week 6
Checkpoint deadlines and policies
Clear distinction between hard deadlines and purple-patch flexibility for the first checkpoint
Instructor expresses willingness to understand for the first checkpoint, but moving forward, deadlines are hard.
If a student has a special situation, they should discuss it with the instructor to get it sorted out
Penalties: students will be docked points for late submissions; no full credit for late work
The instructor emphasizes the goal of minimizing late submissions so the checkpoint isn’t missed
No explicit numeric penalty beyond “docked points,” but a reference to missing the checkpoint as a consequence
Splunk deep dive, market value, and lab details
New item unlocked: Homeland number five (Splunk-focused lab) and enterprise challenge context
Splunk as a career-changing tool in systems administration
Splunk can enable a six-figure job with the right role (e.g., Splunk Administrator, Splunk Architect)
Market signals can be checked by doing live job searches for tool Certifications and roles
Job-market check example: search terms like “Splunk administrator” reveal roles such as Splunk admin systems engineer with salary ranges around 140{,}000 annually or 65{-}90{,}000 per year depending on region and role
These examples illustrate market demand and salary potential for Splunk skills
Splunk lab expectations
Students will deploy Splunk and learn core fundamentals; this is directly relevant to their resume and job prospects
Splunk is an industry-leading tool, with relevance to cyber security (vulnerability analysis and SIEM integrations).
Certification track: Splunk offers certification pathways up to Architect level; certifications can correlate with higher compensation.
Real-world relevance
Splunk is used in cyber security and SIEM deployments; hands-on experience in the lab mirrors enterprise deployments
Periodic processes, backups, and log files (lecture content)
Core definitions
A process = any program running on a system; can run in foreground or background
Foreground processes are visible (e.g., on-screen apps); background processes support OS or applications
Periodic processes
Some background processes run continuously; most run only when needed, then terminate until next trigger
They handle system/admin tasks (e.g., setting up shared drives, maintenance tasks)
Many periodic processes are installed with the OS or software (Windows, Linux) but you can also create your own using Task Scheduler (Windows) or Cron (Unix/Linux)
Task Scheduler (Windows)
Built-in in Windows (client and server editions)
Graphical interface to configure scheduled tasks (scheduled tasks = triggers + actions)
Observing existing tasks (example: Office automatic updates 2.0) shows multiple triggers (e.g., daily at 3:00 AM, logon, idle)
Each task points to an executable or script; tasks can use specialized options for the executable (under the program path and arguments)
Creating a basic task: a wizard guides you through naming, description, triggers, actions, and starting conditions
Actions examples: start a program (executable or script). Other actions (send email, display message) are deprecated
You can run scripts in PowerShell, Python, batch, etc.; scripts enable automation beyond single executables
Unattended vs attended execution: ensure scripts can run without manual interaction if you want full automation
Cron (Linux/Unix)
In Linux, cron is the command-line tool that schedules tasks; cron table (crontab) stores the jobs as plain text files
Cron jobs are similar in concept to Windows tasks: they automate admin/system maintenance tasks
Cron basics: a cron job consists of minutes, hours, day of month, month, day of week, and the command to run
The structure resembles a table: columns = fields, rows = individual cron jobs
Typical fields and their meaning
Minutes, Hours, Day of Month, Month, Day of Week, Command
Wildcards: the asterisk “*” acts as a wildcard for any value in a given field
Example interpretation of a cron line form:
A cron line like: 0 ext{ }12 ext{ }*\ *\ 1-5\ /root/checkservers.sh corresponds to: at minute 0 of hour 12 on Monday through Friday, execute /root/checkservers.sh
Syntax understanding: you can edit with a text editor or use GUI cron generators to format the line correctly
Linux vs Windows reminders
In Linux, everything (including scheduled tasks) is treated as a file interaction; Cron jobs are stored in a cron tab file
You can deny or allow certain cron usage (cron deny) for security controls
Practical examples of periodic tasks
File system cleanup (periodic purge of temporary files and cookies)
Log management and log rotation (move old logs to archive storage)
Software installation persistence checks (ensuring critical software remains installed)
Automated backups and their scheduling using scripts
Logs and log management
Logs are receipts of system activity; important for functionality, troubleshooting, and security (audit trail)
Windows log categories
Security logs (successful/failed logins, privilege changes)
Setup logs (install/upgrade events)
System logs (OS-level events)
Forwarded events (logs from other machines)
Linux log locations
Logs stored under /var/log (with flavor-based variations across Debian-based vs Red Hat-based distros)
Debian-based (e.g., Ubuntu) may place system events in /var/log/syslog or /var/log/kern.log; prong jobs results in /var/log/cron or equivalent
Log management tools
Log viewers (simpler): Loggly, Log Viewer, GoAccess, less common LOS viewers
SIEM tools (more advanced): Splunk, Graylog, ArcSight, LogRhythm, SolarWinds, etc.
SIEM vs log viewing tools
Log viewers collect and present logs from various sources; provide search, merge, sort, and filter capabilities
SIEM tools collect logs, store them in a database, analyze them, and provide powerful querying capabilities (e.g., Splunk’s own search language)
SIEM tools can ingest data from computing devices, firewalls, anti-virus, network devices, and mobile devices; designed for centralized security analytics
Practical implications and ethics
Security trade-offs when considering cloud backups (cost, security controls, and control over data location)
Caution using AI tools for scripting: avoid exposing sensitive org data to public AI services; consider internal/enterprise AI solutions for custom scripts
Centralization (single pane of glass) improves admin efficiency but requires robust access controls and monitoring
Takeaways for exam preparation
Understand the difference between foreground and background processes, and the role of periodic processes
Know how Task Scheduler and Cron operate, how to interpret cron syntax, and how to implement automation safely (attended vs unattended)
Grasp backup fundamentals: purpose, redundancy vs backup, on-prem vs cloud pros/cons, backup types (full, incremental, differential), and the importance of testing restores
Recognize log management concepts: log types, locations, and the difference between log viewing tools and SIEM solutions
Familiarity with Splunk basics and why it’s valuable in enterprise environments, including certification pathways and practical lab expectations