Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

RH033 - Training Class Covers

Introducing Enterprise Linux


Unit 1 - Linux Ideas and History What is Open Source? Linux Origins Red Hat Distributions The Fedora Project Linux Principles

Unit 2 - Linux Usage Basics Logging into Red Hat Enterprise Linux Starting X from the Console Accessing the Command Line from X Changing your Password The root User Elevating your Privileges Editing Text Files Hands-on lab: Linux Usage Basics

Unit 3 - Running Commands and Getting Help Running Commands Getting Help The whatis Command The --help Option Reading Usage Summaries The man and info Commands Documentation Hands-on lab: Getting Help with Commands

Unit 4 - Browsing the Filesystem Linux File Hierarchy Concepts Current Working Directory File and Directory Names Absolute and Relative Pathnames Changing Directories Listing Directory Contents Copying and Moving Files and Directories Creating and Removing Files and Directories Using Nautilus Determining File Content Viewing Files Hands-on lab: Browsing the Filesystem

Unit 5 - Using the bash Shell

bash Introduction, Heritage, and Features Command Line Shortcuts History Tricks Command Line Expansion Command Editing Tricks gnome-terminal Hands-on lab: Exploring the Bash Shell

Unit 6 - Standard I/O and Pipes Standard Input and Output Redirecting Standard Input and Output Overwriting vs Appending Redirecting Standard Error Redirecting Both Standard Output and Error Using Pipes To Connect Processes Hands-on lab: Standard I/O and Pipes

Unit 7 - Text Processing Tools Tools for Extracting Text Tools for Analysing Text Tools for Manipulating Text Special Characters for Matching Text Hands-on lab: Text Processing Tools

Intermediate Tools
Unit 8 - Basic System Configuration Configuring Date and Time Configuring Printers Configuring the Network System Logs Hands-on lab: Basic System Configuration

Unit 9 - vi and vim Introducing vim vim basics Opening, Modifying, and Saving Files Using Command Mode Undoing Changes Visual Mode Splitting the Screen Configuring vi and vim Learning More Hands-on lab: vi and vim

Unit 10 - Configuring the bash Shell Using bash Variables Local and Environment Variables Configuration and Information Variables Variable Expansion Protecting Against Variable Expansion Aliases How bash Expands the Command Line Types of Shells bash Startup and Exit Scripts Using Variables in Shell Scripts Hands-on lab: Configuring the Bash Shell

Unit 11 - Finding and Processing Files The slocate and find Commands Basic find Examples find and Logical Operators find and Permissions find and Numeric Criteria find and Access Times Executing Commands with find The Gnome Search Tool Hands-on lab: Finding and Processing Files

Unit 12 - Network Applications Firefox and Other Web Browsers Evolution and Other E-mail Clients Email, Encryption, and Digital Signatures The Gaim Messaging System Encrypted Communications with ssh and scp telnet and the "r" services FTP Clients Connecting to Windows Disk Shares File Transfer with Nautilus Network Diagnostic Tools Hands-on lab: Network Clients

Essential Topics in Red Hat Enterprise Linux Administration


Unit 13 - Managing Users, Groups, and Permissions The Linux Security Model Users and Groups Permission Types Examining Permissions Changing Permissions Using Symbolic and Numeric Methods Changing Permissions Using Nautilus Hands-on lab: File Permissions

Unit 14 - Advanced Topics in Users, Groups and Permissions User and Group ID Numbers The /etc/passwd, /etc/shadow, and /etc/group files System Users and Groups Changing Your Identity User Information Commands Default Permissions Special Permissions Hands-on lab: Switching Users and Setting Default Permissions

Unit 15 - The Linux Filesystem In-Depth Partitions and Filesystems Inodes and Directories cp, mv, rm, and inodes Symbolic (or Soft) Links and Hard Links The Seven Fundamental Filetypes Checking Free Space Mounting CDs, DVDs, USB Media, and Floppy Disks Why Archive Files? Creating, Inspecting, and Extracting Files From File Archives Why Use File Compression? Compression Utilities Compressing Archives Hands-on lab: The Linux Filesystem

Unit 16 - Investigating and Managing Processes What is a Process? Process States Viewing Processes Sending Signals to Processes Terminating Processes Altering Process Scheduling Priority Interactive Process Management Tools Running a Process in the Background Suspending a Process Listing Background and Suspended Jobs Compound Commands Scheduling a Process To Execute Later Scheduling Periodic Processes Crontab File Format Hands-on lab: Process Controls

Unit 17 - Essential System Administration Tools Installation Managing Services Managing Packages Securing the System Hands-on lab: Installation, Managing Services, and Securing the System

Unit 18 - What Now? Some Areas to Explore Development Red Hat Development Classes System Administrator Duties RHCE/RHCT Skills Courses RHCA and RHCSS Skills Courses The Linux Community

RH133 Training Course Content


UNIT 1 - Installation Hardware Overview CPU and Memory Preparing to Install Multiboot systems The RHEL Installer Installer Features RHEL Installation Overview Partitioning Hard Drives Sample Partition Structure Configuring File Systems Software RAID LVM: Logical Volume Manager Network Configuration Firewall Setup Security Enhanced Linux SELinux Installation Options and Control Package Selection Validating the Installation noprobe Mode and Driver Disks Post-Install Configuration Hands-on Lab: Installation

UNIT 2 - System Initialization and Services Boot Sequence Overview BIOS Initialization Boot Loader Components GRUB and grub.conf Kernel Initialization init Initialization Run levels /etc/rc.d/rc.sysinit /etc/rc.d/rc Daemon Processes System V run levels /etc/rc.d/rc.local Virtual Consoles Controlling Services System Shutdown System Reboot Hands-on Lab: Managing Startup

UNIT 3 - Kernel Services and Configuration Objectives Agenda Kernel Modules

Kernel Module Configuration The /proc filesystem /proc/sys configuration with sysctl General Hardware Resources System Bus Support Hotswappable Bus Support System Monitoring and Process Control Hands-on Lab: Configuring kernel parameters

UNIT 4 - Filesystem Management System Initialization: Device Recognition Disk Partitioning Managing Partitions Managing Data: Filesystem Creation Journaling for ext2 filesystems: ext3 Mount Options and Configuration The Auto-Mounter ext2/ext3 Filesystem Attributes Virtual Memory Files Filesystem Maintenance Adding a Drive Hands-on Lab: Filesystem Management

UNIT 5 - Network Configuration Device Recognition Network Interfaces mii-tool ifconfig ifup/ifdown Interface Configuration Files Configuration Utilities Binding Multiple IP Addresses DHCP/BOOTP Global Network Parameters Default Route Static Routes Name Resolution DNS Client Configuration DNS Utilities Network Diagnostics Hands-on Lab: Static Network Settings

UNIT 6 - RPM and Kickstart The RPM Way RPM Package Manager Installing and Removing Software Updating a Kernel RPM RPM Queries RPM Verification

Other RPM Utilities and Features Automatic Dependency Resolution Red Hat Network (RHN) RHN in the Enterprise RHN Registration The up2date utility Remote Administration Network Installation Server Using Kickstart to Automate Installation Hands-on Lab: RPM and Kickstart

UNIT 7 - User Administration User Policy Considerations The User Account Database - /etc/passwd Adding a New User Account User Private Groups Group Administration Modifying/Deleting Accounts Password Aging Policies Login Shell Scripts Non Login Shell Scripts Switching Accounts sudo Network Users Authentication Configuration NIS Client Configuration LDAP Client Configuration File Ownership Linux File Permissions SUID / SGID Executables The Sticky Bit The Setgid Access Mode Default File Permissions Access Control Lists (ACLs) SELinux Controlling SELinux SELinux Contexts Troubleshooting SELinux Hands-on Lab: User and Group Administration

UNIT 8 - Printing and Administration Tools CUPS: Common Unix Printing System Controlling Access to cron System crontab Files System Logging syslog Configuration Tape Drives Using tar/star Using dump/restore

Using cpio Remote Backups Other Backup Software Hands-on Lab: Printing and Admin Tools

UNIT 9 - The X Window System XOrg: The X11 Server XOrg Server Design XOrg Server Configuration XOrg Modularity Server and Client Relationship Configuration Utilities Remote X Sessions Hands-on Lab: The X Window System

UNIT 10 - Advanced Filesystem Management Software RAID Configuration Software RAID Recovery Converting LVM1 to LVM2 Creating Logical Volumes Resizing Logical Volumes The Linux Quota System Hands-on Lab: Logical Volumes, RAID and Quotas

UNIT 11 - Troubleshooting Basic Guidelines Troubleshooting X Troubleshooting Networking Order of the Boot Process Filesystem Corruption Filesystem Recovery Recovery Run-levels Rescue Environment Hands-on Lab: System Rescue and Troubleshooting

RH253 Training Class Content


Unit 1: Introduction to System Services Service Management Types of Services Fault Analysis SELinux control and contexts Hands-on lab: Introduction to System Services

Unit 2: Securing Networks Packet Filtering Capabilities Netfilter Architecture Chain Operations Connection Tracking Network Address Translation (NAT) Hands-on lab: Securing Networks

Unit 3: Organizing Networked Systems DNS Basics Internet DNS Hierarchy Name Server Hierarchy Berkeley Internet Name Domain (BIND) Chrooted BIND rndc Zone Files Delegating Subdomains BIND Syntax Utilities Advanced BIND features Configuring the DHCP server Hands-on lab: Organizing Networked Systems

Unit 4: Network File Sharing Services Configuring NFS services Configuring FTP services Samba Services Hands-on lab: Network File Sharing Services

Unit 5: Electronic Mail Services Operational Overview Security and "Anti-Spam" Features sendmail Configuration with the m4 Macro Language sendmail Client Configuration Debugging sendmail Postfix Configuring postfix Additional postfix Configuration

Hands-on lab: Electronic Mail Services

Unit 6: The HTTP Service Apache Features Apache Server Configuration Virtual Hosts Apache Namespace Configuration Using .htaccess Files CGI Apache Encrypted Web Server Squid Web Proxy Cache Hands-on lab: The HTTP Service

Unit 7: Security Concerns and Policy Definitions of Security Basic Network Security Diagnostic Utilities Remote Service Detection Security Policy Response Strategies and Resources Hands-on lab: Security Concerns and Policy

Unit 8: Authentication Services Authentication and Account Basics PAM Operation Core PAM Modules Authentication Modules Password Security Authentication Troubleshooting NIS Server Configuration NIS Client Configuration NIS Troubleshooting Hands-on lab: Authentication Services

Unit 9: System Monitoring Introduction to System Monitoring File System Analysis System Log Files syslogd and klogd configuration Log File Analysis Monitoring and Limiting Processes System Activity Reporting Hands-on lab: System Monitoring

Unit 10: Securing Services System V Startup Control

Securing the Service tcp_wrappers Configuration xinetd Access Control Advanced Security Options Hands-on lab: Securing Services

Unit 11: Securing Data The Need For Encryption Cryptographic Building Blocks Symmetric Encryption Asymmetric Encryption Public Key Infrastructures Digital Certificates Generating Digital Certificates OpenSSH Overview OpenSSH Authentication The OpenSSH server and clients Protecting Your Keys Hands-on lab: Securing Data

You might also like