-
INR10000
-
Duration: 30 Days
-
Delivery mode: Online
-
Group size: Individual
-
Instruction language: English, Hindi
-
Certificate provided:
Yes
Red Hat Linux System Administration
Unit 1 - System Initialization
Objectives
Boot Sequence Overview
Boot Loader Components
GRUB and grub.conf
Starting the Boot Process: GRUB
Kernel Initialization
init Initialization
Run Levels
/etc/rc.d/rc.sysinit
/etc/rc.d/rc
System V run levels
/etc/rc.d/rc.local
Controlling Services
End of Unit 1
Unit 2 - Package Management
Objectives
RPM Package Manager
Installing and Removing Software
Updating a Kernel RPM
rpm Queries
rpm Verification
About yum
Using yum
Searching packages/files
Configuring Additional Repositories
Creating a private repository
Red Hat Network
Red Hat Network Server
Entitlements
Red Hat Network Client
End of Unit 2
Unit 3 - Kernel Services
Objectives
The Linux Kernel
Kernel Images and Variants
Kernel Modules
Kernel Module Utilities
Managing the initrd Image
Accessing Drivers Through /dev
Device Node Examples
Managing /dev With udev
Adding Files Under /dev
Kernel Configuration With /proc
/proc Examples
sysctl : Persistent Kernel Configuration
Exploring Hardware Devices
Monitoring Processes and Resources
Unit 4 - System Services
Objectives
Network Time Protocol
System Logging
syslog Configuration
XOrg: The X11 Server
XOrg Server Configuration
XOrg in runlevel 3
XOrg in runlevel 5
Remote X Sessions
SSH: Secure Shell
VNC: Virtual Network Computing
cron
Controlling Access to cron
System crontab Files
Daily Cron Jobs
The anacron System
CUPS
End of Unit 4
Unit 5 - User Administration
Objectives
Adding a New User Account
User Private Groups
Modifying / Deleting User Accounts
Group Administration
Password Aging Policies
Switching Accounts
sudo
Network Users
Authentication Configuration
Example: NIS Configuration
Example: LDAP Configuration
SUID and SGID Executables
SGID Directories
The Sticky Bit
Default File Permissions
Access Control Lists (ACLs)
SELinux
SELinux, continued
SELinux: Targeted Policy
SELinux: Management
End of Unit 5
Unit 6 - Filesystem Management
Objectives
Overview: Adding New Filesystems to the Filesystem Tree
Device Recognition
Disk Partitioning
Managing Partitions
Making Filesystems
Filesystem Labels
tune2fs
Mount Points and /etc/fstab
Mounting Filesystems with mount
Unmounting Filesystems
mount By Example
Handling Swap Files and Partitions
Mounting NFS Filesystems
Automounter
Direct Maps
gnome-mount
End of Unit 6
Unit 7 - Advanced Filesystem Management
Objectives
Configuring the Quota System
Setting Quotas for Users
Reporting Quota Status
What is Software RAID?
Software RAID Configuration
Software RAID Testing and Recovery
What is Logical Volume Manager (LVM)?
Creating Logical Volumes
Resizing Logical Volumes
Logical Volume Manager Snapshots
Using LVM Snapshots
Archiving tools: tar
Archiving Tools: dump/restore
Archiving Tools: rsync:
End of Unit 7
Unit 8 - Network Configuration
Objectives
Network Inferfaces
Driver Selection
Speed and Duplex Settings
IPv4 Addresses
Dynamic IPv4 Configuration
Static IPv4 Configuration
Device Aliases
Routing Table
Default Gateway
Configuring Routes
Verify IP Connectivity
Defining the Local Host Name
Local Resolver
Remote Resolvers
Verify DNS Connectivity
Network Configuration Utilities
Transparent Dynamic Configuration
Implementing IPv6
IPv6: Dynamic Interface Configuration
IPv6: StaticInterface Configuration
IPv6: Routing Configuration
New and Modified Utilities
End of Unit 8
Unit 9 - Installation
Objectives
Anaconda, the Red Hat Enterprise Linux Installer
First Stage: Starting the Installation
First Stage: Boot Media
Accessing the Installer
First Stage: Installation Method
Network Installation Server
Second Stage: Installation Overview
Configuring File Systems
Advanced Partitioning
Package Selection
First Boot: Post-Install Configuration
Kickstart
Starting a Kickstart Installation
Anatomy of a Kickstart File
Kickstart: Commands Section
Kickstart: Commands section
Kickstart: Packages Section
Kickstart: %pre, %post
End of Unit 9
Unit 10 - Virtualization with Xen
Objectives
Virtualization with Xen
Hardware Considerations
Preparing Domain-0
Virtual Resources
Domain-U Configuration
Installing a new Domain-U
Domain Management with xm
Activating Domains on boot
End of Unit 10
Unit 11 - Troubleshooting
Objectives
Method of Fault Analysis
Fault Analysis: Gathering Data
Things to Check: X
Things to Check: Networking
Order of the Boot Process
Filesystem Corruption
Filesystem Recovery
Recovery Run-levels
Rescue Environment
Rescue Environment Utilities
Rescue Environment Details
End of Unit 11
Red Hat Enterprise Linux Network Services and Security Administration
Unit 1 - System Performance and Security
Objectives
System Resources as Services
Security in Principle
Security in Practice
Security Policy: the People
Security Policy: the System
Response Strategies
System Faults and Breaches
Method of Fault Analysis
Fault Analysis: Hypothesis
Method of Fault Analysis, continued
Fault Analysis: Gathering Data
Benefits of System Monitoring
Network Monitoring Utilities
Networking, a Local view
Networking, a Remote view
File System Analysis
Typical Problematic Permissions
Monitoring Processes
Process Monitoring Utilities
System Activity Reporting
Managing Processes by Account
System Log Files
syslogd and klogd Configuration
Log File Analysis
End of Unit 1
Unit 2 - System Service Access Controls
Objectives
System Resources Managed by init
System Initialization and Service Management
chkconfig
Initialization Script Management
xinetd Managed Services
xinetd Default Controls
xinetd Service Configuration
xinetd Access Controls
Host Pattern Access Controls
The /etc/sysconfig/ files
Service and Application Access Controls
tcp_wrappers Configuration
Daemon Specification
Client Specification
Macro Definitions
Extended Options
A tcp_wrappers Example
xinetd and tcp_wrappers
SELinux
SELinux, continued
SELinux: Targeted Policy
SELinux: Management
SELinux: semanage
SELinux: File Types
End of Unit 2
Unit 3 - Network Resource Access Controls
Objectives
Routing
IPv6 Features
Implementing IPv6
IPv6: Dynamic Interface Configuration
IPv6: Static Interface Configuration
IPv6: Routing Configuration
tcp_wrappers and IPv6
New and Modified Utilities
Netfilter Overview
Netfilter Tables and Chains
Netfilter Packet Flow
Rule Matching
Rule Targets
Simple Example
Basic Chain Operations
Additional Chain Operations
Rules: General Considerations
Match Arguments
Connection Tracking
Connection Tracking, continued
Connection Tracking Example
Network Address Translation (NAT)
DNAT Examples
SNAT Examples
Rules Persistence
Sample /etc/sysconfig/iptables
IPv6 and ip6tables
End of Unit 3
Unit 4 - Organizing Networked Systems
Objectives
Host Name Resolution
The Stub Resolver
DNS-Specific Resolvers
Trace a DNS Query with dig
Other Observations
Forward Lookups
Reverse Lookups
Mail Exchanger Lookups
SOA Lookups
SOA rdata
Being Authoritative
The Everything Lookup
Exploring DNS with host
Transitioning to the Server
Service Profile: DNS
Access Control Profile: BIND
Getting Started with BIND
Essential named Configuration
Configure the Stub Resolver
bind-chroot Package
caching-nameserver Package
Address Match List
Access Control List (ACL)
Built-In ACL's
Server Interfaces
Allowing Queries
Allowing Recursion
Allowing Transfers
Modifying BIND Behavior
Access Controls: Putting it Together
Slave Zone Declaration
Master Zone Declaration
Zone File Creation
Tips for Zone Files
Testing
BIND Syntax Utilities
Advanced BIND Topics
Remote Name Daemon Control (rndc)
Delegating Subdomains
DHCP Overview
Service Profile: DHCP
Configuring an IPv4 DHCP Server
End of Unit 4
Unit 5 - Network File Sharing Services
Objectives
File Transfer Protocol(FTP)
Service Profile: FTP
Network File Service (NFS)
Service Profile: NFS
Port options for the Firewall
NFS Server
NFS utilities
Client-side NFS
Samba services
Service Profile: SMB
Configuring Samba
Overview of smb.conf Sections
Configuring File and Directory Sharing
Printing to the Samba Server
Authentication Methods
Passwords
Samba Syntax Utility
Samba Client Tools: smbclient
Samba Client Tools: nmblookup
Samba Clients Tools: mounts
Samba Mounts in /etc/fstab
End of Unit 5
Unit 6 - Web Services
Objectives
Apache Overview
Service Profile: HTTPD
Apache Configuration
Apache Server Configuration
Apache Namespace Configuration
Virtual Hosts
Apache Access Configuration
Apache Syntax Utilities
Using .htaccess Files
.htaccess Advanced Example
CGI
Notable Apache Modules
Apache Encrypted Web Server
Squid Web Proxy Cache
Service Profile: Squid
Useful parameters in /etc/squid/squid.conf
End of Unit 6
Unit 7 - Electronic Mail Services
Objectives
Essential Email Operation
Simple Mail Transport Protocol
SMTP Firewalls
Mail Transport Agents
Service Profile: Sendmail
Intro to Sendmail Configuration
Incoming Sendmail Configuration
Outgoing Sendmail Configuration
Inbound Sendmail Aliases
Outbound Address Rewriting
Sendmail SMTP Restrictions
Sendmail Operation
Using alternatives to Switch MTAs
Service Profile: Postfix
Intro to Postfix Configuration
Incoming Postfix Configuration
Outgoing Postfix Configuration
Inbound Postfix Aliases
Outbound Address Rewriting
Postfix SMTP Restrictions
Postfix Operation
Procmail, A Mail Delivery Agent
Procmail and Access Controls
Intro to Procmail Configuration
Sample Procmail Recipe
Mail Retrieval Protocols
Service Profile: Dovecot
Dovecot Configuration
Verifying POP Operation
Verifying IMAP Operation
End of Unit 7
Unit 8 - Securing Data
Objectives
The Need For Encryption
Cryptographic Building Blocks
Random Number Generator
One-Way Hashes
Symmetric Encryption
Asymmetric Encryption I
Asymmetric Encryption II
Public Key Infrastructures
Digital Certificates
Generating Digital Certificates
OpenSSH Overview
OpenSSH Authentication
The OpenSSH Server
Service Profile: SSH
OpenSSH Server Configuration
The OpenSSH Client
Protecting Your Keys
Applications: RPM
End of Unit 8
Unit 9 - Account Management
Objectives
User Accounts
Account Information (Name Service)
Name Service Switch (NSS)
getent
Authentication
Pluggable Authentication Modules (PAM)
PAM Operation
/etc/pam.d/ Files: Tests
/etc/pam.d/ Files: Control Values
Example: /etc/pam.d/login File
The system_auth file
pam_unix.so
Network Authentication
auth Modules
Password Security
Password Policy
session Modules
Utilities and Authentication
PAM Troubleshooting
End of Unit 9
Red Hat Linux System Administration
Unit 1 - System Initialization
Objectives
Boot Sequence Overview
Boot Loader Components
GRUB and grub.conf
Starting the Boot Process: GRUB
Kernel Initialization
init Initialization
Run Levels
/etc/rc.d/rc.sysinit
/etc/rc.d/rc
System V run levels
/etc/rc.d/rc.local
Controlling Services
End of Unit 1
Unit 2 - Package Management
Objectives
RPM Package Manager
Installing and Removing Software
Updating a Kernel RPM
rpm Queries
rpm Verification
About yum
Using yum
Searching packages/files
Configuring Additional Repositories
Creating a private repository
Red Hat Network
Red Hat Network Server
Entitlements
Red Hat Network Client
End of Unit 2
Unit 3 - Kernel Services
Objectives
The Linux Kernel
Kernel Images and Variants
Kernel Modules
Kernel Module Utilities
Managing the initrd Image
Accessing Drivers Through /dev
Device Node Examples
Managing /dev With udev
Adding Files Under /dev
Kernel Configuration With /proc
/proc Examples
sysctl : Persistent Kernel Configuration
Exploring Hardware Devices
Monitoring Processes and Resources
Unit 4 - System Services
Objectives
Network Time Protocol
System Logging
syslog Configuration
XOrg: The X11 Server
XOrg Server Configuration
XOrg in runlevel 3
XOrg in runlevel 5
Remote X Sessions
SSH: Secure Shell
VNC: Virtual Network Computing
cron
Controlling Access to cron
System crontab Files
Daily Cron Jobs
The anacron System
CUPS
End of Unit 4
Unit 5 - User Administration
Objectives
Adding a New User Account
User Private Groups
Modifying / Deleting User Accounts
Group Administration
Password Aging Policies
Switching Accounts
sudo
Network Users
Authentication Configuration
Example: NIS Configuration
Example: LDAP Configuration
SUID and SGID Executables
SGID Directories
The Sticky Bit
Default File Permissions
Access Control Lists (ACLs)
SELinux
SELinux, continued
SELinux: Targeted Policy
SELinux: Management
End of Unit 5
Unit 6 - Filesystem Management
Objectives
Overview: Adding New Filesystems to the Filesystem Tree
Device Recognition
Disk Partitioning
Managing Partitions
Making Filesystems
Filesystem Labels
tune2fs
Mount Points and /etc/fstab
Mounting Filesystems with mount
Unmounting Filesystems
mount By Example
Handling Swap Files and Partitions
Mounting NFS Filesystems
Automounter
Direct Maps
gnome-mount
End of Unit 6
Unit 7 - Advanced Filesystem Management
Objectives
Configuring the Quota System
Setting Quotas for Users
Reporting Quota Status
What is Software RAID?
Software RAID Configuration
Software RAID Testing and Recovery
What is Logical Volume Manager (LVM)?
Creating Logical Volumes
Resizing Logical Volumes
Logical Volume Manager Snapshots
Using LVM Snapshots
Archiving tools: tar
Archiving Tools: dump/restore
Archiving Tools: rsync:
End of Unit 7
Unit 8 - Network Configuration
Objectives
Network Inferfaces
Driver Selection
Speed and Duplex Settings
IPv4 Addresses
Dynamic IPv4 Configuration
Static IPv4 Configuration
Device Aliases
Routing Table
Default Gateway
Configuring Routes
Verify IP Connectivity
Defining the Local Host Name
Local Resolver
Remote Resolvers
Verify DNS Connectivity
Network Configuration Utilities
Transparent Dynamic Configuration
Implementing IPv6
IPv6: Dynamic Interface Configuration
IPv6: StaticInterface Configuration
IPv6: Routing Configuration
New and Modified Utilities
End of Unit 8
Unit 9 - Installation
Objectives
Anaconda, the Red Hat Enterprise Linux Installer
First Stage: Starting the Installation
First Stage: Boot Media
Accessing the Installer
First Stage: Installation Method
Network Installation Server
Second Stage: Installation Overview
Configuring File Systems
Advanced Partitioning
Package Selection
First Boot: Post-Install Configuration
Kickstart
Starting a Kickstart Installation
Anatomy of a Kickstart File
Kickstart: Commands Section
Kickstart: Commands section
Kickstart: Packages Section
Kickstart: %pre, %post
End of Unit 9
Unit 10 - Virtualization with Xen
Objectives
Virtualization with Xen
Hardware Considerations
Preparing Domain-0
Virtual Resources
Domain-U Configuration
Installing a new Domain-U
Domain Management with xm
Activating Domains on boot
End of Unit 10
Unit 11 - Troubleshooting
Objectives
Method of Fault Analysis
Fault Analysis: Gathering Data
Things to Check: X
Things to Check: Networking
Order of the Boot Process
Filesystem Corruption
Filesystem Recovery
Recovery Run-levels
Rescue Environment
Rescue Environment Utilities
Rescue Environment Details
End of Unit 11