Chapter One
Chapter One
○ Objectives:
• To explore the fundamental functions
and structures of various operating
systems.
• To understand the key differences
and use cases of Unix-like and
Windows systems.
○ Goals:
• Hold file system hierarchies and the
importance of Linux distributions.
• Learn essential and advanced Linux
commands for effective system Key Word
management.
System Administration
Sys Admin Network Administration NAME OR LOGO 2
Remember the following basic topics
○ Compatibility Issues:
Software and hardware may • Security Vulnerabilities: Cybersecurity
not work seamlessly across threats that can exploit OS weaknesses,
different OS platforms. highlighting the need for regular updates
and patches.
○ Learning Turn: Users • Resource Management: Efficiently
transitioning from one OS to allocating CPU, memory, and storage can
another may face significant be complex, especially in multi-user
hurdles in adapting. environments.
• Regular System Updates: Ensure the system is running the latest patches to
mitigate vulnerabilities.
• Data Backup Strategies: Implement automated backups and use cloud storage
solutions to safeguard data.
• User Education: Provide training on recognizing phishing attacks, malware, and safe
browsing practices.
• System Monitoring: Utilize tools for performance monitoring and logging to
preemptively address issues.
Features:
• Stability and Performance: Highly reliable for server
environments.
• Security: Strong user permissions and access controls.
• Modularity: Easy to customize and extend functionalities
through various tools and applications.
Key Features:
Graphical User Interface (GUI): In-built and accessible, making it popular
for non-technical users.
Software Compatibility: Vast library of applications, from productivity tools to
games.
Gaming Capabilities: Strong support for gaming hardware and software.
Strengths of Windows:
• User-Friendly: More accessible for beginners and non-technical users.
• Widespread Adoption: Extensive community support and a large knowledge
base.
Weaknesses:
Unix-like: Sudden learning curve, especially for users unfamiliar with CLI.
Windows: More frequent targets for malware and security breaches.
A Linux distribution (distro) is a complete operating system built around the Linux kernel,
bundled with software and libraries.
Popular Distributions:
Ubuntu: Known for ease of use and community support; ideal for newcomers.
Fedora: Focuses on innovation and includes the latest features and technologies.
CentOS: A stable, enterprise-focused distribution derived from Red Hat Enterprise Linux.
Arch Linux: Targeted at advanced users who prefer a DIY approach to system
customization.
○ User account management best practices ○ What are user accounts management tools
• Principle of Least Privilege • User accounts management tools are designed to help
streamline your Active Directory account management
• Data Ownership and make your account management as safe as
• Ongoing Monitoring and Adjustments possible
○ How does the user management software in ○ Why is user access control important
SolarWinds Access Rights Manager (ARM) work? • User access control is important to helping ensure
• SolarWinds Access Rights Manager (ARM) is built to system security. Without a smart approach to user
provide a centralized access management tool for account management, your system can easily become
efficient user account management. When you invest compromised by a user who has access to top-secret
in ARM, you can gain access to a highly intuitive, data, or by a cyber attacker who gets ahold of overly
visual tool that can allow you to quickly view and permissive access credentials.
adjust user credentials.
Sys Admin NAME OR LOGO 17
Hardware Management
What is Hardware Management ?
Is a set of applications that manage the lifecycle of all IT assets, such as desktop computers,
laptops, mouse devices, servers, printers, from acquisition to disposal.
○ Evaluation of Software
○ Installation
○ Security
○ Capacity
• Disk, RAM, CPU, Network
○ Security
• Password
• Break-ins
○ System logs
• Examination
• Periodic rotation and truncation
○ Often requires
• Broad and through system knowledge
• Outside experts
• Luck
○ Expediency (Practicality)
o Software
o Install media (or download location)
o Installation, build, and configuration details
o Patches installed
Local Documentation o Acceptable use policies
Sys Admin ○ People think of sysadmins only when things don’t work NAME OR LOGO 27
The system administrators code of ethics
Ethics Morals
○ The Principles of conduct that ○ Proclamation of what is right and
governs a group of people good
○ Probably too late to help much
here