Introduction |
|
1 | (4) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
Book 1 Getting Started With Networking |
|
|
5 | (84) |
|
Chapter 1 Welcome to Networking |
|
|
7 | (16) |
|
|
8 | (2) |
|
Delving into Network Lingo |
|
|
10 | (1) |
|
Why Bother with a Network? |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
Dedicated Servers and Peers |
|
|
14 | (1) |
|
What Makes a Network Tick? |
|
|
15 | (1) |
|
Putting the Pieces Together |
|
|
16 | (2) |
|
|
18 | (1) |
|
It's Not a Personal Computer Anymore! |
|
|
18 | (2) |
|
The Network Administrator |
|
|
20 | (3) |
|
Chapter 2 Network Infrastructure |
|
|
23 | (16) |
|
Introducing Infrastructure |
|
|
24 | (1) |
|
Understanding Network Protocols and Standards |
|
|
25 | (1) |
|
Recognizing Network Topology |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
Patch panels and patch cables |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
Perusing Ports, Interfaces, and MAC Addresses |
|
|
33 | (2) |
|
|
35 | (2) |
|
|
37 | (1) |
|
Dealing with Broadcast Packets |
|
|
38 | (1) |
|
Examining Wireless Networks |
|
|
38 | (1) |
|
Chapter 3 Switches, Routers, and VLANs |
|
|
39 | (16) |
|
|
40 | (3) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
Looking Deeper into Switches |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
Managed and unmanaged switches |
|
|
49 | (1) |
|
|
50 | (2) |
|
Network address translation |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (2) |
|
|
55 | (12) |
|
But We're a Small Business --- Do We Need Security? |
|
|
56 | (1) |
|
The Two Pillars of Cybersecurity |
|
|
57 | (1) |
|
|
57 | (2) |
|
|
59 | (2) |
|
|
61 | (1) |
|
The NIST Cybersecurity Framework |
|
|
62 | (5) |
|
Chapter 5 Servers and Virtualization |
|
|
67 | (12) |
|
Understanding Network Operating Systems |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
What's Important in a Server |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
Components of a Server Computer |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
Considering Server Form Factors |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
Considering Virtualization |
|
|
77 | (2) |
|
Chapter 6 Cloud Computing |
|
|
79 | (10) |
|
Introducing Cloud Computing |
|
|
79 | (1) |
|
Looking at the Benefits of Cloud Computing |
|
|
80 | (2) |
|
Detailing the Drawbacks of Cloud Computing |
|
|
82 | (1) |
|
Examining Three Basic Kinds of Cloud Services |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
Public Clouds versus Private Clouds |
|
|
85 | (1) |
|
Introducing Some of the Major Cloud Providers |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
87 | (2) |
|
Book 2 Understanding Network Protocols |
|
|
89 | (146) |
|
Chapter 1 Network Protocols and Standards |
|
|
91 | (24) |
|
|
91 | (2) |
|
|
93 | (1) |
|
Seeing the Seven Layers of the OSI Reference Model |
|
|
94 | (1) |
|
|
95 | (2) |
|
|
97 | (1) |
|
|
98 | (3) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
Following a Packet through the Layers |
|
|
104 | (1) |
|
|
105 | (2) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
The TCP/IP Protocol Suite |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (2) |
|
Other Protocols Worth Knowing About |
|
|
113 | (2) |
|
Chapter 2 TCP/IP and the Internet |
|
|
115 | (8) |
|
|
115 | (2) |
|
A Little Internet History |
|
|
117 | (1) |
|
TCP/IP Standards and RFCs |
|
|
118 | (2) |
|
The TCP/IP Protocol Framework |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
123 | (22) |
|
|
123 | (1) |
|
|
123 | (3) |
|
|
126 | (1) |
|
Working with the binary Windows Calculator |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (2) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
137 | (2) |
|
|
139 | (1) |
|
Private and public addresses |
|
|
140 | (1) |
|
|
140 | (2) |
|
Understanding Network Address Translation |
|
|
142 | (3) |
|
|
145 | (10) |
|
Considering the Usefulness of Routers |
|
|
146 | (1) |
|
Connecting to the Internet |
|
|
146 | (2) |
|
Connecting remote locations |
|
|
148 | (1) |
|
Splitting up large networks |
|
|
149 | (1) |
|
Understanding Routing Tables |
|
|
150 | (5) |
|
|
155 | (18) |
|
|
155 | (1) |
|
Configuration information provided by DHCP |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
Scopes, subnets, and VLANs |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
Working with a DHCP Server |
|
|
162 | (1) |
|
Installing a Windows Server 2019 DHCP server |
|
|
163 | (1) |
|
|
164 | (6) |
|
How to Configure a Windows DHCP Client |
|
|
170 | (2) |
|
Automatic private IP addressing |
|
|
172 | (1) |
|
Renewing and releasing leases |
|
|
172 | (1) |
|
|
173 | (34) |
|
|
173 | (1) |
|
|
174 | (2) |
|
Fully qualified domain names |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (2) |
|
|
180 | (4) |
|
Understanding DNS Servers and Zones |
|
|
184 | (1) |
|
|
184 | (2) |
|
Primary and secondary servers |
|
|
186 | (1) |
|
|
187 | (3) |
|
|
190 | (1) |
|
Understanding DNS Queries |
|
|
190 | (1) |
|
|
191 | (1) |
|
Zone Files and Resource Records |
|
|
192 | (2) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
Working with the Windows DNS Server |
|
|
199 | (1) |
|
|
200 | (3) |
|
Creating a new host record |
|
|
203 | (1) |
|
How to Configure a Windows DNS Client |
|
|
204 | (3) |
|
Chapter 7 TCP/IP Tools and Commands |
|
|
207 | (28) |
|
|
207 | (1) |
|
Using the hostname Command |
|
|
208 | (1) |
|
Using the ipconfig Command |
|
|
209 | (1) |
|
Displaying basic IP configuration |
|
|
209 | (1) |
|
Displaying detailed configuration information |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (1) |
|
Flushing the local DNS cache |
|
|
212 | (1) |
|
Using the nbtstat Command |
|
|
212 | (1) |
|
Using the netstat Command |
|
|
213 | (1) |
|
|
213 | (1) |
|
Displaying interface statistics |
|
|
214 | (3) |
|
Using the nslookup Command |
|
|
217 | (1) |
|
|
217 | (1) |
|
Using nslookup subcommands |
|
|
218 | (1) |
|
|
219 | (2) |
|
Locating the mail server for an email address |
|
|
221 | (1) |
|
Taking a ride through DNS-Land |
|
|
221 | (3) |
|
Using the pathping Command |
|
|
224 | (2) |
|
|
226 | (1) |
|
|
227 | (1) |
|
Displaying the routing table |
|
|
228 | (2) |
|
Modifying the routing table |
|
|
230 | (1) |
|
Using the tracert Command |
|
|
231 | (4) |
|
Book 3 Planning A Network |
|
|
235 | (96) |
|
Chapter 1 Local Area Networks |
|
|
237 | (16) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
239 | (2) |
|
Programs that gather information for you |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
243 | (3) |
|
Planning the Network Topology |
|
|
246 | (2) |
|
Planning the TCP/IP Implementation |
|
|
248 | (1) |
|
|
249 | (1) |
|
More Questions Your Network Plan Should Address |
|
|
250 | (3) |
|
Chapter 2 Wide Area Networks |
|
|
253 | (14) |
|
Connecting to the Internet |
|
|
253 | (1) |
|
Connecting with cable or DSL |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
Connecting with a cellular network |
|
|
257 | (1) |
|
|
257 | (1) |
|
Choosing a small office router |
|
|
258 | (1) |
|
Choosing an enterprise router |
|
|
258 | (2) |
|
Choosing a cellular router |
|
|
260 | (1) |
|
Securing Your Connection with a Firewall |
|
|
260 | (2) |
|
Providing Redundancy for Your Internet Connection |
|
|
262 | (1) |
|
Securing Connections to Remote Locations and Remote Users |
|
|
263 | (1) |
|
Connecting Remote Offices with an Ethernet Private Line |
|
|
264 | (3) |
|
Chapter 3 Server Architecture |
|
|
267 | (10) |
|
Deciding How Many Servers You Need |
|
|
267 | (1) |
|
Deciding Which Servers You Need |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
273 | (1) |
|
Virtualization management platform |
|
|
274 | (1) |
|
|
274 | (3) |
|
Chapter 4 Virtualization Architecture |
|
|
277 | (12) |
|
Understanding Virtualization |
|
|
278 | (1) |
|
Understanding Hypervisors |
|
|
279 | (2) |
|
Understanding Virtual Disks |
|
|
281 | (3) |
|
Understanding Network Virtualization |
|
|
284 | (1) |
|
Considering the Benefits of Virtualization |
|
|
284 | (2) |
|
Choosing Virtualization Hosts |
|
|
286 | (1) |
|
Understanding Windows Server 2019 Licensing |
|
|
287 | (2) |
|
Chapter 5 Storage Architecture |
|
|
289 | (12) |
|
|
289 | (2) |
|
Considering Disk Drive Types |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
291 | (1) |
|
Considering Drive Interfaces |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
295 | (2) |
|
|
297 | (1) |
|
Considering Attachment Types |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
299 | (2) |
|
Chapter 6 Backup Architecture |
|
|
301 | (18) |
|
|
302 | (1) |
|
Considering Three Basic Types of Backup |
|
|
303 | (1) |
|
Where to Back Up Your Data |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
306 | (1) |
|
A word about tape reliability |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
309 | (1) |
|
Understanding File-Based Backup |
|
|
310 | (1) |
|
Types of file-based backups |
|
|
311 | (5) |
|
Understanding Image-Based Backups and Virtualization |
|
|
316 | (1) |
|
|
316 | (3) |
|
Chapter 7 Hyperconverged Infrastructure |
|
|
319 | (12) |
|
Considering the Headaches of Traditional IT Architecture |
|
|
320 | (1) |
|
Defining Hyperconverged Infrastructure |
|
|
321 | (2) |
|
|
323 | (1) |
|
Understanding How Deduplication Works |
|
|
324 | (2) |
|
|
326 | (2) |
|
Digging into HCI Clusters |
|
|
328 | (1) |
|
Incorporating HCI Into Your Plan |
|
|
329 | (2) |
|
Book 4 Implementing A Network |
|
|
331 | (64) |
|
Chapter 1 Network Hardware |
|
|
333 | (12) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
To shield or not to shield |
|
|
335 | (1) |
|
|
335 | (1) |
|
Sometimes solid, sometimes stranded |
|
|
336 | (1) |
|
|
336 | (1) |
|
Getting the tools that you need |
|
|
337 | (2) |
|
Pinouts for twisted-pair cables |
|
|
339 | (1) |
|
Attaching RJ-45 connectors |
|
|
340 | (1) |
|
Wall jacks and patch panels |
|
|
341 | (1) |
|
Server rooms and distribution frames |
|
|
342 | (1) |
|
|
343 | (2) |
|
Chapter 2 Wireless Networks |
|
|
345 | (20) |
|
Installing a Wireless Access Point |
|
|
345 | (1) |
|
Configuring a Wireless Access Point |
|
|
346 | (1) |
|
Basic configuration options |
|
|
346 | (1) |
|
|
347 | (1) |
|
Connecting to a Wireless Network |
|
|
348 | (2) |
|
Paying Attention to Wireless Network Security |
|
|
350 | (1) |
|
Understanding wireless security threats |
|
|
350 | (4) |
|
Securing your wireless network |
|
|
354 | (5) |
|
Troubleshooting a wireless network |
|
|
359 | (6) |
|
Chapter 3 Windows Clients |
|
|
365 | (10) |
|
Configuring Network Connections |
|
|
365 | (6) |
|
|
371 | (4) |
|
|
375 | (8) |
|
Basic Mac Network Settings |
|
|
376 | (2) |
|
|
378 | (3) |
|
|
381 | (2) |
|
Chapter 5 Network Printers |
|
|
383 | (6) |
|
Configuring Network Printers |
|
|
383 | (1) |
|
|
384 | (2) |
|
Accessing a network printer using a web interface |
|
|
386 | (3) |
|
Chapter 6 Virtual Private Networks |
|
|
389 | (6) |
|
|
389 | (2) |
|
|
391 | (1) |
|
Understanding VPN Servers and Clients |
|
|
392 | (3) |
|
Book 5 Implementing Virtualization |
|
|
395 | (76) |
|
|
397 | (20) |
|
Understanding the Hyper-V Hypervisor |
|
|
397 | (1) |
|
Understanding Hyper-V Virtual Disks |
|
|
398 | (1) |
|
|
399 | (1) |
|
Getting Familiar with Hyper-V |
|
|
400 | (2) |
|
Creating a Virtual Switch |
|
|
402 | (2) |
|
|
404 | (4) |
|
Creating a Virtual Machine |
|
|
408 | (5) |
|
Installing an Operating System |
|
|
413 | (4) |
|
|
417 | (12) |
|
|
417 | (1) |
|
Getting Started with VMware Workstation Pro |
|
|
418 | (2) |
|
Creating a Virtual Machine |
|
|
420 | (7) |
|
|
427 | (2) |
|
|
429 | (16) |
|
Looking at Azure Services |
|
|
430 | (1) |
|
Creating an Azure Account |
|
|
431 | (1) |
|
Examining the Azure Portal |
|
|
432 | (1) |
|
Creating a Windows Virtual Machine |
|
|
433 | (7) |
|
Managing an Azure Virtual Machine |
|
|
440 | (2) |
|
Connecting to an Azure Virtual Machine |
|
|
442 | (3) |
|
Chapter 4 Amazon Web Services |
|
|
445 | (18) |
|
Looking at What Amazon Web Services Can Do |
|
|
446 | (1) |
|
Creating an Amazon Web Services Account |
|
|
447 | (1) |
|
Examining the Amazon Web Services Console |
|
|
448 | (2) |
|
Creating a Windows Virtual Machine |
|
|
450 | (8) |
|
Managing an Amazon Web Services Virtual Machine |
|
|
458 | (2) |
|
Connecting to an Amazon Web Services Virtual Machine |
|
|
460 | (3) |
|
Chapter 5 Desktop Virtualization |
|
|
463 | (8) |
|
Introducing Desktop Virtualization |
|
|
463 | (2) |
|
Considering Two Approaches to Desktop Virtualization |
|
|
465 | (1) |
|
Looking at VMware's Horizon View |
|
|
466 | (1) |
|
|
467 | (4) |
|
Book 6 Implementing Windows Server 2019 |
|
|
471 | (138) |
|
Chapter 1 Installing Windows Server 2019 |
|
|
473 | (16) |
|
Planning a Windows Server Installation |
|
|
473 | (1) |
|
Checking system requirements |
|
|
474 | (1) |
|
Reading the release notes |
|
|
474 | (1) |
|
Deciding whether to upgrade or install |
|
|
474 | (1) |
|
Considering your licensing options |
|
|
475 | (1) |
|
|
475 | (1) |
|
|
476 | (1) |
|
Deciding your TCP/IP configuration |
|
|
476 | (1) |
|
Choosing workgroups or domains |
|
|
477 | (1) |
|
|
478 | (1) |
|
|
478 | (1) |
|
|
478 | (1) |
|
|
478 | (1) |
|
Disconnecting UPS devices |
|
|
478 | (1) |
|
|
479 | (5) |
|
Considering Your Next Steps |
|
|
484 | (1) |
|
Adding Server Roles and Features |
|
|
484 | (5) |
|
Chapter 2 Configuring Windows Server 2019 |
|
|
489 | (10) |
|
Using the Administrator Account |
|
|
489 | (1) |
|
Using Remote Desktop Connection |
|
|
490 | (1) |
|
|
490 | (2) |
|
|
492 | (1) |
|
Using Microsoft Management Console |
|
|
493 | (1) |
|
|
493 | (2) |
|
Taking an overview of the MMC consoles |
|
|
495 | (1) |
|
|
496 | (3) |
|
Chapter 3 Configuring Active Directory |
|
|
499 | (12) |
|
|
499 | (1) |
|
Remembering the Good OI' Days of NT Domains |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
Active Directory to the Rescue |
|
|
502 | (1) |
|
Understanding How Active Directory Is Structured |
|
|
502 | (1) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
504 | (1) |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
506 | (1) |
|
Creating an Organizational Unit |
|
|
507 | (4) |
|
Chapter 4 Configuring User Accounts |
|
|
511 | (22) |
|
Understanding Windows User Accounts |
|
|
511 | (1) |
|
Local accounts versus domain accounts |
|
|
512 | (1) |
|
|
512 | (1) |
|
|
512 | (4) |
|
|
516 | (1) |
|
Changing the user's contact information |
|
|
517 | (1) |
|
|
517 | (1) |
|
|
518 | (1) |
|
Restricting access to certain computers |
|
|
519 | (1) |
|
Setting the user's profile information |
|
|
520 | (1) |
|
|
521 | (1) |
|
Disabling and Enabling User Accounts |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
523 | (1) |
|
|
523 | (1) |
|
|
524 | (1) |
|
|
525 | (1) |
|
|
526 | (1) |
|
Adding a member to a group |
|
|
527 | (2) |
|
Working with User Profiles |
|
|
529 | (1) |
|
|
529 | (1) |
|
|
530 | (2) |
|
|
532 | (1) |
|
Chapter 5 Configuring a File Server |
|
|
533 | (16) |
|
Understanding Permissions |
|
|
533 | (2) |
|
|
535 | (1) |
|
Considering Best Practices for Setting Up Shares |
|
|
536 | (1) |
|
Managing Your File Server |
|
|
537 | (1) |
|
Using the New Share Wizard |
|
|
538 | (5) |
|
Sharing a folder without the wizard |
|
|
543 | (2) |
|
|
545 | (4) |
|
Chapter 6 Using Group Policy |
|
|
549 | (12) |
|
Understanding Group Policy |
|
|
549 | (1) |
|
Enabling Group Policy Management on Windows Server 2019 |
|
|
550 | (1) |
|
Creating Group Policy Objects |
|
|
551 | (7) |
|
Filtering Group Policy Objects |
|
|
558 | (3) |
|
Chapter 7 Typing Windows Commands |
|
|
561 | (28) |
|
|
562 | (1) |
|
Opening and closing a command window |
|
|
562 | (1) |
|
|
563 | (1) |
|
|
563 | (1) |
|
|
564 | (1) |
|
|
564 | (1) |
|
|
565 | (1) |
|
|
565 | (1) |
|
|
566 | (2) |
|
|
568 | (1) |
|
|
569 | (1) |
|
|
570 | (1) |
|
|
571 | (1) |
|
|
572 | (1) |
|
|
572 | (1) |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
574 | (2) |
|
|
576 | (1) |
|
|
576 | (1) |
|
The Net Localgroup command |
|
|
577 | (1) |
|
|
578 | (1) |
|
|
579 | (1) |
|
|
579 | (2) |
|
|
581 | (1) |
|
The Net Statistics command |
|
|
581 | (1) |
|
|
582 | (1) |
|
|
583 | (1) |
|
|
583 | (2) |
|
|
585 | (1) |
|
|
586 | (1) |
|
|
587 | (2) |
|
Chapter 8 Using PowerShell |
|
|
589 | (20) |
|
|
590 | (2) |
|
Understanding PowerShell Commands |
|
|
592 | (1) |
|
|
593 | (1) |
|
|
593 | (2) |
|
|
595 | (2) |
|
|
597 | (2) |
|
|
599 | (4) |
|
|
603 | (1) |
|
|
604 | (5) |
|
Book 7 Administering Microsoft Office 365 |
|
|
609 | (58) |
|
Chapter 1 Getting Started with Office 365 Administration |
|
|
611 | (20) |
|
|
612 | (1) |
|
Considering Office 365 Plans |
|
|
613 | (2) |
|
|
615 | (1) |
|
Creating an Office 365 Tenant |
|
|
616 | (6) |
|
|
622 | (5) |
|
Resetting a User's Password |
|
|
627 | (1) |
|
|
628 | (3) |
|
Chapter 2 Configuring Exchange Online |
|
|
631 | (20) |
|
Looking at Exchange Online Recipient Types |
|
|
632 | (1) |
|
Examining the Exchange Admin Center |
|
|
633 | (3) |
|
|
636 | (2) |
|
|
638 | (1) |
|
|
639 | (3) |
|
Converting a standard mailbox to a shared mailbox |
|
|
642 | (2) |
|
Enabling or disabling mailbox apps |
|
|
644 | (1) |
|
|
645 | (2) |
|
Creating a Shared Mailbox |
|
|
647 | (4) |
|
Chapter 3 Administering Teams |
|
|
651 | (16) |
|
|
652 | (3) |
|
A Brief Look at How Teams Works |
|
|
655 | (1) |
|
|
656 | (1) |
|
|
657 | (2) |
|
|
659 | (1) |
|
Using the Teams Admin Center |
|
|
660 | (1) |
|
|
661 | (6) |
|
Book 8 Implementing Linux |
|
|
667 | (134) |
|
Chapter 1 Installing a Linux Server |
|
|
669 | (14) |
|
Planning a Linux Server Installation |
|
|
669 | (1) |
|
Checking system requirements |
|
|
669 | (1) |
|
|
670 | (1) |
|
|
671 | (1) |
|
Deciding on your TCP/IP configuration |
|
|
671 | (2) |
|
|
673 | (10) |
|
Chapter 2 Linux Administration |
|
|
683 | (32) |
|
|
683 | (1) |
|
|
683 | (2) |
|
|
685 | (1) |
|
|
685 | (1) |
|
Wait, Where's the Desktop? |
|
|
686 | (1) |
|
|
686 | (1) |
|
Getting into Virtual Consoles |
|
|
687 | (1) |
|
|
688 | (1) |
|
|
689 | (1) |
|
|
690 | (1) |
|
Understanding the file system |
|
|
691 | (1) |
|
Looking at top-level directories |
|
|
691 | (2) |
|
|
693 | (1) |
|
Using the RPM Package Manager |
|
|
694 | (1) |
|
|
695 | (1) |
|
|
696 | (2) |
|
|
698 | (1) |
|
|
699 | (1) |
|
Editing Text Files with Vi |
|
|
700 | (1) |
|
|
701 | (1) |
|
Saving changes and quitting Vi |
|
|
702 | (1) |
|
Understanding Vi's operating modes |
|
|
703 | (1) |
|
|
704 | (1) |
|
|
705 | (1) |
|
|
705 | (1) |
|
|
705 | (1) |
|
|
706 | (1) |
|
|
707 | (1) |
|
|
708 | (1) |
|
|
708 | (3) |
|
|
711 | (4) |
|
Chapter 3 Basic Linux Network Configuration |
|
|
715 | (12) |
|
Using Cockpit to Configure Network Interfaces |
|
|
715 | (4) |
|
Working with Network Configuration Files |
|
|
719 | (1) |
|
|
720 | (1) |
|
|
721 | (1) |
|
|
722 | (1) |
|
|
723 | (1) |
|
Displaying Your Network Configuration with the ifconfig Command |
|
|
723 | (4) |
|
Chapter 4 Running DHCP and DNS |
|
|
727 | (12) |
|
|
727 | (1) |
|
|
728 | (1) |
|
|
728 | (2) |
|
|
730 | (1) |
|
|
731 | (1) |
|
|
731 | (1) |
|
Editing BIND configuration files |
|
|
731 | (1) |
|
|
731 | (3) |
|
|
734 | (2) |
|
|
736 | (1) |
|
|
736 | (3) |
|
Chapter 5 Doing the Samba Dance |
|
|
739 | (8) |
|
|
739 | (1) |
|
|
740 | (1) |
|
Starting and Stopping Samba |
|
|
741 | (1) |
|
Editing the smb.conf File |
|
|
742 | (2) |
|
Configuring global settings |
|
|
744 | (1) |
|
|
744 | (1) |
|
|
745 | (2) |
|
|
747 | (14) |
|
|
747 | (1) |
|
Starting and Stopping Apache |
|
|
748 | (2) |
|
Opening the Firewall for Apache |
|
|
750 | (2) |
|
Confirming That Apache Is Running |
|
|
752 | (1) |
|
Looking at the httpd.config File |
|
|
753 | (2) |
|
Understanding Access Rules |
|
|
755 | (3) |
|
Configuring Virtual Hosts |
|
|
758 | (3) |
|
Chapter 7 Running Postfix |
|
|
761 | (10) |
|
|
762 | (1) |
|
|
763 | (1) |
|
|
763 | (2) |
|
|
765 | (1) |
|
|
766 | (1) |
|
|
767 | (1) |
|
Block listing and friends listing email addresses |
|
|
767 | (1) |
|
Using the Mail Console Client |
|
|
768 | (3) |
|
|
771 | (30) |
|
|
771 | (1) |
|
|
772 | (1) |
|
|
772 | (1) |
|
|
772 | (1) |
|
|
773 | (1) |
|
|
774 | (1) |
|
|
775 | (1) |
|
Running a command with root-level privileges |
|
|
775 | (1) |
|
Directory- and File-Handling Commands |
|
|
776 | (1) |
|
|
776 | (1) |
|
|
776 | (1) |
|
|
777 | (1) |
|
|
777 | (1) |
|
|
777 | (2) |
|
|
779 | (1) |
|
|
780 | (1) |
|
|
780 | (1) |
|
|
781 | (1) |
|
|
782 | (1) |
|
Commands for Working with Packages and Services |
|
|
783 | (1) |
|
|
783 | (2) |
|
|
785 | (1) |
|
Commands for Administering Users |
|
|
785 | (1) |
|
|
785 | (2) |
|
|
787 | (1) |
|
|
788 | (1) |
|
|
788 | (1) |
|
|
788 | (1) |
|
|
789 | (1) |
|
|
789 | (1) |
|
|
790 | (1) |
|
|
790 | (1) |
|
Commands for Managing Ownership and Permissions |
|
|
791 | (1) |
|
|
791 | (1) |
|
|
792 | (1) |
|
|
792 | (2) |
|
|
794 | (1) |
|
|
794 | (1) |
|
|
794 | (1) |
|
|
795 | (2) |
|
|
797 | (1) |
|
|
798 | (1) |
|
|
799 | (2) |
|
Book 9 Managing A Network |
|
|
801 | (88) |
|
Chapter 1 Welcome to Network Administration |
|
|
803 | (14) |
|
Knowing What Network Administrators Do |
|
|
804 | (1) |
|
Choosing the Part-Time Administrator |
|
|
805 | (1) |
|
Establishing Routine Chores |
|
|
806 | (1) |
|
|
807 | (1) |
|
Patching Up Your Operating System and Software |
|
|
808 | (1) |
|
Discovering Software Tools for Network Administrators |
|
|
809 | (1) |
|
|
810 | (1) |
|
|
811 | (1) |
|
|
812 | (1) |
|
|
813 | (1) |
|
|
813 | (1) |
|
|
814 | (1) |
|
Helpful Bluffs and Excuses |
|
|
815 | (2) |
|
Chapter 2 Managing Remotely |
|
|
817 | (18) |
|
Enabling Remote Desktop Connection |
|
|
818 | (1) |
|
|
819 | (2) |
|
Using Keyboard Shortcuts for Remote Desktop |
|
|
821 | (1) |
|
Configuring Remote Desktop Options |
|
|
822 | (1) |
|
Setting the Display options |
|
|
823 | (1) |
|
Setting the Local Resources options |
|
|
824 | (1) |
|
Setting the Experience options |
|
|
825 | (1) |
|
Setting the Advanced options |
|
|
826 | (1) |
|
|
827 | (1) |
|
Enabling Remote Assistance |
|
|
828 | (1) |
|
Inviting Someone to Help You via a Remote Assistance Session |
|
|
829 | (3) |
|
Responding to a Remote Assistance Invitation |
|
|
832 | (3) |
|
Chapter 3 Managing Network Assets |
|
|
835 | (12) |
|
Introducing IT Asset Management |
|
|
836 | (1) |
|
|
837 | (1) |
|
|
837 | (2) |
|
|
839 | (1) |
|
|
840 | (1) |
|
|
840 | (1) |
|
|
841 | (2) |
|
|
843 | (1) |
|
Using Asset-Tracking Software |
|
|
843 | (2) |
|
Other Sources of Asset-Tracking Information |
|
|
845 | (2) |
|
Chapter 4 Solving Network Problems |
|
|
847 | (16) |
|
When Bad Things Happen to Good Computers |
|
|
848 | (1) |
|
|
849 | (1) |
|
Ways to Check a Network Connection |
|
|
850 | (1) |
|
A Bunch of Error Messages Just Flew By! |
|
|
851 | (1) |
|
Double-Checking Your Network Settings |
|
|
852 | (1) |
|
|
852 | (1) |
|
|
853 | (1) |
|
Restarting a Client Computer |
|
|
854 | (1) |
|
|
855 | (1) |
|
|
856 | (2) |
|
Restarting Network Services |
|
|
858 | (1) |
|
Restarting a Network Server |
|
|
859 | (1) |
|
|
860 | (1) |
|
Documenting Your Trials and Tribulations |
|
|
861 | (2) |
|
Chapter 5 Managing Software Deployment |
|
|
863 | (12) |
|
Understanding Software Licenses |
|
|
864 | (3) |
|
|
867 | (1) |
|
Options for Deploying Network Software |
|
|
868 | (1) |
|
Deploying software manually |
|
|
868 | (1) |
|
Running Setup from a network share |
|
|
869 | (1) |
|
|
870 | (1) |
|
Creating an administrative installation image |
|
|
871 | (1) |
|
Pushing out software with group policy |
|
|
872 | (1) |
|
Keeping Software Up to Date |
|
|
872 | (3) |
|
Chapter 6 Managing Mobile Devices |
|
|
875 | (14) |
|
The Many Types of Mobile Devices |
|
|
876 | (1) |
|
Considering Security for Mobile Devices |
|
|
877 | (1) |
|
|
878 | (1) |
|
|
878 | (1) |
|
|
879 | (1) |
|
Integrating iOS devices with Exchange |
|
|
879 | (6) |
|
|
885 | (1) |
|
Looking at the Android OS |
|
|
885 | (1) |
|
Perusing Android's core applications |
|
|
886 | (1) |
|
Integrating Android with Exchange |
|
|
887 | (2) |
|
Book 10 Dealing with Cybersecurity |
|
|
889 | (54) |
|
Chapter 1 Securing Your Users |
|
|
891 | (10) |
|
Knowing the Difference between Authentication and Authorization |
|
|
892 | (1) |
|
Following Password Best Practices |
|
|
892 | (3) |
|
Securing the Administrator Account |
|
|
895 | (1) |
|
Understanding Multifactor Authentication |
|
|
896 | (1) |
|
Securing the Human Firewall |
|
|
897 | (1) |
|
Establishing cybersecurity policies |
|
|
898 | (1) |
|
|
898 | (1) |
|
|
899 | (2) |
|
Chapter 2 Managing Firewalls and Virus Protection |
|
|
901 | (20) |
|
|
902 | (1) |
|
The Many Types of Firewalls |
|
|
903 | (1) |
|
|
903 | (2) |
|
Stateful packet inspection (SPI) |
|
|
905 | (1) |
|
|
906 | (1) |
|
|
906 | (1) |
|
|
907 | (1) |
|
The Built-In Windows Firewall |
|
|
908 | (2) |
|
Configuring Windows Defender Firewall with Group Policy |
|
|
910 | (6) |
|
|
916 | (1) |
|
|
917 | (1) |
|
|
918 | (2) |
|
|
920 | (1) |
|
Chapter 3 Dealing with Spam |
|
|
921 | (14) |
|
|
922 | (1) |
|
Sampling the Many Flavors of Spam |
|
|
923 | (1) |
|
|
924 | (2) |
|
Understanding Spam Filters |
|
|
926 | (2) |
|
Looking at Three Types of Antispam Software |
|
|
928 | (1) |
|
|
929 | (1) |
|
|
930 | (1) |
|
Cloud-based antispam services |
|
|
931 | (1) |
|
|
932 | (3) |
|
Chapter 4 Managing Disaster Recovery and Business Continuity Planning |
|
|
935 | (8) |
|
Assessing Different Types of Disasters |
|
|
936 | (1) |
|
|
937 | (1) |
|
|
937 | (1) |
|
|
938 | (1) |
|
|
938 | (1) |
|
|
939 | (1) |
|
Analyzing the Impact of a Disaster |
|
|
939 | (1) |
|
Developing a Business Continuity Plan |
|
|
940 | (1) |
|
|
941 | (2) |
|
|
943 | (32) |
|
APPENDIX A Directory of Useful Websites |
|
|
945 | (1) |
|
|
945 | (1) |
|
|
946 | (1) |
|
Home and Small-Business Networking |
|
|
946 | (1) |
|
|
947 | (1) |
|
|
947 | (1) |
|
|
948 | (1) |
|
Network Standards Organizations |
|
|
948 | (1) |
|
|
949 | (1) |
|
|
949 | (1) |
|
|
950 | (1) |
|
|
951 | (2) |
|
|
953 | (22) |
Index |
|
975 | |