Credit Towards Certification
![]() | Certified e-Business Professional |
Exam Details
![]() | Number of Questions: 50 |
![]() | Passing Score: 70% |
![]() | Test Duration: 2 Hours |
![]() | Test Format: Multiple Choice |
![]() | Test Delivery: Prometric Prime Online Web site |
Test Objectives
Module 1: Linux Networking Fundamentals
![]() | Explain the purposes and development of computer networking |
![]() | Identify common types of networking hardware |
![]() | Describe how networking software operates |
![]() | Understand when popular networking protocols are used |
![]() | Define network routing and describe the purpose of popular routing protocols |
Module 2: Configuring Basic Linux Networking
![]() | Describe how networking devices differ from other Linux devices |
![]() | Configure Linux networking using scripts and text-mode utilities |
![]() | Configure Linux networking using popular graphical utilities |
![]() | Effectively use networking utilities to test a network and troubleshoot networking problems |
![]() | Understand the IPX and AppleTalk protocols |
Module 3: Configuring Client Services
![]() | Configure DNS name solution |
![]() | Configure dial-up network access using PPP |
![]() | Understand client services such as DHCP and LDAP |
![]() | Use remote graphical applications and remote dial-up authentication |
![]() | Use common clients tools such as Linux Web browsers and email clients |
Module 4: Using Simple Network Services
![]() | Configure “Superservers” to handle multiple network services |
![]() | Set up administrative services like logging and printing |
![]() | Use simple network information services like finger and talk |
![]() | Understand basic mailing list and news server configurations |
Module 5: Configuring File Sharing Services
![]() | Configure an FTP server for anonymous or regular users |
![]() | Set up NFS file sharing between Linux and UNIX systems |
![]() | Understand NetWare NCP based file sharing |
![]() | Use SMB to share files and printers with Windows based Pcs |
Module 6: Configuring Major Network Services
![]() | Expand the routing capabilities of your Linux server |
![]() | Set up your own DNS name server |
![]() | Configure a basic email server |
![]() | Understand how Linux can excel as a Web server |
Module 7: Security, Ethics and Privacy
![]() | List security risks typical in modern networked computer systems |
![]() | Understand how to assess risk and create a security policy |
![]() | Describe the function of top security-awareness organizations |
![]() | Outline the role of the government in security and privacy |
![]() | Locate Linux products designed especially for security-conscious environments |
Module 8: Making Data Secure
![]() | Explain commonly used cryptographic systems |
![]() | Understand digital certificates and certificate authorities |
![]() | Use the PGP and CPG data-encryption utilities |
![]() | Describe different ways in which cryptography is applied to make computer systems more secure. |
Module 9: User Security
![]() | Follow good password security practices |
![]() | Understand Linux Pluggable Authentication Modules (PAM) |
![]() | Use Common utilities to promote user security |
![]() | Set up user access to system administration tasks with sudo |
Module 10: File Security
![]() | Correctly set up special Linux file permissions |
![]() | Monitor log files to check for suspicious system activity |
![]() | Automate checks for file integrity and unauthorized modifications |
Module 11: Linux Networking Fundamentals
![]() | Summarize the types of network security breaches that crackers attempt |
![]() | Describe how to use special routing techniques to protect local network traffic |
![]() | Configure a basic Linux firewall |
![]() | Use networking utilities and techniques that protect network traffic through encryption |
Module 12: Network Intrusion Detection
![]() | Use network scanning and packet-sniffing utilities |
![]() | Understand basic intrusion detection systems |
![]() | Perform automated security audits of your Linux system |
No comments:
Post a Comment