Create, maintain and troubleshoot GFS2 file systems in a cluster.&lt;br /&gt;
* Create, maintain and troubleshoot OCFS2 file systems in a cluster.&lt;br /&gt;
* Integration of GFS2 and OCFS2 with Pacemaker.&lt;br /&gt;
* Awareness of the O2CB cluster stack.&lt;br /&gt;
* Awareness of other commonly used clustered file systems.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distributed Lock Manager (DLM)&lt;br /&gt;
* mkfs.gfs2&lt;br /&gt;
* mount.gfs2&lt;br /&gt;
* fsck.gfs2&lt;br /&gt;
* gfs2_grow&lt;br /&gt;
* gfs2_edit&lt;br /&gt;
* gfs2_jadd&lt;br /&gt;
* mkfs.ocfs2&lt;br /&gt;
* mount.ocfs2&lt;br /&gt;
* fsck.ocfs2&lt;br /&gt;
* tunefs.ocfs2&lt;br /&gt;
* mounted.ocfs2&lt;br /&gt;
* o2info&lt;br /&gt;
* o2image&lt;br /&gt;
* CephFS&lt;br /&gt;
* GlusterFS&lt;br /&gt;
* AFS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Reference Material&#039;&#039;===&lt;br /&gt;
&#039;&#039;&#039;Virtualization Theory and Concepts:&#039;&#039;&#039;&lt;br /&gt;
* Xen: http://www.xen.org/support/documentation.html&lt;br /&gt;
* KVM: http://www.linux-kvm.org/page/Documents&lt;br /&gt;
* QEMU: http://wiki.qemu.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
* LVS: http://www.linuxvirtualserver.org/Documents.html&lt;br /&gt;
* HAProxy: http://haproxy.1wt.eu/#docs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Management:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker: http://clusterlabs.org/wiki/Documentation&lt;br /&gt;
** including: cluster glue, resource agents: http://www.linux-ha.org/wiki/Main_Page&lt;br /&gt;
* Red Hat Cluster Suite: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
** including: OpenAIS/corosync: http://www.corosync.org and http://www.openais.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Storage:&#039;&#039;&#039;&lt;br /&gt;
* DRBD: http://www.drbd.org/docs/about/&lt;br /&gt;
* GFS: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
* OCFS2: http://oss.oracle.com/projects/ocfs2/documentation/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Add Bonding / network high availability&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
	<entry>
		<id>https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4285</id>
		<title>LPIC-304 Objectives V2(ES)</title>
		<link rel="alternate" type="text/html" href="https://wiki.lpi.org/w/index.php?title=LPIC-304_Objectives_V2(ES)&amp;diff=4285"/>
		<updated>2017-12-06T02:58:22Z</updated>

		<summary type="html">&lt;p&gt;Restaurador: /* 330.3 KVM (weight: 9) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
==Introduccion==&lt;br /&gt;
Todo el contenido del programa  [[LPIC-3]] se encuentra disponible  [[LPIC-3|aqui]].&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
==Version Actual==&lt;br /&gt;
&lt;br /&gt;
La version actual de los objetivos es 2.0.0&lt;br /&gt;
&lt;br /&gt;
También se encuentra [[LPIC304SummaryVersion1To2| el resumen con la información detallada]] de los cambios realizados para las versiones 1.0 a 2.0 con sus correspondientes objetivos.&lt;br /&gt;
&lt;br /&gt;
Los [[LPIC-304 Objectives V1| objetivos 1.x]] pueden ser encontrados   [[LPIC-304 Objectives V1|aqui]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Traduccion de Objetivos==&lt;br /&gt;
Las siguientes traducciones de los objetivos en las  listas de la wiki:&lt;br /&gt;
* [[LPIC-304 Objectives V2|English]]&lt;br /&gt;
* [[LPIC-304 Objectives V2(ES)|Spanish]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Objectivos==&lt;br /&gt;
===&#039;&#039;Topic 330: Virtualizacion&#039;&#039;===&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 8&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deben saber y comprender los conceptos generales de teoria y terminologia de la Virtualizacion. Esta incluye Xen, KVM y la terminología de libvirt. &lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento clave:&#039;&#039;&#039;&lt;br /&gt;
* Terminologia&lt;br /&gt;
* Ventajas y Desventajas de la Virtualizacion&lt;br /&gt;
* Diferentes Variaciones de monitores de maquinas Virtuales&lt;br /&gt;
* Migration de Equipos Físicos a Maquinas Virtuales&lt;br /&gt;
* Migraciones de Maquinas Virtuales entre diferentes Equipos &lt;br /&gt;
* Cloud Computing&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Hypervisor&lt;br /&gt;
* Hardware Virtual Machine (HVM)&lt;br /&gt;
* Paravirtualization (PV)&lt;br /&gt;
* Virtualizacio de Contenedores&lt;br /&gt;
* Emulacion y Simulacion&lt;br /&gt;
* CPU flags&lt;br /&gt;
* /proc/cpuinfo&lt;br /&gt;
* Migraciones (P2V, V2V)&lt;br /&gt;
* IaaS, PaaS, SaaS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.2 Xen (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de las instalaciones de Xen. El foco está en Xen versión 4.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Areas de Conocimiento Clave:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura Xen , redes y storage&lt;br /&gt;
* Configuracion Xen &lt;br /&gt;
* Utilidades Xen &lt;br /&gt;
* Solucion de problemas de instalaciones  Xen &lt;br /&gt;
* Conocimiento básico de XAPI&lt;br /&gt;
* Conocimiento de XenStore&lt;br /&gt;
* Conocimiento de los parámetros de inicio de  Xen Boot &lt;br /&gt;
* Conocimiento de la utilidad xm&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Domain0 (Dom0), DomainU (DomU)&lt;br /&gt;
* PV-DomU, HVM-DomU&lt;br /&gt;
* /etc/xen/&lt;br /&gt;
* xl&lt;br /&gt;
* xl.cfg&lt;br /&gt;
* xl.conf&lt;br /&gt;
* xe&lt;br /&gt;
* xentop&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.3 KVM (weight: 9)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 9&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Los candidatos deberían poder instalar, configurar, mantener, migrar y solucionar problemas de instalaciones KVM..&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Áreas clave de conocimiento:&#039;&#039;&#039;&lt;br /&gt;
* Arquitectura KVM, redes y almacenamiento&lt;br /&gt;
* Configuración de KVM&lt;br /&gt;
* Utilidades de KVM&lt;br /&gt;
* Solución de problemas de instalaciones KVM&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* Modules del Kernel: kvm, kvm-intel and kvm-amd&lt;br /&gt;
* /etc/kvm/ &lt;br /&gt;
* /dev/kvm&lt;br /&gt;
* kvm&lt;br /&gt;
* KVM monitor&lt;br /&gt;
* qemu&lt;br /&gt;
* qemu-img&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.4 Other Virtualization Solutions (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have some basic knowledge and experience with alternatives to Xen and KVM.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Basic knowledge of OpenVZ and LXC&lt;br /&gt;
* Awareness of other virtualization technologies&lt;br /&gt;
* Basic knowledge of virtualization provisioning tools&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenVZ&lt;br /&gt;
* VirtualBox&lt;br /&gt;
* LXC&lt;br /&gt;
* docker&lt;br /&gt;
* packer&lt;br /&gt;
* vagrant&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.5 Libvirt and Related Tools (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Peso&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have basic knowledge and experience with the libvirt library and commonly available tools.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* libvirt architecture, networking and storage&lt;br /&gt;
* Basic technical knowledge of libvirt and virsh&lt;br /&gt;
* Awareness of oVirt&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* libvirtd&lt;br /&gt;
* /etc/libvirt/&lt;br /&gt;
* virsh&lt;br /&gt;
* oVirt&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;330.6 Cloud Management Tools (weight: 2)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Pesot&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 2&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Descripcion&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have basic feature knowledge of commonly available cloud management tools.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Basic feature knowledge of OpenStack and CloudStack&lt;br /&gt;
* Awareness of Eucalyptus and OpenNebula&lt;br /&gt;
&#039;&#039;&#039;La siguiente es una lista parcial de los archivos, términos y utilidades utilizadas:&#039;&#039;&#039;&lt;br /&gt;
* OpenStack&lt;br /&gt;
* CloudStack&lt;br /&gt;
* Eucalyptus&lt;br /&gt;
* OpenNebula&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
===&#039;&#039;Topic 334: High Availability Cluster Management&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.1 High Availability Concepts and Theory (weight: 5)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 5&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should understand the properties and design approaches of high availability clusters.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the most important cluster architectures.&lt;br /&gt;
* Understand recovery and cluster reorganization mechanisms.&lt;br /&gt;
* Design an appropriate cluster architecture for a given purpose.&lt;br /&gt;
* Application aspects of high availability.&lt;br /&gt;
* Operational considerations of high availability.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Active/Passive Cluster, Active/Active Cluster&lt;br /&gt;
* Failover Cluster, Load Balanced Cluster&lt;br /&gt;
* Shared-Nothing Cluster, Shared-Disk Cluster&lt;br /&gt;
* Cluster resources&lt;br /&gt;
* Cluster services&lt;br /&gt;
* Quorum&lt;br /&gt;
* Fencing&lt;br /&gt;
* Split brain&lt;br /&gt;
* Redundancy&lt;br /&gt;
* Mean Time Before Failure (MTBF)&lt;br /&gt;
* Mean Time To Repair (MTTR)&lt;br /&gt;
* Service Level Agreement (SLA)&lt;br /&gt;
* Desaster Recovery&lt;br /&gt;
* Replication&lt;br /&gt;
* Session handling&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.2 Load Balanced Clusters (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, configure, maintain and troubleshoot LVS.  This includes the configuration and use of keepalived and ldirectord. Candidates should further be able to install, configure, maintain and troubleshoot HAProxy.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of LVS / IPVS.&lt;br /&gt;
* Basic knowledge of VRRP.&lt;br /&gt;
* Configuration of keepalived.&lt;br /&gt;
* Configuration of ldirectord.&lt;br /&gt;
* Backend server network configuration.&lt;br /&gt;
* Understanding of HAProxy.&lt;br /&gt;
* Configuration of HAProxy.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* ipvsadm&lt;br /&gt;
* syncd&lt;br /&gt;
* LVS Forwarding (NAT, Direct Routing, Tunneling, Local Node)&lt;br /&gt;
* connection scheduling algorithms&lt;br /&gt;
* keepalived configuration file&lt;br /&gt;
* ldirectord configuration file&lt;br /&gt;
* genhash &lt;br /&gt;
* HAProxy configuration file&lt;br /&gt;
* load balancing algorithms&lt;br /&gt;
* ACLs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.3 Failover Clusters (weight: 6)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 6&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should have experience in the installation, configuration, maintenance and troubleshooting of a Pacemaker cluster. This includes the use of Corosync. The focus is on Pacemaker 1.1 for Corosync 2.x.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd).&lt;br /&gt;
* Pacemaker cluster configuration.&lt;br /&gt;
* Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios).&lt;br /&gt;
* Resource rules and constraints (location, order, colocation).&lt;br /&gt;
* Advanced resource features (templates, groups, clone resources, multi-state resources).&lt;br /&gt;
* Pacemaker management using pcs.&lt;br /&gt;
* Pacemaker management using crmsh.&lt;br /&gt;
* Configuration and Management of corosync in conjunction with Pacemaker.&lt;br /&gt;
* Awareness of other cluster engines (OpenAIS, Heartbeat, CMAN).&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* pcs&lt;br /&gt;
* crm&lt;br /&gt;
* crm_mon&lt;br /&gt;
* crm_verify&lt;br /&gt;
* crm_simulate&lt;br /&gt;
* crm_shadow&lt;br /&gt;
* crm_resource&lt;br /&gt;
* crm_attribute&lt;br /&gt;
* crm_node&lt;br /&gt;
* crm_standby&lt;br /&gt;
* cibadmin&lt;br /&gt;
* corosync.conf&lt;br /&gt;
* authkey&lt;br /&gt;
* corosync-cfgtool&lt;br /&gt;
* corosync-cmapctl&lt;br /&gt;
* corosync-quorumtool&lt;br /&gt;
* stonith_admin&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;334.4 High Availability in Enterprise Linux Distributions (weight: 1)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 1&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should be aware of how enterprise Linux distributions integrate High Availability technologies.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Basic knowledge of Red Hat Enterprise Linux High Availability Add-On.&lt;br /&gt;
* Basic knowledge of SUSE Linux Enterprise High Availability Extension.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distribution specific configuration tools&lt;br /&gt;
* Integration of cluster engines, load balancers, storage technology, cluster filesystems, etc.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Topic 335: High Availability Cluster Storage&#039;&#039;===&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.1 DRBD / cLVM (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates are expected to have the experience and knowledge to install, configure, maintain and troubleshoot DRBD devices.  This includes integration with Pacemaker. DRBD configuration of version 8.4.x is covered. Candidates are further expected to be able to manage LVM configuration within a shared storage cluster.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understanding of DRBD resources, states and replication modes.&lt;br /&gt;
* Configuration of DRBD resources, networking, disks and devices. &lt;br /&gt;
* Configuration of DRBD automatic recovery and error handling.&lt;br /&gt;
* Management of DRBD using drbdadm.&lt;br /&gt;
* Basic knowledge of drbdsetup and drbdmeta.&lt;br /&gt;
* Integration of DRBD with Pacemaker.&lt;br /&gt;
* cLVM&lt;br /&gt;
* Integration of cLVM with Pacemaker.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Protocol A, B and C&lt;br /&gt;
* Primary, Secondary&lt;br /&gt;
* Three-way replication&lt;br /&gt;
* drbd kernel module&lt;br /&gt;
* drbdadm&lt;br /&gt;
* drbdsetup&lt;br /&gt;
* drbdmeta&lt;br /&gt;
* /etc/drbd.conf&lt;br /&gt;
* /proc/drbd&lt;br /&gt;
* LVM2&lt;br /&gt;
* clvmd&lt;br /&gt;
* vgchange, vgs&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====&amp;lt;span style=&amp;quot;color:navy&amp;quot;&amp;gt;335.2 Clustered File Systems (weight: 3)&amp;lt;/span&amp;gt;====&lt;br /&gt;
{|&lt;br /&gt;
| style=&amp;quot;background:#dadada&amp;quot; | &#039;&#039;&#039;Weight&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background:#dadada; padding-right:1em&amp;quot; | &#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
| style=&amp;quot;background:#eaeaea&amp;quot; | Candidates should know how to install, maintain and troubleshoot installations using GFS2 and OCFS2. This includes integration with Pacemaker as well as awareness of other clustered filesystems available in a Linux environment.&lt;br /&gt;
|}&lt;br /&gt;
&#039;&#039;&#039;Key Knowledge Areas:&#039;&#039;&#039;&lt;br /&gt;
* Understand the principles of cluster file systems.&lt;br /&gt;
* Create, maintain and troubleshoot GFS2 file systems in a cluster.&lt;br /&gt;
* Create, maintain and troubleshoot OCFS2 file systems in a cluster.&lt;br /&gt;
* Integration of GFS2 and OCFS2 with Pacemaker.&lt;br /&gt;
* Awareness of the O2CB cluster stack.&lt;br /&gt;
* Awareness of other commonly used clustered file systems.&lt;br /&gt;
&#039;&#039;&#039;The following is a partial list of the used files, terms and utilities:&#039;&#039;&#039;&lt;br /&gt;
* Distributed Lock Manager (DLM)&lt;br /&gt;
* mkfs.gfs2&lt;br /&gt;
* mount.gfs2&lt;br /&gt;
* fsck.gfs2&lt;br /&gt;
* gfs2_grow&lt;br /&gt;
* gfs2_edit&lt;br /&gt;
* gfs2_jadd&lt;br /&gt;
* mkfs.ocfs2&lt;br /&gt;
* mount.ocfs2&lt;br /&gt;
* fsck.ocfs2&lt;br /&gt;
* tunefs.ocfs2&lt;br /&gt;
* mounted.ocfs2&lt;br /&gt;
* o2info&lt;br /&gt;
* o2image&lt;br /&gt;
* CephFS&lt;br /&gt;
* GlusterFS&lt;br /&gt;
* AFS&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===&#039;&#039;Reference Material&#039;&#039;===&lt;br /&gt;
&#039;&#039;&#039;Virtualization Theory and Concepts:&#039;&#039;&#039;&lt;br /&gt;
* Xen: http://www.xen.org/support/documentation.html&lt;br /&gt;
* KVM: http://www.linux-kvm.org/page/Documents&lt;br /&gt;
* QEMU: http://wiki.qemu.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Load Balancing:&#039;&#039;&#039;&lt;br /&gt;
* LVS: http://www.linuxvirtualserver.org/Documents.html&lt;br /&gt;
* HAProxy: http://haproxy.1wt.eu/#docs&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Management:&#039;&#039;&#039;&lt;br /&gt;
* Pacemaker: http://clusterlabs.org/wiki/Documentation&lt;br /&gt;
** including: cluster glue, resource agents: http://www.linux-ha.org/wiki/Main_Page&lt;br /&gt;
* Red Hat Cluster Suite: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
** including: OpenAIS/corosync: http://www.corosync.org and http://www.openais.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Cluster Storage:&#039;&#039;&#039;&lt;br /&gt;
* DRBD: http://www.drbd.org/docs/about/&lt;br /&gt;
* GFS: http://www.redhat.com/docs/manuals/csgfs/&lt;br /&gt;
* OCFS2: http://oss.oracle.com/projects/ocfs2/documentation/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Future Change Considerations==&lt;br /&gt;
&lt;br /&gt;
Future changes to the objective will/may include:&lt;br /&gt;
&lt;br /&gt;
* Add Bonding / network high availability&lt;/div&gt;</summary>
		<author><name>Restaurador</name></author>
	</entry>
</feed>