Where can I find UNIX training course in the United States?

 
Thread Tools Search this Thread
Special Forums UNIX and Linux Applications Where can I find UNIX training course in the United States?
# 1  
Old 03-05-2012
Where can I find UNIX training course in the United States?

Hi guys,

Can you help me please to find an appropriate course of UNIX in the United States.
Also, can you provide me some information about the schools or institutes that offer it in the U.S.

Thanks,
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Unix process states

I am trying to write my own Unix compliant (SUSv4) OS - Just a hobby OS, nothing serious. While going through the standard, I couldn't find any explicit information on process states. What I could find was (excluding the real-time considerations)- From this it can be inferred that the... (2 Replies)
Discussion started by: tinkerbeast
2 Replies

2. UNIX for Dummies Questions & Answers

Unix Training-where, when etc.

I'm being asked to go and take a training course in Advanced Unix and Perl. The main reason is the amount of information needed to get up to speed a short period of time, which is what we're limited on. Travel is fine. Can anyone suggest a good resource for researching the where and when for... (1 Reply)
Discussion started by: gavineq
1 Replies

3. UNIX for Dummies Questions & Answers

UNIX Training?

At work I have to restart applications and install upgrades to applications running on Solaris 10. Its pretty basic stuff but I have little experience of Unix so it can be a bit hairy at times. Work have offered to send me on some training but I have to select the course/training. I'm not... (2 Replies)
Discussion started by: Sepia
2 Replies

4. UNIX for Dummies Questions & Answers

UNIX Training

Hello all, I am probably the newest newb in here and would really appreciate some (as much as possible) help on learning UNIX. If anyone is familiar with any non boot camp schools in the NY area, preferrably instructor-led, please refer me to a link or list them in a reply. Also, any information on... (10 Replies)
Discussion started by: syrixx
10 Replies
Login or Register to Ask a Question
ipsecesp(7P)							     Protocols							      ipsecesp(7P)

NAME
ipsecesp, ESP - IPsec Encapsulating Security Payload SYNOPSIS
drv/ipsecesp DESCRIPTION
The ipsecesp module provides confidentiality, integrity, authentication, and partial sequence integrity (replay protection) to IP data- grams. The encapsulating security payload (ESP) encapsulates its data, enabling it to protect data that follows in the datagram. For TCP packets, ESP encapsulates the TCP header and its data only. If the packet is an IP in IP datagram, ESP protects the inner IP datagram. Per-socket policy allows "self-encapsulation" so ESP can encapsulate IP options when necessary. See ipsec(7P). Unlike the authentication header (AH), ESP allows multiple varieties of datagram protection. (Using a single datagram protection form can expose vulnerabilities.) For example, only ESP can be used to provide confidentiality. But protecting confidentiality alone exposes vulner- abilities in both replay attacks and cut-and-paste attacks. Similarly, if ESP protects only integrity and does not fully protect against eavesdropping, it may provide weaker protection than AH. See ipsecah(7P). ESP Device ESP is implemented as a module that is auto-pushed on top of IP. Use the /dev/ipsecesp entry to tune ESP with ndd(1M). Algorithms ESPuses encryption and authentication algorithms. Authentication algorithms include HMAC-MD5 and HMAC-SHA-1. Encryption algorithms include DES, Triple-DES, Blowfish and AES. Each authentication and encryption algorithm contain key size and key format properties. You can obtain a list of authentication and encryption algorithms and their properties by using the ipsecalgs(1M) command. You can also use the functions described in the getipsecalgbyname(3NSL) man page to retrieve the properties of algorithms. Because of export laws in the United States, not all encryption algorithms are available outside of the United States. Security Considerations ESP without authentication exposes vulnerabilities to cut-and-paste cryptographic attacks as well as eavesdropping attacks. Like AH, ESP is vulnerable to eavesdropping when used without confidentiality. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWcsr (32-bit) | |Interface Stability |Evolving | +-----------------------------+-----------------------------+ SEE ALSO
ipsecalgs(1M), ipsecconf(1M), ndd(1M), attributes(5), getipsecalgbyname(3NSL), ip(7P), ipsec(7P), ipsecah(7P) Kent, S. and Atkinson, R.RFC 2406, IP Encapsulating Security Payload (ESP), The Internet Society, 1998. SunOS 5.11 18 May 2003 ipsecesp(7P)