Foundation (almost CCNA, NP knowledge is sufficient)
linux Enterprise common services (such as DNS, HTTP, FTP, mail, NFS, etc.)
linux Enterprise-class security principles and prevention techniques (System performance/security, security threat model, and protection methods
iptables security Policy build
P style= "LINE-HEIGHT:1.5EM;" >shell script advanced (mainly with some applications, write some cases)
Watching Todd's CCNA study guide recently saw a bit of confusion about NAT conversion. Watched a few heroes after the analysis of the parameters in IP Nat, this side also wrote their own shallow understanding of IP NAT syntax.See IP nat inside again | Outside Source | Destination list X pool Y, then want to inside/outside what is the difference, source/destination and what role.Now it's easy to understand: 1:inside representative inside-outside,out
way to learn the 4th.5 , text-processing commandsSort, tr, cut, paste, uniq, tee, etc., must learn, is also combined with the 3rd time to learn.6 , DatabasePrefer MySQL, don't ask me why not learn SQL Server and Oracle, because Linux is most definitely mysql. Additions and deletions to learn, especially to learn to check, other aspects may not be necessary, because operations and maintenance personnel use the most or check, which optimization and development statements will not let you get.7 ,
learn the 4th. 5, Text processing commands, sort, tr, cut, paste, uniq, tee, etc., must learn, is also combined with the 3rd time to learn. 6, the database, the preferred MySQL, don't ask why I do not learn SQL Server and Oracle, because Linux is used to be the most absolute MySQL, adding and removing changes must learn, especially to learn to check, other aspects may not be necessary, because the operation and maintenance personnel use the most or check, What optimization and development state
the 3rd study will be the way to learn the 4th. 5, Text Processing command sort, tr, cut, paste, uniq, tee, etc., must learn, is also combined with the 3rd time to learn. 6, the database preferred MySQL, do not ask why I do not learn SQL Server and Oracle, because Linux is most definitely mysql. Additions and deletions to learn, especially to learn to check, other aspects may not be necessary, because operations and maintenance personnel use the most or check, which optimization and developme
-a
Step 1: First, we need to download the Cisco Packet Tracer.To download Packet Tracer from the official website, we need to hold a token, log in to Cisco Netspace, and then select CCNA > Cisco Packet Tracer from the offering menu to start the download. If we don't have a token, we can get it from the link below and I've uploaded it to droppox.Official site: https://www.netacad.com/Most people don't download packet Tracer tokens, and for that r
I. How to learn LinuxFirst stage: Primary stageLinux Basics, basic commands (origin, composition, common commands such as CP, LS, file, mkdir, etc.)Linux Users and Permissions basicsLinux efficient text, file processing commands (vim, grep, sed, awk, find, etc.)Get Started with Shell scripting (learn while you practice)Second Stage: Intermediate advancedIntermediate levels need to be fully aware of the principles and Fundamentals of Linux, the upper layer of applications and services in-depth st
detail, in addition to analysis of the system in the identification and analysis of bottlenecks in the process, Finally, how to use performance measurement tools, and how to adjust the system's 4 subsystems, so that the system to the optimal state of the different work environment. " Linux performance optimization Master "suitable for the vast number of Linux users in-depth study, and suitable for computer professional undergraduate, master and other professional students study reference.
Now the mood is uneasy.Think of oneself is about to enter the middle age, but has been doing network maintenance, no prospects, every day in the same work, the heart of the extremely tired. Commuting to the children, cooking, tutoring the children in the evenings, and worrying about the inability to work during the day.No programming capability of operation is really a lot of Nai, a small program is required to develop, in the big data of the internet today, do not understand the programming, bu
about the result of a command execution as another command. Parameters the process of displayingUniversal Format $ () or anti-quote "' (~ the quote below)* Note the use of anti-quoteFor example , create a file with the current time as a filename in the/tmp/directorytouch/tmp/$ (Date +%y-%m-%d-%h-%m-%s)Bash -supported quotes1 " anti-quote function command substitution2 "' Single quote strong reference but variable not replaced 3 ' "" Double reference variable substitution 2.8 File name wildcar
privileged mode, you must set a privileged mode password or configure telnet user rightsConfigure the Vty line login password and enable global password encryptionLog on to the router with the Telnet command to seeDisplay current configuration informationPC0 setting 192.168.1.2255.255.255.0192.168.1.1Router0 configuration router>enablerouter#conftrouter (config) #inter f0/0 //Unlike switches, the router's port number defaults from 0 onwards router (config-if) #ip address192.168.1.1255.255.255.
I am engaged in LAN maintenance, and gradually found that their platform, as well as the salary has a great limitation, perhaps it is their own mastery of the technology is not perfect ...On and off the Cisco knowledge, although the previous period of time to obtain the CCNA certificate, but the follow-up study did not catch up in time,Before learning, back to forget, had to start from scratch, from scratch, hope not too late!The study process to publ
manager of a company's research and development ....Specialty:arithmeticE-Mail:qq:36612148BLOG:
--------------------------------------------------------------------------------Member_name:jerryIntroduce: Just started self-study Java EE engaged in mobile Billing project, and later turned to Pentaho Open source BI project, delve into Data Warehouse, KPI, Enterprise Portal solution,
Later engaged in search engine technology, is currently a search engine Company core Engineers ... Very familiar wit
the way to learn the 4th.5. Text Processing commandsSort, tr, cut, paste, uniq, tee, etc., must learn, is also combined with the 3rd time to learn.6. DatabasePreferred MySQL, do not ask why I do not learn SQL Server and Oracle, because Linux is used to be the most absolute MySQL, additions and deletions to learn, especially to learn, and other aspects may not be necessary, because operations and maintenance personnel use the most or check, which optimization and development statements will not
direction refinement.First stage: Beginner's entryThe initial stage needs to make the Linux learning route clear, any learning is gradual, so learning Linux is also necessary to have a certain route.Individual suggested courses of study are as follows:Beginner's entry:1. Linux basic knowledge, basic commands (origin, composition, common commands such as CP, LS, file, mkdir and other common operation commands)2. Linux Users and Permissions Foundation3, Linux system process management advanced4,
Tags: telnet system software copy ssh Evel desktop CHM etc Sub-directory10.grep is a powerful text search tool in Linux systems. The main purpose is to search for key instructions, data, regular expressions, and so on.11. Open the soft keyboard: ctrl+alt+t, input onboard, if not installed this soft keyboard program, directly to the graphics library download: onboard sudo apt-get install onboard, or sudo yum install onboard.12.Linux allows the command execution result to be redirected to a file;
learned CCNA friends may be more studious, because iptables also have NAT table, the principle is the same, and the FILTER table with the most, anyway, not to learn is certainly unqualified. 8, monitoring tools is very important, I personally suggest that the best to learn these 3, Cacti,nagios,zibbix, enterprises should use the most should be nagios and Zibbix, anyway, learn it! But Nagios is a bit difficult because it involves automatic monitoring
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.