What will you learn in the training?
- Introduction to HTTPD Web Server
- Launching EC2 Instance
- Apache HTTPD Software
- HTTPD Protocol
- IP Address and Resources
- Installing HTTPD
- Creating Webpage
- Webserver Configuration
- Starting the HTTPD Webserver
- Public IP and Document Root Folder
- Public IP and Document Root Folder
- Installation of Net-Tools
- HTTPD Configuration File
- Working with Directories
- CLI and Browser Commands
- Managing Access
- User-Agent and DDOS
- Log File Management
- Controlling Document Root
- HTTPD User-Agent and Variables
- Setting Up Roles
- Access Control Lists
- Request URI Keyword
- Creating Forms and Query Strings
- Inline and Block Concepts
- Using PS Command
- Process Control with PGRP and Kill Command
- Source Code Access Control
- Log Management and Automation
- Understanding Modular Concepts
- Apache Module List
- Configuration and Static Modules
- Authentication and Mod_Authz_Basic Module
- Secure Data Directory
- Authentication Providers
- Access Logs and Root User
- SELinux and Audit Log
- Accept Filter Directive
- Encryption and User Directory Management
- Virtual Hosting and DNS
- HAProxy Overview
- Features and High Availability
- Security Considerations
- Launching EC2 Instance for HAProxy
- Installation and Configuration
- Working with Backend Servers
- Load Balancing Algorithms
- SSL/TLS and Statistics
- Single Point of Failure
- Scaler Load Balancer and ACL
- DNS Health Checking
- Virtual IP and Keepalive Program
- Setting Up Static IP Address
- Network Teaming and Redundancy
- DNS Server Configuration
Configuring Authoritative and Slave DNS Servers
- Introduction to MySQL
- MySQL Workbench and Installation
- Database Design and Normalization
- Creating Tables and Joins
- MySQL Data Types and Functions
- User Management and Access Control
- Backup and Restore using Mysqldump
- In detailed researches dedicated to SSL, TLS and HTTPS
- In depth of the certificates of some popular websites
- Difference between HTTP and HTTPS
- Analyzing traffic using tcpdump
- Symmetric Key Encryption
- Symmetric Key Encryption Algorithms
- Hashing in detailed
- MD5 hashing algorithm
- SHA hashing algorithm and HMAC in depth
- Asymmetric keys in detailed
- Encryption using asymmetric keys
- Signing data using asymmetric keys
- RSA in depth
- PKI – Public Key Infrastructure in detailed
- Public and private keys intro
- Generate your first private key
- Digital signatures
- Certificates – web server side
- Certificates – browser side
- Create your first certificate request
- Self sign your certificate
- Installing OpenSSL
- Using OpenSSL for RSA keys generation
- Exploring certificate of Google
- Root CA and root certificates in the OS
- How Chain of Trust is built
- Verifying chain of certificates
- Verifying SSL certificate and certificates chain
- PKI, Chain of trust and certificates summary
- Certificate domain scopes
- Discussion on the SSL and TLS
- History and versions of the SSL and TLS
- Why RSA is not used for data encryption in HTTPS
- How TLS session is established
- Analyzing TLS session setup using Wireshark
- In depth of cipher suites
- Encryption key generation by the web browser
- Delivering encryption key using Diffie Hellman key exchange
- Diffie Hellman in detailed
- Modulus operation
- Diffie Hellman algorithm
- Elliptic Curve Cryptography in depth
- CSR – Certificate Signing Request
- Generate Self-Signed certificate using OpenSSL
- Self-signed certificate overview
- Create self-signed certificate