ADVANCED LINUX SYSTEM ADMINISTRATION
Course Information
Delivery Method: Classroom, Virtual Classroom
Course Duration: 3 Months
Course Level: Basic + Advanced Level
Audience Summary
This course is designed for system administrators who need to become familiar with the Linux operating system. It is also ideal for those who would like to prepare for the RedHat Certified Linux Administrator 7.0 Exam.
History of UNIX and LINUX
Basic concepts of Operating System, Kernel, Shell & File System structure
Basic concepts of Linux
Difference between Unix and Linux
Basic Commands of UNIX and LINUX
Creating, removing and modifying file and directories
Introduction to vim, nano, gedit, gvim
Soft link & Hard links
Classroom Exam
Basic Installation
Advance Installation
Creating and deleting users from the systems
Modifying users profile
Creating and deleting groups
Important system files related to user administration
Creating, deleting and modifying users, group, policy
Assigning files permissions
Assigning advanced files permissions SUID, SGID & Sticky bit
Creating, modifying and deleting ACL’s
Using fdisk, parted utilities for disk partitioning
Using mkfs, commands to create file systems
Mounting various file systems
Auto mounting of file system
Classroom Exam
Components of LVM
Implementations of LVM Storage
Creating Volume Groups & Logical Volumes
Extend a Logical Volume
Extending & reducing a Volume Group
Performing LVM Graphically
Creating a Snapshot of Logical Volumes
Creating a Swap
Mounting a File System
Extra File System Commands
Encryption with LUKS
Creating Encrypted Partitions
Mounting LUKS at Boot
Implementing RAID
RAID levels (0, 1 and 5) configuration using RAIDtools
Setting Up Quotas
Enabling Quotas
Quota Usage Reports
Creating cron Jobs
Crontab Security
Single Jobs with at
Introduction to various types of backup media
Backup and restoring data using dump & restore commands
Backup and restoring using tar, rsync and scp
Automation of Jobs
The Boot Process
Working with GRUB
The Config File
The GRUB Command Line
Runlevels
Runlevel Utilities
Rescue and Recovery Runlevels
Service Management
The Upstart Conversion
Configuring SUDO
Limiting SUDO Users
Using grep command
Pipelines & Redirections
Basic Regular Expressions
Working with RPM
Installing and Removing Packages
Querying and Verifying Packages
Doing It Again with Yum Server
Installing and Removing Packages
Searching for Packages
Configuring Additional Repositories
Making Your Own RPM
Creating an RPM
Creating Your Own Repository
Adding Your Custom Packages
The Red Hat Network
Registering Your System
Source File Compilation
Patch Management
Kernel Basics
Updating the Kernel
Tuning the Kernel
Set the Kernel Parameter
Working with Syslog
The Config File
Log Rotation
Centralized Logging
Centralized Logging (The RHEL5 Way)
User Login Events
Setting Up Networking
Static IP Addresses
Creating Static Routes
Troubleshooting Network Connections
Networking Utilities
Network Monitoring and Analysis
Configuration of LDAP Client
Configuration of Kerberos Client
Configuration of NIS Client
SELinux Overview
Working of SELinux
Customizing SELinux Policy and Boolean
Security Through TCP Wrappers
Firewall Rules Using iptables
Configuring iptables
Troubleshooting Firewall Rules
Working with NAT
Pluggable Authentication Module
Securing Access
PAM Troubleshooting
Managing Password Policies
Secure Shell (SSH)
Configuring SSH
SSH Security
Troubleshooting SSH
Public/Private Keys
Connecting Clients
Configure VNC Servers
Configure Desktop Environment
Connecting Clients
Access Windows OS on Linux Machine
Dynamic Host Configuration Protocol
Installing a DHCP Server
Configuring the DHCP Server
Configuring various clients for DHCP Server(Windows & Linux)
File Transfer Protocol
Installing an FTP Server
Configuring vsftp
FTP Security
Troubleshooting FTP
The Apache Web Server
Installing Apache
Configuring the Web Server
Troubleshooting Apache
Apache Security
Host-Based Security
User-Based Security
Setting Up HTTPS with SSL Certificate
CGI Applications
Virtual Hosts (IP base, Host base, Port base)
Basics of proxy services
Configuring proxy services
Creating ACL’s for controlling access to internet
Email Service Overview
SMTP with Postfix
Configuring Postfix
Postfix Security
Alias Mapping
Receiving Mail with Dovecot
Configuring Dovecot
Dovecot Security
Testing the Mail Server
What is Webmail
Installing SquirrelMail Application
Configure SquirrelMail Application
Access Webmail from Client side
Network Time Protocol
Installing a Time Server
Configuring NTP
Configure NTP Client
What is Samba
Configuring Samba
Samba Security
Samba Clients
Setting Up BIND
Configuring a DNS Server
Master Server
Slave Server
Caching-Only Server
Forwarding-Only Server
DNS Utilities and Troubleshooting
Configuring DNS for multiple domains and sub domains
Configuring various client (Windows & Linux)
IP Aliases
NIC Bonding
Routing
Network File Systems
Installing an NFS Server
Configuring NFS
NFS Security
Connecting Clients
Basics of NIS
Configuring NIS Servers and client
Creating NIS users
Work with iSCSI-SAN
Configure iSCSI Target
Access SAN Disk with Initiator
Mounting SAN Partition at Boot
Installing Webmin on Linux
Administrating Linux machine remotely
Using Webmin as a tool for configuring various services
Working with Virtual Machines
Setting Up the Physical Host
Installing a Virtual Client
Managing a Virtual Client
Monitoring Virtual Resources
Recovering the super user password
Recovering the boot loader (GRUB)
Troubleshooting Xserver problems
Troubleshooting network related problems
How to Build Script
Script Run