Professional Documents
Culture Documents
RH033 - Training Class Covers: Introducing Enterprise Linux
RH033 - Training Class Covers: Introducing Enterprise Linux
Unit 2 - Linux Usage Basics Logging into Red Hat Enterprise Linux Starting X from the Console Accessing the Command Line from X Changing your Password The root User Elevating your Privileges Editing Text Files Hands-on lab: Linux Usage Basics
Unit 3 - Running Commands and Getting Help Running Commands Getting Help The whatis Command The --help Option Reading Usage Summaries The man and info Commands Documentation Hands-on lab: Getting Help with Commands
Unit 4 - Browsing the Filesystem Linux File Hierarchy Concepts Current Working Directory File and Directory Names Absolute and Relative Pathnames Changing Directories Listing Directory Contents Copying and Moving Files and Directories Creating and Removing Files and Directories Using Nautilus Determining File Content Viewing Files Hands-on lab: Browsing the Filesystem
bash Introduction, Heritage, and Features Command Line Shortcuts History Tricks Command Line Expansion Command Editing Tricks gnome-terminal Hands-on lab: Exploring the Bash Shell
Unit 6 - Standard I/O and Pipes Standard Input and Output Redirecting Standard Input and Output Overwriting vs Appending Redirecting Standard Error Redirecting Both Standard Output and Error Using Pipes To Connect Processes Hands-on lab: Standard I/O and Pipes
Unit 7 - Text Processing Tools Tools for Extracting Text Tools for Analysing Text Tools for Manipulating Text Special Characters for Matching Text Hands-on lab: Text Processing Tools
Intermediate Tools
Unit 8 - Basic System Configuration Configuring Date and Time Configuring Printers Configuring the Network System Logs Hands-on lab: Basic System Configuration
Unit 9 - vi and vim Introducing vim vim basics Opening, Modifying, and Saving Files Using Command Mode Undoing Changes Visual Mode Splitting the Screen Configuring vi and vim Learning More Hands-on lab: vi and vim
Unit 10 - Configuring the bash Shell Using bash Variables Local and Environment Variables Configuration and Information Variables Variable Expansion Protecting Against Variable Expansion Aliases How bash Expands the Command Line Types of Shells bash Startup and Exit Scripts Using Variables in Shell Scripts Hands-on lab: Configuring the Bash Shell
Unit 11 - Finding and Processing Files The slocate and find Commands Basic find Examples find and Logical Operators find and Permissions find and Numeric Criteria find and Access Times Executing Commands with find The Gnome Search Tool Hands-on lab: Finding and Processing Files
Unit 12 - Network Applications Firefox and Other Web Browsers Evolution and Other E-mail Clients Email, Encryption, and Digital Signatures The Gaim Messaging System Encrypted Communications with ssh and scp telnet and the "r" services FTP Clients Connecting to Windows Disk Shares File Transfer with Nautilus Network Diagnostic Tools Hands-on lab: Network Clients
Unit 14 - Advanced Topics in Users, Groups and Permissions User and Group ID Numbers The /etc/passwd, /etc/shadow, and /etc/group files System Users and Groups Changing Your Identity User Information Commands Default Permissions Special Permissions Hands-on lab: Switching Users and Setting Default Permissions
Unit 15 - The Linux Filesystem In-Depth Partitions and Filesystems Inodes and Directories cp, mv, rm, and inodes Symbolic (or Soft) Links and Hard Links The Seven Fundamental Filetypes Checking Free Space Mounting CDs, DVDs, USB Media, and Floppy Disks Why Archive Files? Creating, Inspecting, and Extracting Files From File Archives Why Use File Compression? Compression Utilities Compressing Archives Hands-on lab: The Linux Filesystem
Unit 16 - Investigating and Managing Processes What is a Process? Process States Viewing Processes Sending Signals to Processes Terminating Processes Altering Process Scheduling Priority Interactive Process Management Tools Running a Process in the Background Suspending a Process Listing Background and Suspended Jobs Compound Commands Scheduling a Process To Execute Later Scheduling Periodic Processes Crontab File Format Hands-on lab: Process Controls
Unit 17 - Essential System Administration Tools Installation Managing Services Managing Packages Securing the System Hands-on lab: Installation, Managing Services, and Securing the System
Unit 18 - What Now? Some Areas to Explore Development Red Hat Development Classes System Administrator Duties RHCE/RHCT Skills Courses RHCA and RHCSS Skills Courses The Linux Community
UNIT 2 - System Initialization and Services Boot Sequence Overview BIOS Initialization Boot Loader Components GRUB and grub.conf Kernel Initialization init Initialization Run levels /etc/rc.d/rc.sysinit /etc/rc.d/rc Daemon Processes System V run levels /etc/rc.d/rc.local Virtual Consoles Controlling Services System Shutdown System Reboot Hands-on Lab: Managing Startup
Kernel Module Configuration The /proc filesystem /proc/sys configuration with sysctl General Hardware Resources System Bus Support Hotswappable Bus Support System Monitoring and Process Control Hands-on Lab: Configuring kernel parameters
UNIT 4 - Filesystem Management System Initialization: Device Recognition Disk Partitioning Managing Partitions Managing Data: Filesystem Creation Journaling for ext2 filesystems: ext3 Mount Options and Configuration The Auto-Mounter ext2/ext3 Filesystem Attributes Virtual Memory Files Filesystem Maintenance Adding a Drive Hands-on Lab: Filesystem Management
UNIT 5 - Network Configuration Device Recognition Network Interfaces mii-tool ifconfig ifup/ifdown Interface Configuration Files Configuration Utilities Binding Multiple IP Addresses DHCP/BOOTP Global Network Parameters Default Route Static Routes Name Resolution DNS Client Configuration DNS Utilities Network Diagnostics Hands-on Lab: Static Network Settings
UNIT 6 - RPM and Kickstart The RPM Way RPM Package Manager Installing and Removing Software Updating a Kernel RPM RPM Queries RPM Verification
Other RPM Utilities and Features Automatic Dependency Resolution Red Hat Network (RHN) RHN in the Enterprise RHN Registration The up2date utility Remote Administration Network Installation Server Using Kickstart to Automate Installation Hands-on Lab: RPM and Kickstart
UNIT 7 - User Administration User Policy Considerations The User Account Database - /etc/passwd Adding a New User Account User Private Groups Group Administration Modifying/Deleting Accounts Password Aging Policies Login Shell Scripts Non Login Shell Scripts Switching Accounts sudo Network Users Authentication Configuration NIS Client Configuration LDAP Client Configuration File Ownership Linux File Permissions SUID / SGID Executables The Sticky Bit The Setgid Access Mode Default File Permissions Access Control Lists (ACLs) SELinux Controlling SELinux SELinux Contexts Troubleshooting SELinux Hands-on Lab: User and Group Administration
UNIT 8 - Printing and Administration Tools CUPS: Common Unix Printing System Controlling Access to cron System crontab Files System Logging syslog Configuration Tape Drives Using tar/star Using dump/restore
Using cpio Remote Backups Other Backup Software Hands-on Lab: Printing and Admin Tools
UNIT 9 - The X Window System XOrg: The X11 Server XOrg Server Design XOrg Server Configuration XOrg Modularity Server and Client Relationship Configuration Utilities Remote X Sessions Hands-on Lab: The X Window System
UNIT 10 - Advanced Filesystem Management Software RAID Configuration Software RAID Recovery Converting LVM1 to LVM2 Creating Logical Volumes Resizing Logical Volumes The Linux Quota System Hands-on Lab: Logical Volumes, RAID and Quotas
UNIT 11 - Troubleshooting Basic Guidelines Troubleshooting X Troubleshooting Networking Order of the Boot Process Filesystem Corruption Filesystem Recovery Recovery Run-levels Rescue Environment Hands-on Lab: System Rescue and Troubleshooting
Unit 2: Securing Networks Packet Filtering Capabilities Netfilter Architecture Chain Operations Connection Tracking Network Address Translation (NAT) Hands-on lab: Securing Networks
Unit 3: Organizing Networked Systems DNS Basics Internet DNS Hierarchy Name Server Hierarchy Berkeley Internet Name Domain (BIND) Chrooted BIND rndc Zone Files Delegating Subdomains BIND Syntax Utilities Advanced BIND features Configuring the DHCP server Hands-on lab: Organizing Networked Systems
Unit 4: Network File Sharing Services Configuring NFS services Configuring FTP services Samba Services Hands-on lab: Network File Sharing Services
Unit 5: Electronic Mail Services Operational Overview Security and "Anti-Spam" Features sendmail Configuration with the m4 Macro Language sendmail Client Configuration Debugging sendmail Postfix Configuring postfix Additional postfix Configuration
Unit 6: The HTTP Service Apache Features Apache Server Configuration Virtual Hosts Apache Namespace Configuration Using .htaccess Files CGI Apache Encrypted Web Server Squid Web Proxy Cache Hands-on lab: The HTTP Service
Unit 7: Security Concerns and Policy Definitions of Security Basic Network Security Diagnostic Utilities Remote Service Detection Security Policy Response Strategies and Resources Hands-on lab: Security Concerns and Policy
Unit 8: Authentication Services Authentication and Account Basics PAM Operation Core PAM Modules Authentication Modules Password Security Authentication Troubleshooting NIS Server Configuration NIS Client Configuration NIS Troubleshooting Hands-on lab: Authentication Services
Unit 9: System Monitoring Introduction to System Monitoring File System Analysis System Log Files syslogd and klogd configuration Log File Analysis Monitoring and Limiting Processes System Activity Reporting Hands-on lab: System Monitoring
Securing the Service tcp_wrappers Configuration xinetd Access Control Advanced Security Options Hands-on lab: Securing Services
Unit 11: Securing Data The Need For Encryption Cryptographic Building Blocks Symmetric Encryption Asymmetric Encryption Public Key Infrastructures Digital Certificates Generating Digital Certificates OpenSSH Overview OpenSSH Authentication The OpenSSH server and clients Protecting Your Keys Hands-on lab: Securing Data