1 / 23

Syllabus

Syllabus. Name: Eugene Styer Office: Wallace 404 Phone: 622-1930 Office Hours: 10:00-11:00 Email: Eugene.Styer@eku.edu

nida
Télécharger la présentation

Syllabus

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Syllabus • Name: Eugene Styer • Office: Wallace 404 • Phone: 622-1930 • Office Hours: 10:00-11:00 • Email: Eugene.Styer@eku.edu • Catalog Description: Prerequisite: (6 hours of a programming language). Operating system concepts, installation and setup, system administration, managing system services, program security, encryption, database security, security policies, legal and ethical issues.

  2. Syllabus – Textbooks • Fedora Unleashed, Paul Hudson and Andrew Hudson, SAMS publishing, 2008 Edition, ISBN: 0-672-32977-8 • Security in Computing, Charles P. Pfleeger and Shari Lawrence Pfleeger, 4rd Ed., Prentice Hall, ISBN: 0-13-239077-9

  3. Syllabus – Course Objectives • Upon successful completion of this course, the students will have the abilities to: • Install and configure a Linux system, • Create users, manage software, and administer a Linux system, • Install and configure basic system services, • Understand the dangers related to a computing system, • Create programs that avoid common security errors, • Protect an operating system against attacks, • Protect a database, • Set up policies to encourage a secure environment, • Understand ethical computer use and the legal issues regarding computers

  4. Tentative Schedule

  5. Syllabus – Grading • Grading and Evaluation Policies • There will be approximately 10 programming assignments. There will be a 5-point deduction for each day an assignment is late, up to a maximum of 60 points • Grade Components • Assignments 35% • First written test 20% • Second written test 20% • Comprehensive Final 25% • Grading Scale • A: 90-100 • B: 80-89 • C: 70-79 • D: 60-69 • F: 0-59 • Student Progress: • Student progress will be available on the EKU Blackboard System.

  6. Attendance Policy • Attendance will be taken at all classes. Unexcused absences in excess of 10% of the scheduled lecture/lab meetings will result in a one letter grade reduction for the course. Unexcused absences in excess of 20% of the scheduled lecture/lab meetings will result in a two letter grade reduction for the course. Unexcused absences in excess of 30% of the scheduled lecture/lab meetings will result in a three letter grade reduction for the course. Students with unusual circumstances should advise the instructor of their situation immediately. Students will be held responsible for all announcements made in class.

  7. Syllabus – Students with Disabilities • If you are registered with the Office of Services for Individuals with Disabilities, please obtain your accommodation letters from the OSID and present them to the course instructor to discuss any academic accommodations you need. If you believe you need accommodation and are not registered with the OSID, please contact the Office in the Student Services Building Room 361 by email at disserv@eku.edu or by telephone at (859) 622-2933 V/TDD. Upon individual request, this syllabus can be made available in an alternative format.

  8. Syllabus • Academic Integrity Statement • Students are advised that EKU's Academic Integrity policy will be strictly enforced in this course. The Academic Integrity policy is available at www.academicintegrity.eku.edu. Questions regarding the policy may be directed to the Office of Academic Integrity. • Policy on Cheating: • Cheating is an act or an attempted act of deception by which a student seeks to misrepresent that he/she has mastered information on an academic exercise. Cheating includes, but is not limited to: • Giving or receiving assistance not authorized by the instructor or University representative; • Participating in unauthorized collaboration on an academic exercise; • Using unapproved or misusing electronic devices or aids during an academic exercise. (from EKU Student Handbook)

  9. Syllabus • Official E-mail: • An official EKU e-mail is established for each registered student, each faculty member, and each staff member. All university communications sent via e-mail will be sent to this EKU e-mail address. • Final, Drop Day, etc.: • See the Colonel’s Compass for the final exam schedule, last day to drop full semester courses and other important dates.

  10. Unix and Linux • Multics • Developed in the 1960’s by GE, Bell Labs, and MIT • People at Bell Labs grew frustrated by the size and scale of the project, wanted to create a similar but simpler version • Unix • First Unix system was developed by Ken Thompson in 1969 at Bell Lab • Source code was available, written mostly in C • A few early versions were written in assembler, then rewritten in C • Since the first Unix system, a large number of people have developed Unix into a modern family of operating systems • Many versions of Unix operating systems have been developed. • Unix is portable and can run on a wide variety of systems (Apple, PC, HP, Sun, IBM mainframes, etc.)

  11. Unix and Linux • Minix • Tanenbaum – Created Minix, a Unix look-alike for teaching • Linux • Developed in 1991 by Linus Benedict Torvalds, then a graduate student at the University of Helsinki, Finland, now a fellow at the Open Source Development Lab (http://www.osdl.org) • Used Minix as the basis for Linux • Latest stable kernel – 2.6.37.11 (Jan 12, 2011) • Note: The second number (2.6.37) is even for stable versions, odd for experimental or developmental versions (2.5.75) • References • http://www.linux.org • http://www.kernel.org

  12. Types of Unix

  13. Other Unix or Unix-like Systems You May Hear About

  14. System III & V Family

  15. Why use Linux? • Linux provides an excellent return on investment (ROI) • Linux can be put to work on the desktop • Linux can be put to work on a server platform • Linux has a low entry and deployment cost barrier • Linux appeals to a wide hardware and software industry audience

  16. Why use Linux? • Linux provides a royalty-free development platform for cross-platform development • Big-player support in the computer hardware industry from such as titans as IBM now lends credibility to Linux as a viable platform • Linux package vendors • Combinations of Linux, support software, and sometimes phone support • Common vendors include: • Red Hat, Caldera, Debian, SuSE, Slackware • Some of these are totally free and others charge but include technical support

  17. Red Hat Linux and Fedora • In 1994, Marc Ewing and Bob Young combined forces to create Red Hat to develop, release, and market an easily installed, easily managed, and easy-to-use Linux distribution. • Red Hat is one of the first companies to adopt, promote, and use open source as a business model for supporting development, technical service, support, and sales of free software to the computer industry. • Since 1994, Red Hat provided copies of its commercial Linux distribution, Red Hat Linux (now called Fedora), free over the Internet.

  18. Red Hat Linux and Fedora • In 2003, Red Hat discontinued the sale and free distribution of its customer-oriented Red Hat Linux (after version 9) and began to focus its efforts on enterprise and corporate Linux-based products and services. • The current consumer distribution of Red Hat Linux has been replaced by Fedora Core, sponsored by Red Hat, run by the Fedora Project, and in part derived from the original Red Hat Linux distribution • Fedora Core is a more rapidly updated community supported Linux distribution. The DVD included with the text book contains the Fedora Core release FC8. The Fedora Core 8 was released in Nov. 2007.

  19. Install Fedora • Hardware Requirements for x86 (http://fedoraproject.org/) • Processor (Stated for Intel processors. Other processors, such as those from AMD, Cyrix, and VIA that are compatible with and equivalent to the following Intel processors, may also be used with Fedora.) • Fedora 16 requires an Intel Pentium or better processor, and is optimized for Pentium 4 and later processors. • Recommended: 400 MHz or better

  20. Install Fedora (cont.) • Hardware Requirements • Memory • Recommended RAM for graphical: 1GiB. • Hard disk space • 10 GiB disk space is recommended • Additional space is also required for any user data, and at least 5% free space should be maintained for proper system operation.

  21. Install Fedora (cont.) • Planning partition strategies • How many partitions? • Two partitions (swap, /) are required • Additional partitions can protect against a disk hog • Best to manually partition if you will be setting up a dual-boot system • Suspend/Hibernate may require a partition equal to the size of RAM • Candidates for partitions • / (root), swap – Required • /home – User data • /opt – Optional software packages • /tmp – Temporary storage • /usr – Holds most software (sometimes, but now not recommended)

  22. Install Fedora (cont.) • Choosing how to install Fedora • Install using Fedora’s CD-ROM or DVD • ISO image can be downloaded from Fedora for either 32-bit or 64-bit processors • Booting to an installation and installing software over a network using FTP or HTTP protocols, or from an NFS-mounted hard drive • Boot your PC with the CD-ROM, type linux askmethod at the boot prompt. • Follow the prompts, and you will be asked to choose the type of network installation.

  23. Install Fedora (cont.) • Starting the install • Option for booting • Selections to make during install • Language • Default keyboard • Partitions • Boot loader • Boot password • If multiboot, which OS is default • Networking information • Firewall/security settings • Time zone for hardware clock • Root password, user accounts • Software package selection • Firstboot configuration • Firewall • Date and Time • Hardware Profile • Create User

More Related