Professional Documents
Culture Documents
Linux 10.2 Course - Contents
Linux 10.2 Course - Contents
System & Network Administration using Linux
This course will cover all aspects of RHCE (Red Hat Certified Engineer) Certification and the basics of Linux in detail. This
course is also designed for those new bees in Linux, Technocrats, Linux Administrator, Windows Administrator, who want
to make the best of Linux capabilities in IT organizations. This course is completely targeted for industrial Environment
with In Detailed Practical Approach to LINUX. During this course you will be exposed to Such Linux Capabilities Which are
an essential for building great secured Linux Corporate Server Environment.
Course Contents
Introduction to Unix, Installation of Linux
User, Group Administration, ACL
Automation of Jobs, Disk Partitions
Mounting File Systems
Backup and recovery, Printer Configuration
Basics of NFS, AutoFS
Kickstart Installation, Quotas
DHCP, NIS, DNS, Mail, Web, VSFTP, Squid, Samba
Securing your Linux Server with Firewall & SELinux
Troubleshooting your Linux System
Course Details
Introduction to UNIX & LINUX Advanced File Permissions
History of UNIX and LINUX Explain UNIX/Linux file security & permissions
Operating System Concept, Kernel, Shell & File Setting Permissions with chmod
Identification of various Linux distributors including Changing User and Group Ownership: chown, chgrp
Debian, Mandrake, RedHat etc. Advance File Permissions: set user id (suid bit), set
System structure group id (sgid bit) and sticky bit
Basic concepts of Linux Creating, modifying and deleting ACL’s
Commands of Linux File System Management
Installation of Linux Understanding linux file systems like ext2, ext3, ext4
Planning a Linux Installation Concept of Inodes and Directories
Pre‐Installation Planning Symbolic Links: Hard and Soft Link
Hardware Requirements Managing Partitions: fdisk, sfdisk, parted, partprobe
Portioning Requirements Making File systems: mkfs, mkfs.ext3
Dual Booting with Windows Operating System Adjusting Filesytem parameters: tune2fs
installation, administration of Linux with VMware Mount Points and /etc/fstab ‐ explore File System
Introduction to XEN ( virtualization software) Mounting File systems with mount and Unmount
RedHat Linux Boot Process Use FDISK to create a swap partition
Linux Systems Management Concepts & Applications Additional swap space using swapon & swapoff
Explain Linux Boot process Backup and Recovery
Explain and demonstrate Runlevel (0 ‐ 6) concepts Backup concepts
Demonstrate Daemon/Service management with Backup software: mt, tar, cpio, dump and restore, dd
(chkconfig/ntsysv/redhat‐config‐services) Remote Backup of a server using rsync
User profile implementation logic and concepts ‐ Roll your own: Performing a backup, Verifying Backups
Identify startup log files & DMESG exploration and Restore from backup
Startup & Shutdown Scripts Network ‐ Physical & Logical Configuration
System Monitoring & Process Management Understand network device recognition
Process creation: fork and exec Configure network interfaces: Ethernet(eth0)
Demonstrate usage of system monitoring tools Static and Dynamic IPV4 Configuration
Managing Background Process: jobs, fg, bg, Ctrl Z Network IP aliasing (Device Aliases)
User and Group Administration Understand IP route configuration
User Administration and Management Local Resolver: /etc/hosts
Group Administration Remote Resolver: /etc/resolv.conf,
Important system files related to user administration Software Package Administration
User profile implementation logic and concepts Discuss RedHat® Package Manager (RPM) concepts,
The Linux login process and login authentication features and applications
User Login Activity: Whois, Who, w, wc Demonstrate usage of RPM for available packages
Simple Sudo Examples Demonstrate usage of RPM to import public keys of
Temporarily Gaining root Privileges package publishers
The /etc/sudoers File Demonstrate usage of RPM to upgrade packages
Simple /etc/sudoers Examples Demonstrate usage of RPM to freshen packages
Granting All Access to Specific Users Demonstrate usage of RPM to remove packages
CRON Process Scheduling FTP Server (vsftp daemon)
Identify various CRON entries and schedules Implement Very Secure VSFTPD File Transfer Protocol
Define custom cron jobs system-wide (FTP) services
Define custom cron jobs user-wide Implement anonymous FTPD
Evaluate results of cron jobs Implement user‐level FTPD access
TCP Wrappers and Xinetd super server concepts Implement FTPD banners
Concept: TCP Wrappers Disable anonymous access
TCP Wrappers Configuration Proxy Server (Squid)
Identify Xinetd based services Configure web browser to utilize proxy services
/etc/xinetd.d/ and /etc/xinetd.conf Grant permissions to permit local hosts to utilize proxy
Enable & disable Xinetd‐controlled services services
Implement of Xinetd controlled services Configure SQUID Define an ACL for authorized IP
Remote Administration networks
Secure SHELL (SSH) Apply the ACL using http_access and Test multiple
Putty HTTP‐based ACLs
Telnet Configure transparent proxy services
VNC server/viewer Password Authentication based Proxy Server
NFS Samba Service
NFS Server Configuration and NFS Clients Implement Linux & Windows Integration via Samba
Setup an NFS server and export directories Explore Samba Configuration files
Configure NIS client as part of a domain Mount Windows shares seamlessly using Samba File
Review /etc/exports parameters and options System (SMBFS)
Evaluate access to NFS exports Samba Client Tools: smbclient, nmblookup, mounts
Network Information Service (NIS) Configure FSTAB to support repetitive mounts
Creating a NIS Master Server Install Web‐based Administration Tool (SWAT)
NIS Client Configuration Troubleshooting your system
Exploring Configuration Files: /etc/sysconfig/network Recovering the super user password
and /etc/yp.conf Recovering the boot loader (GRUB)
Adding New NIS Users Troubleshooting Xserver problems
Configure autofs to access an NFS export Troubleshooting network related problems
/etc/auto.master and /etc/auto.misc Implementation of RAID, LVM and Quota
DNS with BIND 9 Understanding different RAID Levels(0,1,5 and 10)
Configure BIND as a primary DNS server Software RAID Configuration
Test primary name resolution from Linux hosts Software RAID Testing and Recovery
Configure BIND as a secondary(slave) DNS server Discuss Logical Volume Manager (LVM)
Evaluate results of BIND configuration using DIG Creating Logical Volumes
Configure DNS zones Resizing Logical Volumes
Configure zone transfers Logical Volume Manager Snapshots
Zone Database File Syntax: SOA, A, PTR, NS,CNAME, Using LVM Snapshots
Alias, and MX‐Mail Host Quota management ‐ user‐based, group‐based and
Allowing Queries, Recursion and Allowing Transfers disk‐based quota implementation
Dynamic Host Configuration Protocol (DHCP) Enable file system quota
Explain the various steps of the DHCP process Setting Quotas for users: setquota, edquota, quotaon,
Configure global & scope‐level DHCP options quotaoff, quotacheck
Configure IP reservations based on MAC addresses Quota Concept:Soft Limit, Hard Limit and Grace Period
Enable Linux DHCP services Reporting Quota Status: quota, repquota and
Mail Server (SMTP, POP3, IMAP) warnquota
SMTP theory Web based Administration
MTA, MDA, MUA Concept Installing Webmin on Linux
Configure mail server to accept internet mail Administrating Linux machine remotely
Blocking spam email id, ips with access database Using Webmin as a tool for configuring various services
Relay access to my network through access database on Linux
Mail Forwarding IPTABLES (Netfilter Linux Kernel‐based Firewall)
Implement POP3/IMAP services Introduction to Firewalls
Implement Secure IMAP services using SSL (IMAPS) NAT, SNAT, DNAT, PREROUTE and POSTROUTE
Implement webmail using Squirrel Mail Implement IP Forwarding between disparate subnets
Apache Web Server Implementation Discuss IPTABLES/Netfilter Concepts
Discuss Apache server's features and concepts Explore default tables and chains
Examine Apache ‐ Red Hat HTTPD CONF hierarchy Kernel Module Management
Examine various configuration files Identify and discuss kernel implementation
Configure IP‐based Virtual Hosts Types of Kernels
Configure Name‐based Virtual Hosts Booting with modified kernel
Configure .htacess file with directives Kernel Compiling Methods
Implement Apache logging system per virtual host