Unit5 Notes
Unit5 Notes
Configuring GIT in RHEL - Remote Repositories- Lab: Exploring GIT Remote Repository-Branching and
Merging- Lab: Learning and Exploring Branches in GIT - Configuring Databases in Linux-Lab: Maria DB
(MySQL) Installation and Configuration in RHEL -Mongo DB-Lab: Mongo DB Installation and Configuration in
RHEL -Understanding Linux Security OS-Lab: Kali Linux Installation on Virtual Machine- Description About
Different Security Tools in Kali Linux-Hands-on Study on NMAP And METASPLOIT-Lab: Gathering
Information Using NMAP - METASPLOIT- Lab: Vulnerability Management Using METASPLOIT-Knowing
Linux as Cloud Workhorse- Amazon Web Service (AWS-Lab: Operating and Managing an Ec2 Instance in AWS
Cloud
In this unit, you'll learn about GIT and its various aspects in a Linux environment, focusing on remote repositories,
branching, merging, database configurations, and Linux security using tools like NMAP, Metasploit, and Kali
Linux. Additionally, there will be hands-on labs related to cloud operations with AWS.
GIT is a distributed version control system. It allows multiple developers to work on a project without overriding
each other’s changes. GIT's architecture consists of a working directory, staging area, and GIT repository.
Working Directory: The place where your files are being worked on.
Staging Area: A middle layer between the working directory and the GIT repository.
GIT Repository: The .git directory where all version history is stored.
To get started with GIT in Red Hat Enterprise Linux (RHEL), you need to install it first and configure your user
information.
# Install GIT
sudo yum install git
git --version
3. Remote Repositories
A remote repository refers to a version of your project hosted on the internet or network. You can pull from, push
to, or fetch from a remote repository.
Explore remote repositories by cloning an existing GIT repository and pushing your changes.
Branches allow you to develop features, fix bugs, or experiment with new ideas in isolation from other branches.
Merging incorporates changes from one branch into another.
Linux systems are widely used for hosting databases like MariaDB (MySQL) and MongoDB. In this section, we'll
install and configure these databases in RHEL.
# Create a database
CREATE DATABASE mydb;
# Install MongoDB
sudo yum install -y mongodb-org
# Start MongoDB
sudo systemctl start mongod
sudo systemctl enable mongod
Linux security is paramount for ensuring that systems are protected against unauthorized access. Kali Linux is a
specialized distribution used for security testing and penetration testing.
12. Lab: Kali Linux Installation on Virtual Machine
Kali Linux can be installed on a virtual machine like VirtualBox or VMware for penetration testing. Download
the Kali Linux ISO from its official website and set it up on a virtual machine.
Using NMAP:
# Scan an IP address
nmap 192.168.1.1
Using Metasploit:
Metasploit is used to test security vulnerabilities. Below is an example of using Metasploit to scan for open ports.
# Use an exploit
use exploit/unix/webapp/apache_mod_cgi_bash_env_exec
In this lab, you'll scan a network using NMAP to gather information about open ports and services.
16. Lab: Vulnerability Management Using METASPLOIT
In this lab, you'll use Metasploit to exploit known vulnerabilities and test system security.
Linux is the backbone of most cloud infrastructure. In this section, you'll work with AWS services using Linux.
This comprehensive explanation covers GIT, database configurations, security tools, and cloud infrastructure in
Linux, with practical lab examples for each topic. Let me know if you need further elaboration on any specific
section!