LINUX FOR UNIX ADMINISTRATORS (RED™ HAT 6 WITH REF TO SUSE 11) – GTU15

Course Description

This intensive course is an accelerated course combining the topics in the following courses:

^^

Duration

5 days

^^

Target Audience

Please contact us for further details.

^^

Course Prerequisites

Students should already be experienced Unix administrators. Fundamentals such as the Unix command line and how to edit files will not be covered in class. A good understanding of network concepts, the TCP/IP protocol suite, and basic Unix security is also assumed. The accelerated pace of this class makes it more difficult for unprepared students to keep up.

Less experienced students are encouraged to instead take the following courses:

If have any questions or doubts as to whether you meet the course pre-requisites for this course, or indeed are wondering which is the right course for you, please contact us to discuss your suitability for course attendance.

^^

Suggested Follow on Courses

There are a number of options of suitable follow-on courses, depending on your business needs. Please contact us for further details.

Supported Distributions

  • Red Hat Enterprise Linux 5 Update 4
  • SuSE Linux Enterprise 11

^^

Course Content

1. LINUX HARDWARE DISCOVERY, INTERACTION, AND CONTROL

  1. Hardware Discovery Tools
  2. Configuring New Hardware with hwinfo
  3. Hardware and System Clock
  4. Console
  5. Virtual Terminals
  6. Serial Ports
  7. SCSI Devices
  8. USB Configuration
  9. Defining a Printer
  10. Tape Drives
  11. Tape Libraries
  12. Managing Linux Device Files
  13. Kernel Hardware Info – /sys/
  14. /sys/ Structure
  15. udev
  16. Kernel Modules
  17. Configuring Kernel Components and Modules
  18. Handling Module Dependencies
  19. Configuring the Kernel via /proc/
  20. System Tools

2. BOOT PROCESS AND SYSV INIT

  1. Booting Linux on PCs
  2. GRUB Configuration
  3. Boot Parameters
  4. /sbin/init
  5. /etc/inittab
  6. /etc/rc.d/rc.sysinit
  7. SUSE /etc/init.d/boot
  8. Runlevel Implementation
  9. System Configuration Files
  10. RHEL6 Configuration Utilities
  11. SLES11 Configuration Utilities
  12. Typical SysV Init Script
  13. The /etc/rc.local File
  14. The /etc/init.d/*.local Files
  15. Managing Daemons
  16. Controlling Service Startup
  17. Shutdown and Reboot
  18. Run Level and Kernel Information

3. SOFTWARE MAINTENANCE

  1. RPM Features
  2. RPM Architecture
  3. Working With RPMs
  4. Querying and Verifying with rpm
  5. Updating the Kernel RPM
  6. Using the YUM command
  7. YUM package groups
  8. Configuring YUM
  9. YUM Repositories
  10. Installing Source RPM Packages
  11. Software Tools Comparison Matrix

4. FILESYSTEM ADMINISTRATION

  1. Partitioning Disks with fdisk
  2. Partitioning Disks with parted
  3. Filesystem Creation
  4. Mounting Filesystems
  5. Filesystem Maintenance
  6. Resizing Filesystems
  7. Swap
  8. Configuring Disk Quotas
  9. Setting Quotas
  10. Viewing and Monitoring Quotas
  11. Filesystem Attributes
  12. Backup Software
  13. Backup Examples
  14. Filesystem Creation and Management

5. LVM & RAID

  1. Logical Volume Management
  2. Implementing LVM
  3. Creating Logical Volumes
  4. Manipulating VGs & LVs
  5. Advanced LVM Concepts
  6. system-config-lvm
  7. SLES Graphical Disk Tool
  8. RAID Concepts
  9. Array Creation with mdadm
  10. Software RAID Monitoring
  11. Software RAID Control and Display
  12. LVM and RAID: Unix Tool Comparison

6. REMOTE STORAGE ADMINISTRATION

  1. Remote Storage Overview
  2. Remote Filesystem Protocols
  3. Remote Block Device Protocols
  4. File Sharing via NFS
  5. NFSv4
  6. NFS Clients
  7. NFS Server Configuration
  8. Implementing NFSv4
  9. AutoFS
  10. AutoFS Configuration
  11. Accessing Windows/Samba Shares from Linux
  12. SAN Multipathing
  13. Multipath Configuration
  14. Multipathing Best Practices
  15. iSCSI Architecture
  16. Open-iSCSI Initiator Implementation
  17. iSCSI Initiator Discovery
  18. iSCSI Initiator Node Administration
  19. Mounting iSCSI Targets at Boot
  20. iSCSI Multipathing Considerations

7. USER/GROUP ADMINISTRATION

  1. User and Group Concepts
  2. User Administration
  3. Modifying Accounts
  4. Group Administration
  5. Password Aging
  6. Default User Files
  7. Controlling Logins
  8. System Security Services Daemon (SSSD)
  9. Manual DS Client Configuration
  10. system-config-authentication
  11. SLES Graphical DS Client Configuration
  12. PAM Overview
  13. PAM Module Types
  14. PAM Order of Processing
  15. PAM Control Statements
  16. pam_wheel.so
  17. pam_limits.so
  18. User/Group Administration Comparison Matrix

8. SECURITY ADMINISTRATION

  1. Security Concepts
  2. Tightening Default Security
  3. Security Advisories
  4. File Access Control Lists
  5. Manipulating FACLs
  6. Viewing FACLs
  7. Backing Up FACLs
  8. File Creation Permissions with umask
  9. User Private Group Scheme
  10. Alternatives to UPG
  11. TCP Wrappers Concepts
  12. TCP Wrappers Concepts
  13. Xinetd
  14. Basic Firewall Activation
  15. Netfilter Concepts
  16. Using the iptables Command
  17. Common match_specs
  18. Connection Tracking
  19. AppArmor
  20. SELinux Security Framework
  21. SELinux Modes
  22. SELinux Commands
  23. Choosing an SELinux Policy
  24. SELinux Booleans
  25. Graphical SELinux Policy Tools
  26. (X)INETD and Firewalls

9. PROCESS ADMINISTRATION

  1. Automating Tasks
  2. at & cron Usage
  3. Anacron
  4. Viewing Processes
  5. Managing Processes
  6. Tuning Process Scheduling
  7. Process Accounting
  8. Enabling Process Accounting
  9. Setting Resource Limits via ulimit

10. NETWORKING

  1. Linux Network Interfaces
  2. Ethernet Hardware Tools
  3. Network Configuration with ip Command
  4. Configuring Routing Tables
  5. IP to MAC Address Mapping with ARP
  6. Starting and Stopping Interfaces
  7. NetworkManager
  8. DNS Clients
  9. DHCP Clients
  10. Network Diagnostics
  11. Information from netstat and ss
  12. Managing Network-Wide Time
  13. Continual Time Sync with NTP
  14. Configuring NTP Clients
  15. Multiple IP Addresses
  16. Enabling IPv6
  17. Interface Bonding
  18. Interface Bridging
  19. 802.1q VLANS
  20. Tuning Kernel Network Settings
  21. Network Configuration Tools

11. THE X WINDOW SYSTEM

  1. X Modularity
  2. X.Org Drivers
  3. Configuring X Manually
  4. Automatic X Configuration
  5. Automatic X Configuration – SLES
  6. The X11 Protocol and Display Names
  7. Display Managers and Graphical Login
  8. Starting X Apps Automatically
  9. X Access Control
  10. Remote X Access (historical/insecure approach)
  11. Remote X Access (modern/secure approach)
  12. XDMCP
  13. Remote Graphical Access With VNC and RDP
  14. Specialized X Servers
  15. Enabling the Graphical User Interface

12. BIND CONCEPTS AND CONFIGURATION

  1. The Domain Name Space
  2. Delegation and Zones
  3. Server Roles
  4. Resolving Names
  5. Resolving IP Addresses
  6. Basic BIND Administration
  7. Configuring the Resolver
  8. Testing Resolution
  9. rndc Key Configuration
  10. BIND Configuration Files
  11. named.conf Syntax
  12. named.conf Options Block
  13. Creating a Site-Wide Cache
  14. Zones In named.conf
  15. Zone Database File Syntax
  16. SOA – Start of Authority
  17. A & PTR – Address & Pointer Records
  18. NS – Name Server
  19. CNAME & MX – Alias & Mail Host
  20. Abbreviations and Gotchas
  21. $ORIGIN and $GENERATE

13. OPENLDAP

  1. OpenLDAP: Server Architecture
  2. OpenLDAP: Backends
  3. OpenLDAP: Replication
  4. OpenLDAP: Configuration Options
  5. OpenLDAP: Configuration Sections
  6. OpenLDAP: Global Parameters
  7. OpenLDAP: Database Parameters
  8. OpenLDAP Server Tools
  9. OpenLDAP Client Tools
  10. LDIF: LDAP Data Interchange Format
  11. Enabling LDAP-based Login
  12. System Security Services Daemon (SSSD)

14. USING VSFTPD AND APACHE

  1. vsftpd
  2. Configuring vsftpd
  3. Anonymous FTP with vsftpd
  4. HTTP Operation
  5. Apache Architecture
  6. Apache Configuration Files
  7. httpd.conf – Server Settings
  8. httpd.conf – Main Configuration
  9. httpd.conf – VirtualHost Configuration
  10. Virtual Hosting DNS Implications
  11. Dynamic Shared Objects
  12. Adding Modules to Apache
  13. Apache Logging
  14. Log Analysis

15. APACHE SECURITY

  1. Delegating Administration
  2. Directory Protection
  3. Directory Protection with AllowOverride
  4. Common Uses for .htaccess
  5. Symmetric Encryption Algorithms
  6. Asymmetric Encryption Algorithms
  7. Digital Certificates

16. THE SQUID PROXY SERVER

  1. Squid Overview
  2. Squid File Layout
  3. Squid Access Control Lists
  4. Applying Squid ACLs
  5. Tuning Squid & Configuring Cache Hierarchies
  6. Bandwidth Metering
  7. Monitoring Squid
  8. Proxy Client Configuration

17. SAMBA CONCEPTS AND CONFIGURATION

  1. Introducing Samba
  2. Samba Daemons
  3. NetBIOS and NetBEUI
  4. Accessing Windows/Samba Shares from Linux
  5. Samba Utilities
  6. Samba Configuration Files
  7. The smb.conf File
  8. Mapping Permissions and ACLs
  9. Mapping Linux Concepts
  10. Mapping Case Sensitivity
  11. Sharing Home Directories
  12. Sharing Printers
  13. Share Authentication
  14. Share-Level Access
  15. User-Level Access
  16. Mapping Users
  17. Samba Account Database
  18. User Share Restrictions

18. POSTFIX

  1. Postfix Features
  2. Postfix Components
  3. Postfix Configuration
  4. master.cf
  5. main.cf
  6. Postfix Map Types
  7. Postfix Pattern Matching
  8. Virtual Domains
  9. Postfix Mail Filtering
  10. Configuration Commands
  11. Management Commands
  12. Postfix Logging
  13. SMTP AUTH Server and Relay Control
  14. SMTP AUTH Clients
  15. TLS Server Configuration
  16. Postfix Client Configuration for TLS
  17. Ensuring TLS Security

19. MAIL SERVICES AND RETRIEVAL

  1. Procmail
  2. SpamAssassin
  3. amavisd-new Mail Filtering
  4. Accessing Email
  5. The IMAP4 Protocol
  6. Cyrus IMAP/POP3 Server
  7. Cyrus IMAP MTA Integration
  8. Cyrus Mailbox Administration

20. MONITORING & TROUBLESHOOTING

  1. System Status – Memory
  2. System Status – I/O
  3. System Status – CPU
  4. Performance Trending with sar
  5. Troubleshooting Basics: The Process
  6. Troubleshooting Basics: The Tools
  7. System Logging
  8. Syslog-ng
  9. Rsyslog
  10. /etc/rsyslog.conf
  11. Log Management
  12. Log Anomaly Detector
  13. strace and ltrace
  14. Common Problems
  15. Troubleshooting Incorrect File Permissions
  16. Inability to Boot
  17. Typos in Configuration Files
  18. Corrupt Filesystems
  19. Rescue Environment
  20. SUSE Rescue Environment
  21. Process Tools

21. INSTALLING RHEL6

  1. Anaconda: An Overview
  2. Anaconda: Booting the System
  3. Anaconda: Common Boot Options
  4. Anaconda: Loading Anaconda and Packages
  5. Anaconda: Storage Options
  6. Anaconda: Troubleshooting
  7. FirstBoot
  8. Kickstart
  9. A Typical Install

22. INSTALLING SLES11

  1. Installation Choices
  2. DVD-ROM Install Media
  3. Network Installation
  4. SLP for SUSE Linux Installation
  5. Local Hard Drive Installation
  6. The linuxrc Program
  7. Install Program Interface
  8. Installation Diagnostics
  9. Language/Keyboard Selection and EULA
  10. Installation Mode
  11. Clock and Time Zone
  12. Desktop Selection
  13. Server Base Scenario
  14. The YaST Installer Design
  15. Disk Partitioning
  16. Boot Loader Configuration
  17. Software Package Selection
  18. Kernel Crash Dump Configuration
  19. Confirmation and File Installation
  20. Setting the Root Password
  21. Hostname and Domain Name
  22. Network Configuration
  23. SLES Services Configuration
  24. Adding a User Account
  25. Release Notes
  26. Final Installation Hub
  27. Installation Complete and AutoYaST2 “Cloning”
  28. Using AutoYaST2 files
  29. Creating AutoYaST2 Files
  30. linuxrc Automation

^^

See more Linux/Unix courses