LPIC-2 PART 2 CERTIFICATION COURSE (Linux Engineer) – GTU11

Course Description

lpic-2

This course prepares students to take the LPI 202 exam of the LPIC-2 certification. The Linux Professional Institute (LPI) is the go-to certification body for vendor independent Linux certifications. This course covers more advanced Linux skills such as system management and networking. Students will feel confident taking the LPI LPIC-2 202 exam with in classroom assessments and practice exams.

This course is 5 days in duration and allows for delegates to attend their LPI-202 exam in the afternoon of day 5, if they wish.

^^

Duration

5 days

^^

Target Audience

This course is suitable for candidates who have completed the LPIC-2 Part 1 certification course and successfully passed the LPIC-2 201. By passing the exam related to this course, you will be awarded your full LPIC-2 Linux Network Certification.

^^

Course Prerequisites

Attendance of the following courses, or having passed the related exams:

If you have any questions or doubts as to whether you meet the pre-requisites for this course, or indeed are wondering which course best suits you, please contact us to discuss your suitability for course attendance.

Supported Distributions

  • Red Hat Enterprise Linux 6
  • SUSE Linux Enterprise 11

^^

Suggested Follow on Courses

There are a number of options of suitable follow-on courses, depending on your business needs. Please Contact Us for further details.

^^

Course Content

1. IMPLEMENTING A WEB SERVER

  1. LPI Objectives Covered
  2. Apache History and Status
  3. Apache Architecture
  4. Default Configuration
  5. Installing PHP
  6. Apache Configuration Files
  7. httpd.conf – Server Settings
  8. httpd.conf – Main Configuration
  9. httpd.conf – VirtualHost Configuration
  10. Apache Logging
  11. Log Analysis
  12. Delegating Administration
  13. Directory Protection
  14. Directory Protection with AllowOverride
  15. Common Uses for .htaccess
  16. Apache Troubleshooting

2. MAINTAINING A WEB SERVER

  1. LPI Objectives Covered
  2. HTTP Virtual Servers
  3. DNS Implications
  4. Security Implications
  5. IP-based Virtual Host
  6. Name-based Virtual Host
  7. Symmetric Encryption Algorithms
  8. Asymmetric Encryption Algorithms
  9. Digital Certificates
  10. SSL/HTTPS and Apache
  11. SSL Using mod_ssl.so

3. IMPLEMENTING A PROXY SERVER AND DHCP CONFIGURATION

  1. LPI Objectives Covered
  2. Squid Overview
  3. Squid File Layout
  4. Squid Access Control Lists
  5. Applying Squid ACLs
  6. Monitoring Squid
  7. DHCP Protocol Operation
  8. Configuring a DHCP server

4. SAMBA SERVER CONFIGURATION

  1. LPI Objectives Covered
  2. Introducing Samba
  3. Samba Daemons
  4. Accessing Windows/Samba Shares from Linux
  5. Samba Utilities
  6. Samba Configuration Files
  7. The smb.conf File
  8. Share Authentication
  9. Share-Level Access
  10. User-Level Access
  11. Mapping Users
  12. SMB and Passwords
  13. The smbpasswd Database
  14. User Share Restrictions

 5. NFS SERVER CONFIGURATION AND SECURING FTP SERVERS

  1. LPI Objectives Covered
  2. File Sharing via NFS
  3. NFSv4
  4. NFS Clients
  5. NFS Server Configuration
  6. The FTP Protocol
  7. FTP Operation
  8. Active Mode FTP
  9. Passive Mode FTP
  10. vsftpd
  11. Configuring vsftpd
  12. Anonymous FTP with vsftpd
  13. Pure-FTPd
  14. Pure-FTPd Tools
  15. ProFTPD

6. PAM AUTHENTICATION AND LDAP CLIENT USAGE

  1. LPI Objectives Covered
  2. PAM Overview
  3. PAM Module Types
  4. PAM Order of Processing
  5. PAM Control Statements
  6. PAM Modules
  7. pam_unix.so
  8. pam_unix2.so
  9. pam_limits.so
  10. pam_cracklib.so
  11. pam_listfile.so
  12. LDAP
  13. What LDAP Provides
  14. LDAP Concepts
  15. LDAP Organization
  16. Entry Referencing
  17. Online LDAP Data Manipulation
  18. Querying LDAP Databases

7. USING E-MAIL SERVERS

  1. LPI Objectives Covered
  2. SMTP
  3. SMTP Terminology
  4. SMTP Architecture
  5. SMTP Commands
  6. SMTP Session
  7. Sendmail Architecture
  8. Sendmail Components
  9. Sendmail Configuration
  10. Databases
  11. Sendmail Remote Configuration
  12. Controlling Access
  13. Exim
  14. Postfix Features
  15. Postfix Architecture
  16. Postfix Components
  17. Postfix Configuration
  18. master.cf
  19. main.cf
  20. Virtual Domains
  21. Configuration Commands
  22. Postfix Logging

8. MANAGING LOCAL AND REMOTE E-MAIL DELIVERY

  1. LPI Objectives Covered
  2. Filtering Email
  3. Procmail
  4. SpamAssassin
  5. Accessing Email
  6. The IMAP4 Protocol
  7. Courier IMAP
  8. Dovecot POP3/IMAP Server
  9. Fetchmail

9. CONFIGURING A ROUTER AND SECURE SHELL (SSH)

  1. LPI Objectives Covered
  2. Linux as a Router
  3. Configuring Routing Tables
  4. Using the iptables Command
  5. Netfilter Rule Syntax
  6. Netfilter Concepts
  7. Targets
  8. Common match_specs
  9. Netfilter: Stateful Packet Filter Firewall
  10. Connection Tracking
  11. Address Translation
  12. Configuring NAT and PAT
  13. Secure Shell
  14. ssh and sshd Configuration
  15. Accessing Remote Shells
  16. SSH Port Forwarding
  17. Transferring Files
  18. SSH Key Management
  19. ssh-agent

10. SECURITY TASKS AND TCP WRAPPER

  1. LPI Objectives Covered
  2. Security Advisories
  3. Discovering Hosts
  4. Netcat
  5. Nessus Insecurity Scanner
  6. Configuring OpenVAS
  7. Intrusion Detection Systems
  8. Snort Rules
  9. Writing Snort Rules
  10. TCP Wrappers
  11. The /etc/hosts.allow and /etc/hosts.deny Files
  12. /etc/hosts.{allow,deny} Shortcuts
  13. Advanced TCP Wrappers
  14. Xinetd Configuration and Access Control
  15. Xinetd Connection Limiting
  16. Xinetd: Resource limits, redirection, logging

 11. IDENTIFYING BOOT STAGES AND TROUBLESHOOTING BOOTLOADERS

  1. LPI Objectives Covered
  2. Partition Considerations
  3. Booting Linux on PCs
  4. LILO Options
  5. LILO Configuration
  6. GRUB Configuration
  7. /etc/inittab
  8. Typical SysV Init Script
  9. System Configuration Files
  10. Controlling Service Startup
  11. Managing Daemons
  12. Inability to Boot
  13. Troubleshooting With GRUB

12. GENERAL TROUBLESHOOTING

  1. LPI Objectives Covered
  2. Important Log Files
  3. Hardware Discovery Tools
  4. Configuring New Hardware with Kudzu
  5. Configuring New Hardware with hwinfo
  6. USB Devices
  7. Kernel Modules
  8. Handling Module Dependencies
  9. Displaying Binary Files
  10. lsof and fuser
  11. Kernel Modules Troubleshooting
  12. strace and ltrace

 13. TROUBLESHOOTING SYSTEM RESOURCES

  1. LPI Objectives Covered
  2. Key Environment Variables
  3. Locales
  4. sh: Configuration Files
  5. Kernel Tuning
  6. Kernel Tuning via /proc/sys/
  7. Default User Files
  8. Manually Installed Shared Libraries

14. TROUBLESHOOTING ENVIRONMENT CONFIGURATIONS

  1. LPI Objectives Covered
  2. Logging In
  3. User Administration
  4. Group Administration
  5. User and Group Concepts
  6. Password Aging
  7. Gathering Login Session Info
  8. cron
  9. The crontab Command
  10. crontab Format
  11. /etc/cron.*/ Directories
  12. System Logging
  13. /etc/syslog.

^^

See more Linux/Unix courses