GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III



Similar documents
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.

Linux for UNIX Administrators

ENTERPRISE LINUX SYSTEM ADMINISTRATION

GL275 - ENTERPRISE LINUX NETWORKING SERVICES

GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days

ENTERPRISE LINUX NETWORKING SERVICES

ENTERPRISE LINUX NETWORKING SERVICES

RedHat (RHEL) System Administration Course Summary

GL-250: Red Hat Linux Systems Administration. Course Outline. Course Length: 5 days

"Charting the Course... Enterprise Linux Networking Services Course Summary

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days

ENTERPRISE LINUX SECURITY ADMINISTRATION

GL550 - Enterprise Linux Security Administration

ENTERPRISE LINUX SECURITY ADMINISTRATION

Lab Tasks 1. Configuring a Slave Name Server 2. Configure rndc for Secure named Control

RHCSA 7RHCE Red Haf Linux Certification Practice

Linux Troubleshooting. 5 Days

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..

Red Hat Enterprise Linux (RHEL 6) Courses

Oracle Linux Advanced Administration

Table of Contents. Introduction. Audience. At Course Completion. Prerequisites

What is included in the ATRC server support

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting

GLS250 "Enterprise Linux Systems Administration"

Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent

Ubuntu Sever Administration

Linux System Administration on Red Hat

Linux Operating System Security

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline CIS INTRODUCTION TO UNIX

Oracle Linux 7: System Administration Ed 1 NEW

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

Linux Network Security

Specialized Programme on Internetworking Design and LAN WAN Administration

Description: Objective: Attending students will learn:

Beginning OpenVPN 2.0.9

3 Days Course on Linux Firewall & Security Administration

Deploying Ubuntu Server Edition. Training Course Overview. (Ubuntu LTS)

Installing and Configuring Websense Content Gateway

Linux Networking Basics

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

Mohamed Zaki. Certificates and Training. Qualifications. Phone : Address: RedHat Certification ID :

SCP - Strategic Infrastructure Security

Network Security and Firewall 1

athenahealth Interface Connectivity SSH Implementation Guide

Hands-on Guide to the Red Hat Exams

Linux MDS Firewall Supplement

F5 Configuring BIG-IP Local Traffic Manager (LTM) - V11. Description

IT6204 Systems & Network Administration. (Optional)

OnCommand Performance Manager 1.1

Advanced Linux System Administration on Red Hat

Advanced Linux System Administration Knowledge GNU/LINUX Requirements

Securing Networks with PIX and ASA

Implementing Cisco IOS Network Security

Red Hat Certifications: Red Hat Certified System Administrator (RHCSA)

Linux VPS with cpanel. Getting Started Guide

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days)

BorderWare Firewall Server 7.1. Release Notes

NETWORK SECURITY HACKS

MCSA Security + Certification Program

Simple. Control Panel. for your Linux Server. Getting Started Guide. Simple Control Panel // Linux Server

The course will be run on a Linux platform, but it is suitable for all UNIX based deployments.

Using Webmin and Bind9 to Setup DNS Sever on Linux

WHM Administrator s Guide

Citrix NetScaler 10 Essentials and Networking

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems

Getting Started with RES Automation Manager Agent for Linux

Getting Started Guide. Getting Started With Your Dedicated Server. Setting up and hosting a domain on your Linux Dedicated Server using Plesk 8.0.

v7.8.2 Release Notes for Websense Content Gateway

The Bomgar Appliance in the Network

Linux Administration. A Beginner's Guide

CYAN SECURE WEB APPLIANCE. User interface manual

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course

Preliminary Course Syllabus

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

20 Command Line Tools to Monitor Linux Performance

VMware Identity Manager Connector Installation and Configuration

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

Red Hat Linux Networking

Moving to Plesk Automation 11.5

Parallels Plesk Panel 11 for your Linux server

IINS Implementing Cisco Network Security 3.0 (IINS)

IT6203 Systems & Network Administration. (Optional)

Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny)

Bypassing firewalls Another hole in the wall ;-) Présentation pour «La nuit du hack» le 13 Juin 2009

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.

Load Balancing Trend Micro InterScan Web Gateway

DNS Resolving using nslookup

Getting Started With Your Virtual Dedicated Server. Getting Started Guide

Preface 1. Introduction to Linux Networking 1.0 Introduction 2. Building a Linux Gateway on a Single-Board Computer 2.0 Introduction 2.

TECHNICAL NOTE. Technical Note P/N REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Transcription:

QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added benefit of very comprehensive lab exercises and detailed lecture material. The Red Hat Enterprise Linux (RHEL) system administration topics covered in this course along with the GL199 course cover the certification objects of the Red Hat Certified Engineer (RHCE) exam. This course builds upon a foundation of core Linux systems administration principles and skills. Students will advance their Linux systems administration knowledge. The course will focus on helping students optimize system administration skills using automation techniques and deploy commonly used network services. Once this course is completed students will know how to deploy critical network services in a secure fashion. Current Version: A00 Red Hat is a registered trademark of Red Hat, Inc. and its use by Guru Labs, L.C. does not imply association or sponsorship by Red Hat, Inc. Prerequisites: Students should have skill equal to those taught in the GL124 "Red Hat Enterprise Linux Systems Admin I" and GL134 "Red Hat Enterprise Linux Systems Admin I" courses. Also these prerequisite skills are taught in the GL120 "Linux Fundamentals" and GL250 "Enterprise Linux Systems Administration" courses. Supported Distributions: Red Hat Enterprise Linux 6 Course Outline: 1. ENHANCE USER SECURITY 1. Kerberos Concepts 2. Kerberos Components 3. Kerberos Principals 4. Overall Goals for Users

5. Authentication Process 6. Install krb5.conf on Clients 7. Client PAM Configuration 8. Signing In to Kerberos 9. Viewing Tickets 10. Removing Tickets 11. Passwords 12. Changing Passwords 13. Giving Others Access 14. SSH Key Management 15. ssh-agent 16. OpenSSH and Kerberos 17. SSH Key-based User Authentication 18. Using ssh-agent 19. Kerberos Client Setup 20. OpenSSH with Kerberos 2. BASH SCRIPTING AND TOOLS 1. Shell Script Strengths and Weaknesses 2. Example Shell Script 3. Positional Parameters 4. Input & Output 5. Doing Math 6. Comparisons with test 7. Exit Status 8. Conditional Statements 9. Flow Control: case 10. The for Loop 11. The while and until Loops 12. Writing a Shell Script 3. FILE SECURITY WITH GNUPG 1. GPG - GNU Privacy Guard 2. File Encryption with GPG 4. SOFTWARE MANAGEMENT 1. RPM Package Files 2. Source RPMs 3. Using Source RPMs 4. Installing Source RPM Packages 5. Creating Support Files 6. The Spec file

7. The Header Stanza 8. Prep, Build, and Install 9. The Files Section 10. Optional Script Section(s) 11. The Changelog Section 12. Building Packages 13. Digitally Signing Packages 14. Revising a Package 15. RPM Development Tools 16. Yum Plugins 17. Dealing With RPM & YUM Digest Changes 18. rpmdevtools and Simple RPM Creation 5. NETWORK MONITORING 1. tcpdump and wireshark 2. Information from netstat and ss 3. lsof and fuser 4. nmap 5. Network Tools 6. NMAP 6. ROUTE NETWORK TRAFFIC 1. Configuring the Kernel via /proc/ 2. Tuning Kernel Network Settings 3. Linux as a Router 4. Configuring Routing Tables 5. IP to MAC Address Mapping with ARP 6. Adjusting Kernel Options 7. SECURE NETWORK TRAFFIC 1. SSH Port Forwarding 2. Persistent Port Forwarding Configuration 3. Netfilter: Stateful Packet Filter Firewall 4. Netfilter Concepts 5. Using the iptables Command 6. Common match_specs 7. Address Translation 8. Configuring NAT and PAT 9. NAT Limitations 10. Security Using NAT and PAT 11. Detecting NAT

12. Tunneling TCP connections over SSH 13. Securing Services with Netfilter 8. NTP SERVER CONFIGURATION 1. Managing Network-Wide Time 2. Continual Time Sync with NTP 3. Configuring NTP Clients 4. Useful NTP Commands 5. NTP Client Configuration 9. SYSTEM MONITORING AND LOGS 1. Filesystem Structures 2. Determining Disk Usage With df and du 3. Filesystem Maintenance 4. Corrupt Filesystems 5. Troubleshooting Incorrect File Permissions 6. System Status - Memory 7. System Status - I/O 8. System Status - CPU 9. Viewing Processes 10. Performance Trending with sar 11. System Logging 12. Rsyslog 13. /etc/rsyslog.conf 14. Log Management 15. Log Anomaly Detector 16. Setting up a Full Debug Logfile 17. Remote Syslog Configuration 18. System Activity Reporter 10. CENTRALIZED AND SECURE STORAGE 1. SAN Multipathing 2. Multipath Configuration 3. Multipathing Best Practices 4. iscsi Architecture 5. Open-iSCSI Initiator Implementation 6. iscsi Initiator Discovery 7. iscsi Initiator Node Administration 8. Mounting iscsi Targets at Boot 9. iscsi Multipathing Considerations 10. File Encryption With encfs 11. Linux Unified Key Setup (LUKS)

12. iscsi Initiator Configuration 13. LUKS-on-disk format Encrypted Filesystem 11. SSL-ENCAPSULATED WEB SERVICES 1. Apache Architecture 2. Adding Modules to Apache 3. Apache Configuration Files 4. httpd.conf - Server Settings 5. httpd.conf - Main Configuration 6. Symmetric Encryption Algorithms 7. Asymmetric Encryption Algorithms 8. Digital Certificates 9. SSL Using mod_ssl.so 10. Apache Architecture 11. Apache Content 12. Using SSL Certificates with Apache 12. WEB SERVER ADDITIONAL CONFIGURATION 1. Virtual Hosting DNS Implications 2. httpd.conf - VirtualHost Configuration 3. Name-based Virtual Host 4. Apache Logging 5. Delegating Administration 6. Directory Protection 7. Directory Protection with AllowOverride 8. Common Uses for.htaccess 9. Configuring CGI 10. Configuring Virtual Hosts 11. Using.htaccess Files 12. CGI Scripts in Apache 13. BASIC SMTP CONFIGURATION 1. Postfix Features 2. Postfix Components 3. Postfix Configuration 4. master.cf 5. main.cf 6. Postfix Map Types 7. Postfix Pattern Matching 8. Virtual Domains 9. Configuration Commands 10. Management Commands 11. Postfix, Relaying and SMTP AUTH

12. SMTP AUTH Server and Relay Control 13. Configuring Postfix 14. Postfix Network Configuration 15. Postfix Virtual Host Configuration 14. CACHING-ONLY DNS SERVER 1. Naming Services 2. The Domain Name Space 3. Delegation and Zones 4. Server Roles 5. Resolving Names 6. Resolving IP Addresses 7. Basic BIND Administration 8. Configuring the Resolver 9. Testing Resolution 10. Creating a Site-Wide Cache 11. SOA - Start of Authority 12. A & PTR - Address & Pointer Records 13. NS - Name Server 14. CNAME & MX - Alias & Mail Host 15. Caching-only DNS 15. FILE SHARING WITH NFS 1. File Sharing via NFS 2. NFSv4 3. NFS Clients 4. NFS Server Configuration 5. Implementing NFSv4 6. NFS Server Configuration 16. FILE SHARING WITH CIFS 1. Samba Daemons 2. Accessing Windows/Samba Shares from Linux 3. Samba Utilities 4. Samba Configuration Files 5. The smb.conf File 6. Mapping Permissions and ACLs 7. Mapping Linux Concepts 8. Mapping Users 9. Share Authentication 10. User-Level Access 11. Samba Account Database

12. User Share Restrictions 13. Samba Share-Level Access 14. Samba User-Level Access 15. Samba Group Shares 17. FILE SHARING WITH FTP 1. The FTP Protocol 2. Active Mode FTP 3. Passive Mode FTP 4. vsftpd 5. Anonymous FTP with vsftpd 6. Configuring vsftpd 18. TROUBLESHOOTING BOOT PROCESS 1. Booting Linux on PCs 2. GRUB Configuration 3. Boot Parameters 4. Initial ramdisk 5. /sbin/init 6. System Init Styles 7. Linux Runlevels 8. /etc/inittab 9. /etc/rc.d/rc.sysinit 10. Runlevel Implementation 11. System Configuration Files 12. Typical SysV Init Script 13. The /etc/rc.local File 14. Shutdown and Reboot 15. Rescue Environment 16. Boot Process 17. Recovering Damaged MBR 18. Introduction to Troubleshooting Labs 19. Troubleshooting Practice: Boot Process