Sysad Reviewer 2
Sysad Reviewer 2
Administration
Rodelio M. Liwag
System Administration
1
System Administration
2
System Administration
4
System Administration
5
System Administration
7
System Administration
9
System Administration
13
employees, the four administrative roles are held by
different people or groups of people. Everybody
NEEDS a sys admin.
System Administration
Rodelio M. Liwag
System Administration
Types of Certifications
Vendor Neutral Certifications. – Certifications
that DO NOT target any specific hardware or
platform or vendor. Baseline certifications
that apply to ALL vendors and technologies.
CompTIA A+
CompTIA Network+
CompTIA Server+
CompTIA Linux+
2
System Administration
Types of Certifications
Anyone wanting to get into IT should tackle
CompTIA A+ and CompTIA Network+ first.
These will give you a solid foundation that
you can work on. And later on, narrow your
scope to specific fields.
3
System Administration
Types of Certifications
4
System Administration
Types of Certifications
5
System Administration
Types of Certifications
6
System Administration
Types of Certifications
Microsoft has some of the more popular Systems
Administration certifications a lot of organizations
run Windows. Windows 8, 10, 11 on the client
side. And Windows Server in their data center.
Microsoft Certified
professional
Microsoft Technology
Associate
Microsoft Certified Solutions
Associate
Microsoft Certified Solutions
Expert
Microsoft Certified Solutions 7
System Administration
Types of Certifications
8
System Administration
Types of Certifications
9
System Administration
Types of Certifications
Microsoft Certified Solutions Expert. (MCSE) –
You just need to pass a single exam from a
list of exams within a role. Those list of exams
are known as electives and are usually very
specific, focusing on a single technology. You
pass one of those, you become an MCSE (for
a year). You’d be given a fancy Microsoft
Badge.
10
System Administration
Types of Certifications
Linux Essentials
LPIC-1 Certified
Administrator
LPIC-2 Certified Engineer
Red Hat Certified Systems
Administrator.
10
System Administration
Types of Certifications
Types of Certifications
12
Systems
Administration
(Part 3)
Rodelio M. Liwag
System Administration
1
System Administration
Types of Servers
Servers. –There are many types of
servers in a data center. Rack servers,
Tower servers, Blade servers. All
these different types of enclosures Blade Server
Server Types
File Servers
Web Servers
Database Servers
Application Servers
Print Servers
Mail Servers
Virtualization Servers
4
System Administration
Server
The definition of a server and the purpose of a
server is to provide network services to its
users, to software and applications and to other
servers within its environment.
Server
A server can be dedicated to a single role (ideal),
oftentimes, you’ll see a server takes on multiple
role. An example would be a file server, that is also
an email and a web server. These are known as
multi purpose multi faceted servers.
System Administration
File Servers
The most popular type of server that you’ll
find in every environment and oftentimes
multiples in every environment is the File
Server.
This type of server is used to store content
for everybody. Users store their files.
Developers store their applications and
websites and the Administrators store
things like utilities and tools and backups.
Another big responsibility of a SysAdmin is
managing the storage devices that lives
underneath the file server. This is what is
known as the storage subsystem.
6
System Administration
Web Servers
Another popular type of server
you’d find in most organizations
today are Web Servers.
Database Servers
8
System Administration
Application Servers
Application Servers are used to host the
middle-tier components of an
application.
Print Servers 10
Print servers are used to expose printers
to the network so everyone can use
them. And it also gives the ability to
centrally manage the printers, the
drivers associated with them and the
print jobs that are running on them.
Mail Servers
11
System Administration
Virtualization Servers
12
Systems
Administration
(Part 4)
Rodelio M. Liwag
Storage Devices
Storage Devices 1
Another very important piece
hardware that Systems Administrator is
of
responsible for are Storage Devices.
And they are arguably just as important
as servers mainly because they are
usually attached to them.
This is a look at the many types of
storage devices available to Systems
Administrator like HDDs, SSDs, DAS,
NAS, SAN and also the technologies that
drives these devices and where they fit in
a network topology.
2
Storage Devices
Locally Attached Storage
Hard Disk Drives (HDD) have been
around forever since the 1950s so
they are ancient technology.
A common configuration in
desktops and laptops is to use SSD
as system or boot drive for
operating system and installed
applications. The larger capacity
HDDs is used for everything else.
Direct-Attached
Storage (DAS)
Network-
Attached
Storage (NAS)
Storage Area Network
(SAN)
5
Storage Devices
Direct-Attached Storage
Direct-Attached Storage (DAS)- Is a low-
cost, low maintenance solution, where a
storage subsystem is either a part of or,
directly attached to, the servers.
Rodelio M. Liwag
Networking
2.Viruses: Computer viruses are programs that attach themselves to legitimate files and replicate when those files are executed.
They can spread from one computer to another through infected files or email attachments.
3.Worms: Worms are self-replicating programs that can spread across networks and systems without any user intervention.
They can consume network bandwidth and degrade system performance.
4.Trojans (Trojan Horses): Trojans appear to be legitimate software but contain malicious code. They can create backdoors for
hackers, steal sensitive data, or carry out other harmful actions.
5.Ransomware: Ransomware encrypts a user's files or entire system, making them inaccessible. Attackers demand a ransom
from the victim to provide the decryption key.
6.Spyware: Spyware is designed to secretly collect information about a user's activities, such as browsing habits, keystrokes,
and login credentials. This information is then sent to third parties without the user's consent.
7.Adware: Adware displays unwanted advertisements to users and often comes bundled with legitimate software. While not as
malicious as other threats, it can be annoying and impact system performance.
8.Phishing: Phishing attacks involve tricking users into revealing sensitive information like passwords, credit card numbers, or
personal data by posing as a trustworthy entity via email, websites, or other means.
1.Social Engineering: Social engineering attacks manipulate individuals into revealing confidential information or performing
actions that compromise security. These attacks often exploit human psychology rather than technical vulnerabilities.
2.Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks: DoS attacks overload a system or network to make
it unavailable to users. DDoS attacks involve multiple compromised systems attacking a target simultaneously to overwhelm it.
3.Zero-Day Exploits: These are attacks that target vulnerabilities in software or hardware that are not yet known to the vendor or
have not been patched. They are called "zero-day" because there are zero days of protection before a fix becomes available.
4.Insider Threats: Insider threats occur when individuals within an organization misuse their access to compromise systems, steal
data, or engage in other malicious activities.
5.Botnets: Botnets are networks of compromised computers, known as "bots" or "zombies," controlled by a central entity. They are
often used for activities such as spam distribution, DDoS attacks, or cryptocurrency mining.
6.Rootkits: Rootkits are stealthy forms of malware that gain unauthorized access to a system and modify its operating system to
hide their presence. They are difficult to detect and remove.
7.Drive-By Downloads: These attacks occur when a user unintentionally downloads malicious software while visiting a
compromised website or clicking on a deceptive link.
Malware, short for "malicious software," refers to any software or code
intentionally designed to harm, exploit, or compromise computer systems,
networks, and user data. Malware can take various forms and serve
different malicious purposes. Here are some common types of malware:
1.Viruses: Viruses are malicious programs that attach themselves to legitimate files or programs and can replicate when those files
are executed. They are designed to spread from one computer to another, often causing damage or corruption of files and
applications.
2.Worms: Worms are self-replicating malware that can spread across networks and systems without user intervention. They
typically exploit vulnerabilities in network services to propagate and can consume network bandwidth and slow down system
performance.
3.Trojans (Trojan Horses): Trojans disguise themselves as legitimate software or files to deceive users into installing them. Once
activated, they can perform various malicious actions, such as creating backdoors, stealing data, or spying on the victim.
4.Ransomware: Ransomware encrypts a user's files or entire system, making them inaccessible. Cybercriminals then demand a
ransom payment in exchange for the decryption key. Ransomware attacks can lead to data loss and financial damage.
5.Spyware: Spyware secretly monitors a user's activities and collects information, such as keystrokes, login credentials, and
browsing habits. This stolen information is often sent to third parties without the user's knowledge or consent.
6.Adware: Adware displays unwanted advertisements to users, often in the form of pop-up ads or banners. While not as malicious
as other malware types, adware can be intrusive and negatively affect system performance.
1.Keyloggers: Keyloggers record a user's keystrokes on their keyboard, capturing sensitive data like passwords and
credit card numbers. Cybercriminals can then use this information for fraudulent purposes.
2.Botnets: Botnets are networks of compromised computers, often controlled by a central entity or hacker. They can be
used for various malicious purposes, including sending spam emails, launching Distributed Denial of Service (DDoS)
attacks, or mining cryptocurrencies.
3.Rootkits: Rootkits are stealthy malware that gain unauthorized access to a system and modify its operating system to
hide their presence. Rootkits are challenging to detect and remove, making them especially dangerous.
4.Backdoors: Backdoors are hidden entry points into a system, allowing unauthorized access. They are often created
by malware or malicious actors to maintain access to a compromised system.
5.Fileless Malware: Fileless malware operates in memory and doesn't rely on traditional files or executables. This
makes it harder to detect using traditional antivirus methods.
6.Polymorphic Malware: Polymorphic malware can change its code or appearance each time it infects a new system,
making it difficult for antivirus programs to identify and remove.