Manoj Mallik Linux Trainer
No reviews yet

I am having more than 14 years of experience in Linux as a trainer and Administrator. I can teach and help students on their assignments on Linux. Being as a corporate trainer of Linux Administration methodology is of hand on experience and to clear basic concept before that. Can be available as per requirement. I am having handon experience RHEL 3, RHEL 4, RHEL 5, RHEL 6, RHEL 7 also on Ubuntu, CentOS, Sun Solaris. Candidates can also approach regarding their project work also. Cloud implementation on Linux can also be coverd as on AWS, Clustering tools such as Hadoop, Bewoulf. In Linux Installation, file system management, DNS, DHCP, Squid Server Configuration, HTTP server, NIS, LDAP, RAID, LVM, Squirrel Mail, Sendmail, Quota Management, NFS Server, Samba Server, ACL, Apache Server. User Group Permission. Kernel Management and Backup process.

Subjects

  • Linux Administration Beginner-Expert


Experience

  • System Administrator (Aug, 2014Present) at Param Tech Solutions, Jabalpur
    I work for this organisation as a Linux System Administrator and provide complete support to clients. Also to implement new server according to their need.
  • Corporate Trainer (Aug, 2007Jul, 2013) at P C Lab, Bhopal
    Basic role is to provide training to students and employees of company on RedHat System Administration. Here we teach complete modules of RedHat and Hand on Experience on Linux.

Education

  • Bachelor of Engineering (Jun, 2003Jul, 2007) from bhabha engineering research institute, bhopal

Fee details

    5001,000/hour (US$5.9911.98/hour)

    These charges are based on hourly basis and on topics of students.


Courses offered

  • Linux Administration

    • INR10000
    • Duration: 30 Days
    • Delivery mode: Online
    • Group size: Individual
    • Instruction language: English, Hindi
    • Certificate provided: Yes
    Red Hat Linux System Administration

    Unit 1 - System Initialization
    Objectives
    Boot Sequence Overview
    Boot Loader Components
    GRUB and grub.conf
    Starting the Boot Process: GRUB
    Kernel Initialization
    init Initialization
    Run Levels
    /etc/rc.d/rc.sysinit
    /etc/rc.d/rc
    System V run levels
    /etc/rc.d/rc.local
    Controlling Services
    End of Unit 1

    Unit 2 - Package Management
    Objectives
    RPM Package Manager
    Installing and Removing Software
    Updating a Kernel RPM
    rpm Queries
    rpm Verification
    About yum
    Using yum
    Searching packages/files
    Configuring Additional Repositories
    Creating a private repository
    Red Hat Network
    Red Hat Network Server
    Entitlements
    Red Hat Network Client
    End of Unit 2

    Unit 3 - Kernel Services
    Objectives
    The Linux Kernel
    Kernel Images and Variants
    Kernel Modules
    Kernel Module Utilities
    Managing the initrd Image
    Accessing Drivers Through /dev
    Device Node Examples
    Managing /dev With udev
    Adding Files Under /dev
    Kernel Configuration With /proc
    /proc Examples
    sysctl : Persistent Kernel Configuration
    Exploring Hardware Devices
    Monitoring Processes and Resources

    Unit 4 - System Services
    Objectives
    Network Time Protocol
    System Logging
    syslog Configuration
    XOrg: The X11 Server
    XOrg Server Configuration
    XOrg in runlevel 3
    XOrg in runlevel 5
    Remote X Sessions
    SSH: Secure Shell
    VNC: Virtual Network Computing
    cron
    Controlling Access to cron
    System crontab Files
    Daily Cron Jobs
    The anacron System
    CUPS
    End of Unit 4
    Unit 5 - User Administration
    Objectives
    Adding a New User Account
    User Private Groups
    Modifying / Deleting User Accounts
    Group Administration
    Password Aging Policies
    Switching Accounts
    sudo
    Network Users
    Authentication Configuration
    Example: NIS Configuration
    Example: LDAP Configuration
    SUID and SGID Executables
    SGID Directories
    The Sticky Bit
    Default File Permissions
    Access Control Lists (ACLs)
    SELinux
    SELinux, continued
    SELinux: Targeted Policy
    SELinux: Management
    End of Unit 5

    Unit 6 - Filesystem Management
    Objectives
    Overview: Adding New Filesystems to the Filesystem Tree
    Device Recognition
    Disk Partitioning
    Managing Partitions
    Making Filesystems
    Filesystem Labels
    tune2fs
    Mount Points and /etc/fstab
    Mounting Filesystems with mount
    Unmounting Filesystems
    mount By Example
    Handling Swap Files and Partitions
    Mounting NFS Filesystems
    Automounter
    Direct Maps
    gnome-mount
    End of Unit 6

    Unit 7 - Advanced Filesystem Management
    Objectives
    Configuring the Quota System
    Setting Quotas for Users
    Reporting Quota Status
    What is Software RAID?
    Software RAID Configuration
    Software RAID Testing and Recovery
    What is Logical Volume Manager (LVM)?
    Creating Logical Volumes
    Resizing Logical Volumes
    Logical Volume Manager Snapshots
    Using LVM Snapshots
    Archiving tools: tar
    Archiving Tools: dump/restore
    Archiving Tools: rsync:
    End of Unit 7

    Unit 8 - Network Configuration
    Objectives
    Network Inferfaces
    Driver Selection
    Speed and Duplex Settings
    IPv4 Addresses
    Dynamic IPv4 Configuration
    Static IPv4 Configuration
    Device Aliases
    Routing Table
    Default Gateway
    Configuring Routes
    Verify IP Connectivity
    Defining the Local Host Name
    Local Resolver
    Remote Resolvers
    Verify DNS Connectivity
    Network Configuration Utilities
    Transparent Dynamic Configuration
    Implementing IPv6
    IPv6: Dynamic Interface Configuration
    IPv6: StaticInterface Configuration
    IPv6: Routing Configuration
    New and Modified Utilities
    End of Unit 8

    Unit 9 - Installation
    Objectives
    Anaconda, the Red Hat Enterprise Linux Installer
    First Stage: Starting the Installation
    First Stage: Boot Media
    Accessing the Installer
    First Stage: Installation Method
    Network Installation Server
    Second Stage: Installation Overview
    Configuring File Systems
    Advanced Partitioning
    Package Selection
    First Boot: Post-Install Configuration
    Kickstart
    Starting a Kickstart Installation
    Anatomy of a Kickstart File
    Kickstart: Commands Section
    Kickstart: Commands section
    Kickstart: Packages Section
    Kickstart: %pre, %post
    End of Unit 9

    Unit 10 - Virtualization with Xen
    Objectives
    Virtualization with Xen

    Hardware Considerations
    Preparing Domain-0
    Virtual Resources
    Domain-U Configuration
    Installing a new Domain-U
    Domain Management with xm
    Activating Domains on boot
    End of Unit 10

    Unit 11 - Troubleshooting
    Objectives
    Method of Fault Analysis
    Fault Analysis: Gathering Data
    Things to Check: X
    Things to Check: Networking
    Order of the Boot Process
    Filesystem Corruption
    Filesystem Recovery
    Recovery Run-levels
    Rescue Environment
    Rescue Environment Utilities
    Rescue Environment Details
    End of Unit 11

    Red Hat Enterprise Linux Network Services and Security Administration

    Unit 1 - System Performance and Security
    Objectives
    System Resources as Services
    Security in Principle
    Security in Practice
    Security Policy: the People
    Security Policy: the System
    Response Strategies
    System Faults and Breaches
    Method of Fault Analysis
    Fault Analysis: Hypothesis
    Method of Fault Analysis, continued
    Fault Analysis: Gathering Data
    Benefits of System Monitoring
    Network Monitoring Utilities
    Networking, a Local view
    Networking, a Remote view
    File System Analysis
    Typical Problematic Permissions
    Monitoring Processes
    Process Monitoring Utilities
    System Activity Reporting
    Managing Processes by Account
    System Log Files
    syslogd and klogd Configuration
    Log File Analysis
    End of Unit 1

    Unit 2 - System Service Access Controls
    Objectives
    System Resources Managed by init
    System Initialization and Service Management
    chkconfig
    Initialization Script Management
    xinetd Managed Services
    xinetd Default Controls
    xinetd Service Configuration
    xinetd Access Controls
    Host Pattern Access Controls
    The /etc/sysconfig/ files
    Service and Application Access Controls
    tcp_wrappers Configuration
    Daemon Specification
    Client Specification
    Macro Definitions
    Extended Options
    A tcp_wrappers Example
    xinetd and tcp_wrappers
    SELinux
    SELinux, continued
    SELinux: Targeted Policy
    SELinux: Management
    SELinux: semanage
    SELinux: File Types
    End of Unit 2

    Unit 3 - Network Resource Access Controls
    Objectives
    Routing
    IPv6 Features
    Implementing IPv6
    IPv6: Dynamic Interface Configuration
    IPv6: Static Interface Configuration
    IPv6: Routing Configuration
    tcp_wrappers and IPv6
    New and Modified Utilities
    Netfilter Overview
    Netfilter Tables and Chains
    Netfilter Packet Flow
    Rule Matching
    Rule Targets
    Simple Example
    Basic Chain Operations
    Additional Chain Operations
    Rules: General Considerations
    Match Arguments
    Connection Tracking
    Connection Tracking, continued
    Connection Tracking Example
    Network Address Translation (NAT)
    DNAT Examples
    SNAT Examples
    Rules Persistence
    Sample /etc/sysconfig/iptables
    IPv6 and ip6tables
    End of Unit 3

    Unit 4 - Organizing Networked Systems
    Objectives
    Host Name Resolution
    The Stub Resolver
    DNS-Specific Resolvers
    Trace a DNS Query with dig
    Other Observations
    Forward Lookups
    Reverse Lookups
    Mail Exchanger Lookups
    SOA Lookups
    SOA rdata
    Being Authoritative
    The Everything Lookup
    Exploring DNS with host
    Transitioning to the Server
    Service Profile: DNS
    Access Control Profile: BIND
    Getting Started with BIND
    Essential named Configuration
    Configure the Stub Resolver
    bind-chroot Package
    caching-nameserver Package
    Address Match List
    Access Control List (ACL)
    Built-In ACL's
    Server Interfaces
    Allowing Queries
    Allowing Recursion
    Allowing Transfers
    Modifying BIND Behavior
    Access Controls: Putting it Together
    Slave Zone Declaration
    Master Zone Declaration
    Zone File Creation
    Tips for Zone Files
    Testing
    BIND Syntax Utilities
    Advanced BIND Topics
    Remote Name Daemon Control (rndc)
    Delegating Subdomains
    DHCP Overview
    Service Profile: DHCP
    Configuring an IPv4 DHCP Server
    End of Unit 4

    Unit 5 - Network File Sharing Services
    Objectives
    File Transfer Protocol(FTP)
    Service Profile: FTP
    Network File Service (NFS)
    Service Profile: NFS
    Port options for the Firewall
    NFS Server
    NFS utilities
    Client-side NFS
    Samba services
    Service Profile: SMB
    Configuring Samba
    Overview of smb.conf Sections
    Configuring File and Directory Sharing
    Printing to the Samba Server
    Authentication Methods
    Passwords
    Samba Syntax Utility
    Samba Client Tools: smbclient
    Samba Client Tools: nmblookup
    Samba Clients Tools: mounts
    Samba Mounts in /etc/fstab
    End of Unit 5

    Unit 6 - Web Services
    Objectives
    Apache Overview
    Service Profile: HTTPD
    Apache Configuration
    Apache Server Configuration
    Apache Namespace Configuration
    Virtual Hosts
    Apache Access Configuration
    Apache Syntax Utilities
    Using .htaccess Files
    .htaccess Advanced Example
    CGI
    Notable Apache Modules
    Apache Encrypted Web Server
    Squid Web Proxy Cache
    Service Profile: Squid
    Useful parameters in /etc/squid/squid.conf
    End of Unit 6

    Unit 7 - Electronic Mail Services
    Objectives
    Essential Email Operation
    Simple Mail Transport Protocol
    SMTP Firewalls
    Mail Transport Agents
    Service Profile: Sendmail
    Intro to Sendmail Configuration
    Incoming Sendmail Configuration
    Outgoing Sendmail Configuration
    Inbound Sendmail Aliases
    Outbound Address Rewriting
    Sendmail SMTP Restrictions
    Sendmail Operation
    Using alternatives to Switch MTAs
    Service Profile: Postfix
    Intro to Postfix Configuration
    Incoming Postfix Configuration
    Outgoing Postfix Configuration
    Inbound Postfix Aliases
    Outbound Address Rewriting
    Postfix SMTP Restrictions
    Postfix Operation
    Procmail, A Mail Delivery Agent
    Procmail and Access Controls
    Intro to Procmail Configuration
    Sample Procmail Recipe
    Mail Retrieval Protocols
    Service Profile: Dovecot
    Dovecot Configuration
    Verifying POP Operation
    Verifying IMAP Operation
    End of Unit 7

    Unit 8 - Securing Data
    Objectives
    The Need For Encryption
    Cryptographic Building Blocks
    Random Number Generator
    One-Way Hashes
    Symmetric Encryption
    Asymmetric Encryption I
    Asymmetric Encryption II
    Public Key Infrastructures
    Digital Certificates
    Generating Digital Certificates
    OpenSSH Overview
    OpenSSH Authentication
    The OpenSSH Server
    Service Profile: SSH
    OpenSSH Server Configuration
    The OpenSSH Client
    Protecting Your Keys
    Applications: RPM
    End of Unit 8

    Unit 9 - Account Management
    Objectives
    User Accounts
    Account Information (Name Service)
    Name Service Switch (NSS)
    getent
    Authentication
    Pluggable Authentication Modules (PAM)
    PAM Operation
    /etc/pam.d/ Files: Tests
    /etc/pam.d/ Files: Control Values
    Example: /etc/pam.d/login File
    The system_auth file
    pam_unix.so
    Network Authentication
    auth Modules
    Password Security
    Password Policy
    session Modules
    Utilities and Authentication
    PAM Troubleshooting
    End of Unit 9

    Red Hat Linux System Administration

    Unit 1 - System Initialization
    Objectives
    Boot Sequence Overview
    Boot Loader Components
    GRUB and grub.conf
    Starting the Boot Process: GRUB
    Kernel Initialization
    init Initialization
    Run Levels
    /etc/rc.d/rc.sysinit
    /etc/rc.d/rc
    System V run levels
    /etc/rc.d/rc.local
    Controlling Services
    End of Unit 1

    Unit 2 - Package Management
    Objectives
    RPM Package Manager
    Installing and Removing Software
    Updating a Kernel RPM
    rpm Queries
    rpm Verification
    About yum
    Using yum
    Searching packages/files
    Configuring Additional Repositories
    Creating a private repository
    Red Hat Network
    Red Hat Network Server
    Entitlements
    Red Hat Network Client
    End of Unit 2

    Unit 3 - Kernel Services
    Objectives
    The Linux Kernel
    Kernel Images and Variants
    Kernel Modules
    Kernel Module Utilities
    Managing the initrd Image
    Accessing Drivers Through /dev
    Device Node Examples
    Managing /dev With udev
    Adding Files Under /dev
    Kernel Configuration With /proc
    /proc Examples
    sysctl : Persistent Kernel Configuration
    Exploring Hardware Devices
    Monitoring Processes and Resources

    Unit 4 - System Services
    Objectives
    Network Time Protocol
    System Logging
    syslog Configuration
    XOrg: The X11 Server
    XOrg Server Configuration
    XOrg in runlevel 3
    XOrg in runlevel 5
    Remote X Sessions
    SSH: Secure Shell
    VNC: Virtual Network Computing
    cron
    Controlling Access to cron
    System crontab Files
    Daily Cron Jobs
    The anacron System
    CUPS
    End of Unit 4

    Unit 5 - User Administration
    Objectives
    Adding a New User Account
    User Private Groups
    Modifying / Deleting User Accounts
    Group Administration
    Password Aging Policies
    Switching Accounts
    sudo
    Network Users
    Authentication Configuration
    Example: NIS Configuration
    Example: LDAP Configuration
    SUID and SGID Executables
    SGID Directories
    The Sticky Bit
    Default File Permissions
    Access Control Lists (ACLs)
    SELinux
    SELinux, continued
    SELinux: Targeted Policy
    SELinux: Management
    End of Unit 5

    Unit 6 - Filesystem Management
    Objectives
    Overview: Adding New Filesystems to the Filesystem Tree
    Device Recognition
    Disk Partitioning
    Managing Partitions
    Making Filesystems
    Filesystem Labels
    tune2fs
    Mount Points and /etc/fstab
    Mounting Filesystems with mount
    Unmounting Filesystems
    mount By Example
    Handling Swap Files and Partitions
    Mounting NFS Filesystems
    Automounter
    Direct Maps
    gnome-mount
    End of Unit 6

    Unit 7 - Advanced Filesystem Management
    Objectives
    Configuring the Quota System
    Setting Quotas for Users
    Reporting Quota Status
    What is Software RAID?
    Software RAID Configuration
    Software RAID Testing and Recovery
    What is Logical Volume Manager (LVM)?
    Creating Logical Volumes
    Resizing Logical Volumes
    Logical Volume Manager Snapshots
    Using LVM Snapshots
    Archiving tools: tar
    Archiving Tools: dump/restore
    Archiving Tools: rsync:
    End of Unit 7

    Unit 8 - Network Configuration
    Objectives
    Network Inferfaces
    Driver Selection
    Speed and Duplex Settings
    IPv4 Addresses
    Dynamic IPv4 Configuration
    Static IPv4 Configuration
    Device Aliases
    Routing Table
    Default Gateway
    Configuring Routes
    Verify IP Connectivity
    Defining the Local Host Name
    Local Resolver
    Remote Resolvers
    Verify DNS Connectivity
    Network Configuration Utilities
    Transparent Dynamic Configuration
    Implementing IPv6
    IPv6: Dynamic Interface Configuration
    IPv6: StaticInterface Configuration
    IPv6: Routing Configuration
    New and Modified Utilities
    End of Unit 8

    Unit 9 - Installation
    Objectives
    Anaconda, the Red Hat Enterprise Linux Installer
    First Stage: Starting the Installation
    First Stage: Boot Media
    Accessing the Installer
    First Stage: Installation Method
    Network Installation Server
    Second Stage: Installation Overview
    Configuring File Systems
    Advanced Partitioning
    Package Selection
    First Boot: Post-Install Configuration
    Kickstart
    Starting a Kickstart Installation
    Anatomy of a Kickstart File
    Kickstart: Commands Section
    Kickstart: Commands section
    Kickstart: Packages Section
    Kickstart: %pre, %post
    End of Unit 9

    Unit 10 - Virtualization with Xen
    Objectives
    Virtualization with Xen
    Hardware Considerations
    Preparing Domain-0
    Virtual Resources
    Domain-U Configuration
    Installing a new Domain-U
    Domain Management with xm
    Activating Domains on boot
    End of Unit 10

    Unit 11 - Troubleshooting
    Objectives
    Method of Fault Analysis
    Fault Analysis: Gathering Data
    Things to Check: X
    Things to Check: Networking
    Order of the Boot Process
    Filesystem Corruption
    Filesystem Recovery
    Recovery Run-levels
    Rescue Environment
    Rescue Environment Utilities
    Rescue Environment Details
    End of Unit 11

Reviews

No reviews yet. Be the first one to review this tutor.