Course Information

Delivery Method: Classroom, Virtual Classroom
Course Duration: 3 Months
Course Level: Basic + Advanced Level

Audience Summary

This course is designed for system administrators who need to become familiar with the Linux operating system. It is also ideal for those who would like to prepare for the RedHat Certified Linux Administrator 7.0 Exam.

Ch-1 Introduction to UNIX and LINUX

History of UNIX and LINUX
Basic concepts of Operating System, Kernel, Shell & File System structure
Basic concepts of Linux
Difference between Unix and Linux

Ch-2 Working with File and Directories

Basic Commands of UNIX and LINUX
Creating, removing and modifying file and directories
Introduction to vim, nano, gedit, gvim
Soft link & Hard links
Classroom Exam

Ch-3 Installation of LINUX(RedHat, Ubuntu, Suse)

Basic Installation
Advance Installation

Ch-4 User and Group Administration

Creating and deleting users from the systems
Modifying users profile
Creating and deleting groups
Important system files related to user administration
Creating, deleting and modifying users, group, policy

Ch-5 Advanced File Permissions

Assigning files permissions
Assigning advanced files permissions SUID, SGID & Sticky bit
Creating, modifying and deleting ACL’s

Ch-6 File System

Using fdisk, parted utilities for disk partitioning
Using mkfs, commands to create file systems
Mounting various file systems
Auto mounting of file system
Classroom Exam

Ch-7 Logical Volume Management

Components of LVM
Implementations of LVM Storage
Creating Volume Groups & Logical Volumes
Extend a Logical Volume
Extending & reducing a Volume Group
Performing LVM Graphically
Creating a Snapshot of Logical Volumes

Ch-8 Managing Partitions & File Systems

Creating a Swap
Mounting a File System
Extra File System Commands
Encryption with LUKS
Creating Encrypted Partitions
Mounting LUKS at Boot

Ch-9 RAID (Redundant Array of InExpensive Disks)

Implementing RAID
RAID levels (0, 1 and 5) configuration using RAIDtools

Ch–10 Managing File System Quotas

Setting Up Quotas
Enabling Quotas
Quota Usage Reports

Ch–11 Automation with cron and at

Creating cron Jobs
Crontab Security
Single Jobs with at

Ch–12 System Backup and Recovery

Introduction to various types of backup media
Backup and restoring data using dump & restore commands
Backup and restoring using tar, rsync and scp
Automation of Jobs

Ch–13 System Initialization

The Boot Process
Working with GRUB
The Config File
The GRUB Command Line
Runlevel Utilities
Rescue and Recovery Runlevels
Service Management
The Upstart Conversion

Ch–14 Enhanced User Security

Configuring SUDO
Limiting SUDO Users

Ch–15 Regular Expressions, Pipelines & I/O Redirection

Using grep command
Pipelines & Redirections
Basic Regular Expressions

Ch–16 Package Management

Working with RPM
Installing and Removing Packages
Querying and Verifying Packages
Doing It Again with Yum Server
Installing and Removing Packages
Searching for Packages
Configuring Additional Repositories
Making Your Own RPM
Creating an RPM
Creating Your Own Repository
Adding Your Custom Packages
The Red Hat Network
Registering Your System
Source File Compilation
Patch Management

Ch-17 The Kernel

Kernel Basics
Updating the Kernel
Tuning the Kernel
Set the Kernel Parameter

Ch-18 System Logging Server

Working with Syslog
The Config File
Log Rotation
Centralized Logging
Centralized Logging (The RHEL5 Way)
User Login Events

Ch–19 Network Configuration

Setting Up Networking
Static IP Addresses
Creating Static Routes
Troubleshooting Network Connections
Networking Utilities
Network Monitoring and Analysis

Ch–20 LDAP

Configuration of LDAP Client
Configuration of Kerberos Client
Configuration of NIS Client

Ch–21 SELinux Security

SELinux Overview
Working of SELinux
Customizing SELinux Policy and Boolean

Ch–22 System Security

Security Through TCP Wrappers
Firewall Rules Using iptables
Configuring iptables
Troubleshooting Firewall Rules
Working with NAT
Pluggable Authentication Module
Securing Access
PAM Troubleshooting
Managing Password Policies

Ch–23 Remote Access Management

Secure Shell (SSH)
Configuring SSH
SSH Security
Troubleshooting SSH
Public/Private Keys
Connecting Clients

Ch–24 Remote Desktop Management

Configure VNC Servers
Configure Desktop Environment
Connecting Clients
Access Windows OS on Linux Machine

Ch–25 DHCP Server

Dynamic Host Configuration Protocol
Installing a DHCP Server
Configuring the DHCP Server
Configuring various clients for DHCP Server(Windows & Linux)

Ch–26 FTP Server

File Transfer Protocol
Installing an FTP Server
Configuring vsftp
FTP Security
Troubleshooting FTP

Ch–27 Web Server (Apache)

The Apache Web Server
Installing Apache
Configuring the Web Server
Troubleshooting Apache
Apache Security
Host-Based Security
User-Based Security
Setting Up HTTPS with SSL Certificate
CGI Applications
Virtual Hosts (IP base, Host base, Port base)

Ch–28 Proxy Server (Squid)

Basics of proxy services
Configuring proxy services
Creating ACL’s for controlling access to internet

Ch–29 Email Server (Postfix)

Email Service Overview
SMTP with Postfix
Configuring Postfix
Postfix Security
Alias Mapping
Receiving Mail with Dovecot
Configuring Dovecot
Dovecot Security
Testing the Mail Server

Ch–30 Webmail

What is Webmail
Installing SquirrelMail Application
Configure SquirrelMail Application
Access Webmail from Client side

Ch–31 NTP Server

Network Time Protocol
Installing a Time Server
Configuring NTP
Configure NTP Client

Ch–32 Samba Server

What is Samba
Configuring Samba
Samba Security
Samba Clients

Ch–33 DNS Server

 Setting Up BIND
Configuring a DNS Server
Master Server
Slave Server
Caching-Only Server
Forwarding-Only Server
DNS Utilities and Troubleshooting
Configuring DNS for multiple domains and sub domains
Configuring various client (Windows & Linux)

Ch-34 Advanced Networking

IP Aliases
NIC Bonding

Ch-35 Network File System (NFS)

Network File Systems
Installing an NFS Server
Configuring NFS
NFS Security
Connecting Clients

Ch–36 Network Information System (NIS)

 Basics of NIS
Configuring NIS Servers and client
Creating NIS users

Ch–37 ISCSI (SAN Storage)

Work with iSCSI-SAN
Configure iSCSI Target
Access SAN Disk with Initiator
Mounting SAN Partition at Boot

Ch–38 Web based Administration

 Installing Webmin on Linux
Administrating Linux machine remotely
Using Webmin as a tool for configuring various services

Ch–39 Virtualization with KVM

Working with Virtual Machines
Setting Up the Physical Host
Installing a Virtual Client
Managing a Virtual Client
Monitoring Virtual Resources

Ch-40 Troubleshooting your system

Recovering the super user password
Recovering the boot loader (GRUB)
Troubleshooting Xserver problems
Troubleshooting network related problems

Ch-41 Basic Shell Scripting