If sections are removed, split up (new sections or new chapters added), or if you need to reorder the book, please make changes here.
Note: be careful with changes (as with rest of the book) because the printed book PDF is generated from this.
This page may be used to document which sections need help. A list of topics needing someone to sign up is here.
Chapter Introduction
Using the BSDA Study DVD
- Introduction
- Installing FreeBSD with Qemu and Aqemu
- Preparing the FreeBSD system for Qemu
- Using Qemu from the command line
- Using Aqemu for Virtualization
- Networking QEMU Virtual BSD Systems
Chapter Installing and Upgrading the OS and Software
- Recognize the installation program used by each operating system
- Recognize which commands are available for upgrading the operating system
- Understand the difference between a pre-compiled binary and compiling from source
- Understand when it is preferable to install a pre-compiled binary and how to do so
- Recognize the available methods for compiling a customized binary
- Determine what software is installed on a system
- Determine which software requires upgrading
- Upgrade installed software
- Determine which software have outstanding security advisories
- Follow the instructions in a security advisory to apply a security patch
Chapter Securing the Operating System
- Determine the system's security level
- Recognize basic recommended access methods
- Configure an SSH server according to a set of requirements
- Configure an SSH server to use a key pair for authentication
- Preserve existing SSH host keys during a system upgrade
- Recognize alternate authentication mechanisms
- Recognize alternate authorization schemes
- Recognize BSD firewalls and rulesets
- Recognize the BSD utilities that shape traffic or control bandwidth
- Recognize BSD mechanisms for encrypting devices
- Recognize methods for verifying the validity of binaries
- Recognize the BSD methods for restraining a service
- Modify the system banner
Chapter Files, Filesystems and Disks
- Mount or unmount local filesystems
- Configure data to be available through NFS
- Determine which filesystems are currently mounted and which will be mounted at system boot
- Determine disk capacity and which files are consuming the most disk space
- Create and view symbolic or hard links
- View and modify ACLs
- View file permissions and modify them using either symbolic or octal mode
- Modify a file's owner or group
- Backup and restore a specified set of files and directories to local disk or tape
- Backup and restore a file system
- Determine the directory structure of a system
- Manually run the file system checker and repair tool
- View and modify file flags
- Monitor the virtual memory system
Chapter Users and Accounts Management
- Protect authentication data
- Create, modify and remove user accounts
- Create a system account
- Control which files are copied to a new user's home directory during account creation
- Change a password
- Change the encryption algorithm used to encrypt the password database
- Change a user's default shell
- Lock a user account or reset a locked user account
- Determine identity and group membership
- Determine who is currently on the system or the last time a user was on the system
- Enable accounting and view system usage statistics
Chapter Basic System Administration
- Determine which process are consuming the most CPU
- View and send signals to active processes
- Use an rc(8) script to determine if a service is running and start, restart or stop it as required
- Configure a service to start at boot time
- View and configure system hardware
- View, load, or unload a kernel module
- Modify a kernel parameter on the fly
- View the status of a software RAID mirror or stripe
- Configure system logging
- Configure log rotations
- Review log files to troubleshoot and monitor system behavior
- Determine which MTA is being used on the system
- Create or modify email aliases for Sendmail or Postfix
- View the Sendmail or Postfix mail queue
- Read mail on the local system
- Understand basic printer troubleshooting
- Halt, reboot, or bring the system to single-user mode
- Recognize the difference between hard and soft limits and modify existing resource limits
- Recognize common, possibly third-party, server configuration files
- Configure the scripts that run periodically to perform various system maintenance tasks
- Determine the last system boot time and the workload on the system
- Monitor disk input--output
- Deal with busy devices
- Determine information regarding the operating system
- Understand the advantages of using a BSD license
Chapter Network Administration
- Determine the current TCP--IP settings on a system
- Set a system's TCP--IP settings
- Determine which TCP or UDP ports are open on a system
- Verify the availability of a TCP--IP service
- Query a DNS server
- Determine who is responsible for a DNS zone
- Change the order of name resolution
- Convert a subnet mask between dotted decimal, hexadecimal or CIDR notation
- Gather information using an IP address and subnet mask
- Understand IPv6 address theory
- Demonstrate basic tcpdump(1) skills
- Manipulate ARP and neighbor discovery caches
- Configure a system to use NTP
- View and renew a DHCP lease
- Recognize when and how to set or remove an interface alias
Chapter Basic Unix Skills
- Demonstrate proficiency in using redirection, pipes and tees
- Recognize, view and modify environmental variables
- Be familiar with the vi(1) editor
- Determine if a file is a binary, text, or data file
- Locate files and binaries on a system
- Overcome command line length limitations
- Find a file with a given set of attributes
- Create a simple Bourne shell script
- Find appropriate documentation
- Recognize the different sections of the manual
- Verify a file's message digest fingerprint (checksum)
- Demonstrate familiarity with the default shell
- Use job control
- Demonstrate proficiency with regular expressions
- Understand various "domain" contexts
- Configure an action to be scheduled by cron(8)