DistributedNetworks DistributedNetworks

DistributedNetworks Resources   «Prev  Next»

Distributed Networks Resources

Welcome to the Distributed Networks Resources Page.
The following page is intended to give you all the resources that you need for this course.
Return to DistributedNetworks for more information on
  1. Active Directory Administration
  2. Advanced Unix Concepts
  3. Unix Shell Programming
  4. Basic Unix Shell Scripts
  5. Installing/Confinguring Windows Networking
  6. Linux Network Administration
  7. Linux Unix System Administration
  8. Network Security and Firewalls
  9. Admin/Network Engineer Interview Questions

Creating a central repository of all the information on networks, IP addresses and hosts alike, has become mission critical to maintaining control of the network. The challenge with the tools traditionally available is that there is a different tool or system for each category of devices: one system to track virtual machines, one system to track wireless users, one system to track Windows servers, one system to track Linux machines, etc. Today’s enterprise needs a single repository where all the data relevant to networks, hosts, servers, dynamic clients, and virtual environments can be tracked and synchronized. The ability to search across all this information enables network teams to quickly allocate and track ever-growing network landscapes and enable better and faster troubleshooting of issues as they arise. In addition, real business data related to a network resource helps bind together the logical network construct and the reality of enterprise IT resources.

Finding distribution-specific security resources

Most major Linux distributions have resources devoted to helping you secure Linux and keep up with security information that is specifi c to that version of Linux. Here are a few online resources that focus on security for several Linux distributions:
Red Hat Enterprise . Linux and Fedora security: Check the Red Hat Security site (www.redhat.com/security) for RHEL security issues (that typically relate to Fedora systems as well). From here you can look for and read about available updates. You can also get information on security training and consulting from Red Hat, Inc. For Fedora security issues, see the Fedora Wiki (http://fedoraproject.org/wiki/ Security/Features).
Refer to the Red Hat Enterprise Linux 4 Security Guide for an in-depth look at Linux security for Red Hat systems. You can access this guide online from the following address:
RedHat 7 Product Documentation