Course Information

Delivery Method: Classroom, Virtual Classroom
Course Duration: 3 Months
Course Level: Basic + Advanced Level

Audience Summary

This course is designed for system administrators who need to become familiar with the Linux operating system. It is also ideal for those who would like to prepare for the RedHat Certified Linux Administrator 7.0 Exam.

History of UNIX and LINUX
Basic concepts of Operating System, Kernel, Shell & File System structure
Basic concepts of Linux
Difference between Unix and Linux

Basic Commands of UNIX and LINUX
Creating, removing and modifying file and directories
Introduction to vim, nano, gedit, gvim
Soft link & Hard links
Classroom Exam

Basic Installation
Advance Installation

Creating and deleting users from the systems
Modifying users profile
Creating and deleting groups
Important system files related to user administration
Creating, deleting and modifying users, group, policy

Assigning files permissions
Assigning advanced files permissions SUID, SGID & Sticky bit
Creating, modifying and deleting ACL’s

Using fdisk, parted utilities for disk partitioning
Using mkfs, commands to create file systems
Mounting various file systems
Auto mounting of file system
Classroom Exam

Components of LVM
Implementations of LVM Storage
Creating Volume Groups & Logical Volumes
Extend a Logical Volume
Extending & reducing a Volume Group
Performing LVM Graphically
Creating a Snapshot of Logical Volumes

Creating a Swap
Mounting a File System
Extra File System Commands
Encryption with LUKS
Creating Encrypted Partitions
Mounting LUKS at Boot

Implementing RAID
RAID levels (0, 1 and 5) configuration using RAIDtools

Setting Up Quotas
Enabling Quotas
Quota Usage Reports

Creating cron Jobs
Crontab Security
Single Jobs with at

Introduction to various types of backup media
Backup and restoring data using dump & restore commands
Backup and restoring using tar, rsync and scp
Automation of Jobs

The Boot Process
Working with GRUB
The Config File
The GRUB Command Line
Runlevel Utilities
Rescue and Recovery Runlevels
Service Management
The Upstart Conversion

Configuring SUDO
Limiting SUDO Users

Using grep command
Pipelines & Redirections
Basic Regular Expressions

Working with RPM
Installing and Removing Packages
Querying and Verifying Packages
Doing It Again with Yum Server
Installing and Removing Packages
Searching for Packages
Configuring Additional Repositories
Making Your Own RPM
Creating an RPM
Creating Your Own Repository
Adding Your Custom Packages
The Red Hat Network
Registering Your System
Source File Compilation
Patch Management

Kernel Basics
Updating the Kernel
Tuning the Kernel
Set the Kernel Parameter

Working with Syslog
The Config File
Log Rotation
Centralized Logging
Centralized Logging (The RHEL5 Way)
User Login Events

Setting Up Networking
Static IP Addresses
Creating Static Routes
Troubleshooting Network Connections
Networking Utilities
Network Monitoring and Analysis

Configuration of LDAP Client
Configuration of Kerberos Client
Configuration of NIS Client

SELinux Overview
Working of SELinux
Customizing SELinux Policy and Boolean

Security Through TCP Wrappers
Firewall Rules Using iptables
Configuring iptables
Troubleshooting Firewall Rules
Working with NAT
Pluggable Authentication Module
Securing Access
PAM Troubleshooting
Managing Password Policies

Secure Shell (SSH)
Configuring SSH
SSH Security
Troubleshooting SSH
Public/Private Keys
Connecting Clients

Configure VNC Servers
Configure Desktop Environment
Connecting Clients
Access Windows OS on Linux Machine

Dynamic Host Configuration Protocol
Installing a DHCP Server
Configuring the DHCP Server
Configuring various clients for DHCP Server(Windows & Linux)

File Transfer Protocol
Installing an FTP Server
Configuring vsftp
FTP Security
Troubleshooting FTP

The Apache Web Server
Installing Apache
Configuring the Web Server
Troubleshooting Apache
Apache Security
Host-Based Security
User-Based Security
Setting Up HTTPS with SSL Certificate
CGI Applications
Virtual Hosts (IP base, Host base, Port base)

Basics of proxy services
Configuring proxy services
Creating ACL’s for controlling access to internet

Email Service Overview
SMTP with Postfix
Configuring Postfix
Postfix Security
Alias Mapping
Receiving Mail with Dovecot
Configuring Dovecot
Dovecot Security
Testing the Mail Server

What is Webmail
Installing SquirrelMail Application
Configure SquirrelMail Application
Access Webmail from Client side

Network Time Protocol
Installing a Time Server
Configuring NTP
Configure NTP Client

What is Samba
Configuring Samba
Samba Security
Samba Clients

 Setting Up BIND
Configuring a DNS Server
Master Server
Slave Server
Caching-Only Server
Forwarding-Only Server
DNS Utilities and Troubleshooting
Configuring DNS for multiple domains and sub domains
Configuring various client (Windows & Linux)

IP Aliases
NIC Bonding

Network File Systems
Installing an NFS Server
Configuring NFS
NFS Security
Connecting Clients

 Basics of NIS
Configuring NIS Servers and client
Creating NIS users

Work with iSCSI-SAN
Configure iSCSI Target
Access SAN Disk with Initiator
Mounting SAN Partition at Boot

 Installing Webmin on Linux
Administrating Linux machine remotely
Using Webmin as a tool for configuring various services

Working with Virtual Machines
Setting Up the Physical Host
Installing a Virtual Client
Managing a Virtual Client
Monitoring Virtual Resources

Recovering the super user password
Recovering the boot loader (GRUB)
Troubleshooting Xserver problems
Troubleshooting network related problems

How to Build Script

Script Run

Curious about Linux but not sure how to traverse this unfamiliar territory? We’ll help you get started so you can join the growing ranks of Linux users and get a better Career...