ENTERPRISE LINUX SYSTEM ADMINISTRATION



Similar documents
GL-250: Red Hat Linux Systems Administration. Course Outline. Course Length: 5 days

RedHat (RHEL) System Administration Course Summary

Linux for UNIX Administrators

GLS250 "Enterprise Linux Systems Administration"

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III

Table of Contents. Introduction. Audience. At Course Completion. Prerequisites

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting

COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.

Linux Troubleshooting. 5 Days

ENTERPRISE LINUX SECURITY ADMINISTRATION

GL550 - Enterprise Linux Security Administration

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline CIS INTRODUCTION TO UNIX

Oracle Linux Advanced Administration

ENTERPRISE LINUX SECURITY ADMINISTRATION

Linux System Administration on Red Hat

Advanced Linux System Administration on Red Hat

ICANWK401A Install and manage a server

Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent

RHCSA 7RHCE Red Haf Linux Certification Practice

Red Hat Enterprise Linux (RHEL 6) Courses

A candidate following a programme of learning leading to this unit will be able to:

Oracle Linux 7: System Administration Ed 1 NEW

Red Hat Certifications: Red Hat Certified System Administrator (RHCSA)

PARALLELS SERVER BARE METAL 5.0 README

Linux Disaster Recovery best practices with rear

UNISOL SysAdmin. SysAdmin helps systems administrators manage their UNIX systems and networks more effectively.

What is included in the ATRC server support

What the student will need:

EXi PREP. Solaris 10. System Administration. llllllllllllllll. Bill Calkins. ULB Darmstadt

Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.

FUJITSU Storage ETERNUS DX Configuration Guide -Server Connection-

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Unix System Administration

Linux Disaster Recovery best practices with rear

MCSA Security + Certification Program

Develop a process for applying updates to systems, including verifying properties of the update. Create File Systems

GL275 - ENTERPRISE LINUX NETWORKING SERVICES

Deploying Ubuntu Server Edition. Training Course Overview. (Ubuntu LTS)

SO114 - Solaris 10 OE Network Administration

Professional Xen Visualization

Relax and Recover (rear) Workshop

Training on Linux System Administration, LPI Certification Level 1

SAN Implementation Course SANIW; 3 Days, Instructor-led

CXS Citrix XenServer 6.0 Administration

Parallels Virtuozzo Containers 4.7 for Linux

Ubuntu Sever Administration

ENTERPRISE LINUX NETWORKING SERVICES

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

PARALLELS SERVER 4 BARE METAL README

Managed Backup Service - Agent for Linux Release Notes

Windows Server 2008 R2 Essentials

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

IT6204 Systems & Network Administration. (Optional)

Citrix XenServer 6 Administration

LBNC and IBM Corporation Document: LBNC-Install.doc Date: Path: D:\Doc\EPFL\LNBC\LBNC-Install.doc Version: V1.0

Migrating to ESXi: How To

How To Manage Your Volume On Linux (Evms) On A Windows Box (Amd64) On A Raspberry Powerbook (Amd32) On An Ubuntu Box (Aes) On Linux

This document describes the new features of this release and important changes since the previous one.

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days

Using iscsi with BackupAssist. User Guide

McAfee Web Gateway 7.4.1

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)

Storage Management for the Oracle Database on Red Hat Enterprise Linux 6: Using ASM With or Without ASMLib

Plexxi Control Installation Guide Release 2.1.0

Oracle Linux. Administrator's Guide for Release 6

Windows Server 2008 Essentials. Installation, Deployment and Management

Hands-On Microsoft Windows Server Chapter 12 Managing System Reliability and Availability

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

How To Install Acronis Backup And Recovery 10 On A Computer Or Network With A Hard Drive (For A Non-Profit)

VMware vsphere-6.0 Administration Training

HP-UX System and Network Administration for Experienced UNIX System Administrators Course Summary

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

5115B: Installing, Configuring, and Troubleshooting Windows Vista

Windows Template Creation Guide. How to build your own Windows VM templates for deployment in Cloudturk.

ThinkServer RD540 and RD640 Operating System Installation Guide

Advanced Diploma In Hardware, Networking & Server Configuration

OnCommand Performance Manager 1.1

VMware vsphere 4.1 with ESXi and vcenter

NATIONAL POPULATION REGISTER (NPR)

Advanced Linux System Administration Knowledge GNU/LINUX Requirements

Chapter 8: Installing Linux The Complete Guide To Linux System Administration Modified by M. L. Malone, 11/05

Linux Host Utilities 6.1 Installation and Setup Guide

DeployStudio Server Quick Install

SUSE Manager in the Public Cloud. SUSE Manager Server in the Public Cloud

Windows Host Utilities Installation and Setup Guide

Associate in Science Degree in Computer Network Systems Engineering

MS 6419 Configuring, Managing and Maintaining Windows Server 2008-based Servers

Installing and Configuring Websense Content Gateway

Managed Appliance Installation Guide

Deploying IBM Lotus Domino on Red Hat Enterprise Linux 5. Version 1.0

Integrated Virtualization Manager ESCALA REFERENCE 86 A1 82FA 01

Transcription:

ENTERPRISE LINUX SYSTEM ADMINISTRATION The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course focuses on issues universal to every workstation and server. Like all Guru Labs courses, the course material is designed to provide extensive hands-on experience. Topics include: installation and configuration; the boot process; user and group administration; filesystem administration, including quotas, FACLs, RAID and LVM; task automation; client networking; SELinux; software management; log files; troubleshooting; and more. Prerequisites: Students should already be comfortable working in a Linux or Unix environment. Fundamentals such as the Linux filesystem, process management, and how to edit files will not be covered in class. An understanding of network concepts, and the TCP/IP protocol suite is helpful. These skills are taught in the "Linux Fundamentals" course. Supported Distributions: Red Hat Enterprise Linux 6 SUSE Linux Enterprise 11 Recommended Class Length: 5 days Detailed Course Outline: 1. LINUX HARDWARE DISCOVERY, INTERACTION, AND CONTROL 1. Hardware Discovery Tools 2. Configuring New Hardware with hwinfo 3. Hardware and System Clock 4. Console 5. Virtual Terminals 6. Serial Ports 7. SCSI Devices 8. USB Devices 9. USB Configuration 10. Common UNIX Printing System 11. Defining a Printer 12. Managing Optical Media 13. Tape Libraries 14. Managing Linux Device Files 15. Kernel Hardware Info â /sys/ 16. /sys/ Structure 17. udev 18. Kernel Modules 19. Configuring Kernel Components and Modules 20. Handling Module Dependencies 21. Configuring the Kernel via /proc/

22. Adjusting Kernel Options 23. Configuring Print Queues 24. Introduction to Troubleshooting Labs 25. Troubleshooting Practice: Kernel Modules 2. BOOT PROCESS AND SYSV INIT 1. Booting Linux on PCs 2. GRUB Configuration 3. Boot Parameters 4. Initial ramdisk 5. /sbin/init 6. System Init Styles 7. Linux Runlevels 8. /etc/inittab 9. /etc/rc.d/rc.sysinit 10. SUSE /etc/init.d/boot 11. Runlevel Implementation 12. System Configuration Files 13. RHEL6 Configuration Utilities 14. SLES11 Configuration Utilities 15. Typical SysV Init Script 16. The /etc/rc.local File 17. The /etc/init.d/*.local Files 18. Managing Daemons 19. Controlling Service Startup 20. Shutdown and Reboot 21. Boot Process 22. GRUB Command Line 23. Basic GRUB Security 24. Managing Services With chkconfig 25. Troubleshooting Practice: Boot Process 3. SOFTWARE MAINTENANCE 1. Managing Software 2. RPM Features 3. RPM Architecture 4. RPM Package Files 5. Working With RPMs 6. Querying and Verifying with rpm 7. Updating the Kernel RPM 8. Dealing With RPM & YUM Digest Changes 9. Yum Plugins 10. YUM Repositories 11. Compiling/Installing from Source 12. Manually Installed Shared Libraries 13. Installing Source RPM Packages 14. Managing Software with RPM 15. Creating a Custom RPM Repository

16. Querying the RPM Database 17. Installing Software via RPM & Source and Rebuilding SRPMs 4. FILESYSTEM ADMINISTRATION 1. Partitioning Disks with fdisk 2. Partitioning Disks with parted 3. Filesystem Creation 4. Mounting Filesystems 5. Filesystem Maintenance 6. Persistent Block Devices 7. Resizing Filesystems 8. Swap 9. Filesystem Structures 10. Determining Disk Usage With df and du 11. Configuring Disk Quotas 12. Setting Quotas 13. Viewing and Monitoring Quotas 14. Filesystem Attributes 15. Backup Software 16. Backup Examples 17. Creating and Managing Filesystems 18. Hot Adding Swap 19. Setting User Quotas 20. Using rsync and ssh for Backups 21. Using tar and cpio for Backups 22. Using dump and restore for Backups 23. Creating ISO Images for Backups 5. LVM & RAID 1. Logical Volume Management 2. Implementing LVM 3. Creating Logical Volumes 4. Manipulating VGs & LVs 5. Advanced LVM Concepts 6. system-config-lvm 7. SLES Graphical Disk Tool 8. RAID Concepts 9. Array Creation with mdadm 10. Software RAID Monitoring 11. Software RAID Control and Display 12. Creating and Managing LVM Volumes 13. Creating and Managing a RAID-5 Array 6. REMOTE STORAGE ADMINISTRATION 1. Remote Storage Overview 2. Remote Filesystem Protocols 3. Remote Block Device Protocols 4. File Sharing via NFS 5. NFSv4 6. NFS Clients

7. NFS Server Configuration 8. Implementing NFSv4 9. AutoFS 10. AutoFS Configuration 11. Accessing Windows/Samba Shares from Linux 12. SAN Multipathing 13. Multipath Configuration 14. Multipathing Best Practices 15. iscsi Architecture 16. Open-iSCSI Initiator Implementation 17. iscsi Initiator Discovery 18. iscsi Initiator Node Administration 19. Mounting iscsi Targets at Boot 20. iscsi Multipathing Considerations 21. Using autofs 22. NFS Server Configuration 23. iscsi Initiator Configuration 7. USER/GROUP ADMINISTRATION 1. User and Group Concepts 2. User Administration 3. Modifying Accounts 4. Group Administration 5. Password Aging 6. Default User Files 7. Controlling Logins 8. Manual DS Client Configuration 9. system-config-authentication 10. SLES Graphical DS Client Configuration 11. System Security Services Daemon (SSSD) 12. User and Group Administration 13. Using LDAP for Centralized User Accounts 14. Troubleshooting Practice: Account Management 15. Using NIS for Centralized User Accounts 8. PLUGGABLE AUTHENTICATION MODULES (PAM) 1. PAM Overview 2. PAM Module Types 3. PAM Order of Processing 4. PAM Control Statements 5. PAM Modules 6. pam_unix 7. pam_nologin.so 8. pam_limits.so 9. pam_wheel.so 10. pam_xauth.so 11. Restricting superuser access to wheel group membership

12. Using pam_nologin to Restrict Logins 13. Setting Limits with the pam_limits Modules 14. Using pam_limits to Restrict Simultaneous Logins 9. SECURITY ADMINISTRATION 1. Security Concepts 2. Tightening Default Security 3. SuSE Security Checker 4. Security Advisories 5. File Access Control Lists 6. Manipulating FACLs 7. Viewing FACLs 8. Backing Up FACLs 9. File Creation Permissions with umask 10. User Private Group Scheme 11. Alternatives to UPG 12. AppArmor 13. SELinux Security Framework 14. SELinux Modes 15. SELinux Commands 16. Choosing an SELinux Policy 17. SELinux Booleans 18. Permissive Domains 19. SELinux Policy Tools 20. Basic Firewall Activation 21. User Private Groups 22. Using Filesystem ACLs 23. Exploring SELinux Modes 24. SELinux File Contexts 10. BASIC NETWORKING 1. IPv4 Fundamentals 2. TCP/UDP Fundamentals 3. Linux Network Interfaces 4. Ethernet Hardware Tools 5. Network Configuration with ip Command 6. Configuring Routing Tables 7. IP to MAC Address Mapping with ARP 8. Starting and Stopping Interfaces 9. NetworkManager 10. DNS Clients 11. DHCP Clients 12. system-config-network{tui,cmd} 13. SUSE YaST Network Configuration Tool 14. Network Diagnostics 15. Information from netstat and ss 16. Managing Network-Wide Time 17. Continual Time Sync with NTP 18. Configuring NTP Clients 19. Useful NTP Commands

20. Network Discovery 21. Basic Client Networking 22. NTP Client Configuration 11. ADVANCED NETWORKING 1. Multiple IP Addresses 2. Configuring a DHCP server 3. Enabling IPv6 4. Interface Bonding 5. Interface Bridging 6. 802.1q VLANS 7. Tuning Kernel Network Settings 8. Multiple IP Addresses Per Network Interface 9. Configuring IPv6 10. Troubleshooting Practice: Networking 12. LOG FILE ADMINISTRATION 1. System Logging 2. Syslog-ng 3. Rsyslog 4. /etc/rsyslog.conf 5. Log Management 6. Log Anomaly Detector 7. Setting up a Full Debug Logfile 8. Remote Syslog Configuration 13. MONITORING & TROUBLESHOOTING 1. System Status â Memory 2. System Status â I/O 3. System Status â CPU 4. Performance Trending with sar 5. Process Accounting 6. Troubleshooting Basics: The Process 7. Troubleshooting Basics: The Tools 8. strace and ltrace 9. Common Problems 10. Troubleshooting Incorrect File Permissions 11. Inability to Boot 12. Typos in Configuration Files 13. Corrupt Filesystems 14. RHEL6 Rescue Environment 15. SUSE Rescue Environment 16. Recovering Damaged MBR 17. Using BSD Process Accounting A. PRE-INSTALLATION CONSIDERATIONS

1. Pre-Installation Considerations 2. Hardware Compatibility 3. Multi-OS Booting 4. Partition Considerations 5. Filesystem Planning 6. Selecting a Filesystem B. INSTALLING RHEL6 1. Anaconda: An Overview 2. Anaconda: Booting the System 3. Anaconda: Common Boot Options 4. Anaconda: Loading Anaconda and Packages 5. Anaconda: Storage Options 6. Anaconda: Troubleshooting 7. FirstBoot 8. Kickstart 9. A Typical Install 10. Linux Installation 11. Automating Installation with Kickstart C. INSTALLING SLES11 1. YaST Install Program Interface 2. Network Installation 3. SLP for SUSE Linux Installation 4. Installation Choices 5. Kernel Crash Dump Configuration 6. Creating AutoYaST2 Files 7. Using AutoYaST2 files 8. linuxrc Automation 9. Installation Diagnostics 10. After The First Reboot 11. A Typical Install 12. SUSE Installation 13. Automating Installation with AutoYaST D. ISCSI TARGET CONFIGURATION 1. iscsi Target Implementations 2. iscsi Target Configuration (tgt) 3. iscsi Target LUN Configuration (tgt) 4. iscsi Target Auth Configuration (tgt) 5. iscsi Persistent Configuration (tgt)