Set up a Docker of Vagrant-based lab where you set up your own network and topologies to learn, with a final case study on setting up a secure (!) VPC on AWS.
- IP addresses
- sub-nets and CIDR
- IPv6
- Ports
- Host names
- All the files (/etc/hosts and so forth)
- Tools to know
- dig
- ltr (linux traceroute)
- nmap -- port scanner w/stack signature
dhcp leases ACL / roles / users / groups
- iptables
- portscanners / other tools
- SSH
- HTTPS / TLS
- how to get a certificate
- An aside on Regexs for system administration
- Load balancing
- Reverse proxy
- Configuring a cert
Docs for 1.5 (latest stable): http://cbonte.github.io/haproxy-dconv/configuration-1.5.html
Load Balancing examples: https://serversforhackers.com/load-balancing-with-haproxy https://www.digitalocean.com/community/tutorials/an-introduction-to-haproxy-and-load-balancing-concepts
Reverse Proxy examples: http://oskarhane.com/haproxy-as-a-static-reverse-proxy-for-docker-containers/ https://github.com/foosel/OctoPrint/wiki/Reverse-proxy-configuration-examples http://www.javacodegeeks.com/2015/07/using-haproxy-as-a-reverse-proxy-for-aws-microservices.html
package managers (apt, etc, sources)
availability and discovery agents tripwire (etc) netcat (swiss army knife for sysadmins) open
config (ansible, puppet, cfengine)
elastic provisioning and autoscaling pods/kubernetes configuring ubuntu
graphite statsd new relic
latency (etc)
- Application security
- OAuth