Linux LINUX RED HAT ENTERPRISE. Course Description. Introduction to the LINUX Operating System

Linux LINUX RED HAT ENTERPRISE Course Description Introduction to the LINUX Operating System - A brief history of UNIX and LINUX GNU project/ FSF G...
Author: Madison Bates
4 downloads 1 Views 396KB Size
Linux LINUX RED HAT ENTERPRISE

Course Description

Introduction to the LINUX Operating System -

A brief history of UNIX and LINUX GNU project/ FSF GPL - GNU General Public license (Copyleft) Popular versions of LINUX available The LINUX kernel Overview of commands and utilities The graphical user interfaces available A LINUX login session from the command line Basic Syntax rules Essential keyboard shortcuts

The LINUX GNOME/KDE Desktops -

The GNOME and KDE desktops Bluecurve theme and X Windows Configuring and switching between desktops Web browsers Office suites File managers - Nautilus & conqueror

Basic Commands -

Basic file handling commands Directory handling commands Filename wildcard characters Bash built in features Locating files : locate, slocate Getting Help - man pages, info, /usr/share/doc

1/8

The LINUX File System -

The file system structure Directories and files Pathnames : relative and absolute Navigating the file system Navigating using file managers - konqueror/nautilus Backup and compression Managing files: head, tail, less etc. Managing floppy disk and file systems

File Access Control -

Users and groups User information commands File access permissions Changing file attributes Default file permissions Switching users and user groups Extended file permissions

Redirection and Pipes -

Input and Output redirection Association Overwriting and appending redirection Using pipes to connect processes together Teeing output within pipelines Combining redirection and pipes

The vi/vim Editors -

Introduction to text file editing How to use the vim editor Copying, moving, editing and deleting text Search and replace features Reading and writing files Using regular expressions within vi/vim Advanced vim topics

Processes -

What is a process? System and user processes Process ancestry and states Monitoring processes Killing processes Background processes

2/8

- Using Job control - Altering Process scheduling priorities - Compound statements More Basic Commands - Sort, uniq, cut diff & paste : string processing - Regular expressions - Using grep & sed with regular expressions Installing Red Hat Linux -

Installation methods available Multiboot systems The RHEL installer : Anaconda The virtual consoles Using boot time options Performing the installation Firstboot and post installation

Investigating the System -

The /proc psuedo file system Investigating bus/devices: lspci, lsusb etc. Graphical tools for investigating hardware Serial device management Monitoring and managing log files Using the redhat-config tools The /etc/sysconfig directory and main configuration files

User Administration -

User and group administration Adding a new user and group Password management using passwd, change etc Authentication policies and user private groups Switching accounts The sudo command The shells and the user environment

System Startup/Shutdown and Initialization -

The boot sequence explained The lilo and grub boot managers The init program and run levels The /etc/rc.d/rc.sysinitrc program The system V startup script model Control services using chkconfig, ntsysv etc.

3/8

- System shutdown and reboot management File System Configuration -

The Linux file system basics The Native Linux File systems ext2fs and ext3fs Disk partitioning: fdisk and parted Creating and maintaining Linux file systems Checking and Repairing File systems Handling removable media File system attributes Using Disk quotas

Printers -

Files Printing under RedHat using cups Switching printing services : alternatives Administering CUPS using the web browser interface Administering CUPS using the Red Hat tools Print queue management Print commands

Process Scheduling -

Using at to manage one-off jobs Using the vixie cron system System crontab files Monitoring cron access Controlling access to cron & at using cron processes Using anacron

Backup and Restore -

Backup and Restore Backing up to tape devices Controlling tape devices Using the backup commands Using compression Remote backup administration

Managing System Software -

The Redhat Package Management system The YUM and APT package management tools Installing and removing software manually RPM queries and verifying packages Dependency problems and resolution Other RPM features

4/8

- Updating Enterprise Linux with up2date Customizing and Using X Windows -

Windowing System available The X windowing system managers Configuring using redhat-config and Xfree86 Customizing X start-up The X window protocol and X security xauth and ssh operation The font server

Basic Client Networking -

Device recognition and control Configuring networking interfaces Using multiple and virtual interfaces Configuring your system as a NIS/DHCP/DNS client Configuring for routing Network tools ifup, mii-tool etc.

Network Configuration -

Configuring network interfaces Controlling network devices:ifup/ifdown/mii-tool/ethtool Creating virtual interfaces Using DHCP to assign interface parameters Routing IP traffic under RedHat Linux The RedHat Network (rhn) Network diagnosis tools: tcpdump, netstat etc.

Network Services -

Ports and Socket connections The xinetd daemon operation Controlling xinetd services and access Controlling services using chkconfig Limiting access to services using TCP wrappers The FTP service using vsftpd The DHCP service Logging and troubleshooting services

The Domain Name System -

The DNS/BIND system under Red Hat Linux Name Server hierarchy Master/Slave zones Reverse lookup zones

5/8

-

Record types and their syntax Name Daemon control utility (rndc) Address match lists (acl) Sub-domains BIND checking utilities

Network File System (NFS) -

NFS operation: daemons, portmapper etc. Configuring an NFS server NFS share options : /etc/exports UID re-mapping NFS client operation Using the automounter to access NFS mounts

Samba Configuration -

The Samba system The Samba services provided Samba Daemons and operation Configuring Samba : various tools available Samba authentication methods Samba client tools Using smbmount to access Windows shares

HTTP services: Apache/Tux and Squid -

The Apache and Tux web servers Apache Server configuration files Apache configuration directives Virtual host management : name and IP based access CGI programs and Apache modules Apache Encrypted Web server The squid web proxy cache Configuring squid Configuring client access to squid

Network Integration Service (NIS) -

The NIS System: centralized administration NIS Topology Master, Slave and client configuration Rebuilding NIS Maps Password management under NIS Troubleshooting your NIS configuration

Electronic Mail

6/8

-

Sendmail and Postfix Mail User, Mail Transport and Mail User Agents Sendmail configuration files Sendmail configuration with the m4 Macro language m4 Macro file Debugging sendmail Switching to postfix, a sendmail replacement Postfix configuration Procmail configuration

Security and Authentication Services -

Types of attack usually experienced Packet sniffing/attacks : the tools System and user security policies Authentication services : PAM PAM operation The core PAM configuration files Configuring resource limits & access control through PAM Privileged access : sudo Authentication troubleshooting

Securing Networks: Firewalls -

Netfilter overview Tables and chains Packet filtering using iptables Rule targets Basic chain rules and their operation Connection tracking Network address translation Source and Destination NAT configuration RedHat supplied tools for iptables configuration

Data Security -

Encryption methods Single key encryption (symmetric) Public/private key encryption (asymmetric) Certificate encryption and digital signatures OpenSSH Overview Client and server side configuration of OpenSSH Kerberos security

System Monitoring/Performance Management - System Log files - Syslogd & klogd configuration - Advanced syslogd configuration

7/8

-

Analyzing log files System performance monitoring System activity reporting Simple process accounting

Customizing and Using X Windows -

Windowing System available The X windowing system managers Configuring using redhat-config and Xfree86 Customizing X start-up The X window protocol and X security xauth and ssh operation The font server

8/8