Administering Red Hat Linux 6 - Part 3
Course
In London-City, Birmingham and Reading
Description
-
Type
Course
-
Location
This highly practical instructor led Administering Red Hat Linux - Part III training course is designed to give delegates practical experience in the areas of networking, security and basics of shell scripting. With a strong emphasis on practical hands-on training, this course will teach the essential network, security and shell scripting tasks required on a Red Hat Linux system. Who will the Course Benefit? The Administering Red Hat Linux - Part III course is designed for System Administrators and Programmers and other technical IT staff who need to acquire knowledge of the key networking, security and scripting tasks required to administer a Linux system. This course will teach many of the extra necessary skills required, over and above the Red Hat Certified System Administrator (RHCSA) exam requirements, to enable the delegate to work towards achieving the Red Hat Certified Engineer (RHCE) certification. Courses covering the topics required for RHCSA certification, which are also a requirement of RHCE certification, are covered on the Administering Red Hat Linux - Part I & Part II courses. The course assumes administration knowledge of the Red Hat Linux operating system to the level covered in the Administering Red Hat Linux - Part I & Part II courses. Learning Objectives On completion of this Administering Red Hat Linux - Part III course the delegate will have gained practical experience of networking, securing and scripting on a Red Hat Linux system. The delegate will also gain the essential knowledge required to study towards taking the official Red Hat Certified Engineer (RHCE) certification. The delegate will have knowledge in all, and practice in some, of the following: Configure the system to use Kerberos securitySetting up network bridges for virtualised systemsCreate shell scripts to automate tasksImplement security for files and networksConfigure routing of network trafficSetup a Network Time Protocol ServerAccess centralised...
Facilities
Location
Start date
Start date
Start date
Start date
About this course
The course assumes administration knowledge of the Red Hat Linux operating system to the level covered in the Administering Red Hat Linux - Part I & Part II courses.
Equivalent experience to the RHCSA Rapid Track Course
Skills required to earn an RHCT/RHCSA certification
Confirmation of the correct skill-set required for this course can be obtained by passing the online pre-assessment quiz – redhat.com/explore/pre-assessment
Reviews
Subjects
- Network Training
- Red Hat
- Network
- Server
- Linux
- Networking
Course programme
Course Contents - DAY 1Course Introduction
- Administration and Course Materials
- Course Structure and Agenda
- Delegate and Trainer Introductions
- Revision of the virtualised environment
- Creating a Network Bridge
- Configuring the Firewall for a Network Bridge
- Configuring a New KVM Virtual Network
- Exercise
- The Yellow Dog Update, Modifier Tool (YUM)
- Creating a YUM repository
- Configuring YUM plugins
- Understand the design of a package
- Build a simple package
- Exercise
- System Security
- Extended Permissions
- GPG
- Why encrypt data and verify the sender
- Key pairs and management
- Using Digital signatures
- Checking and repairing file systems
- Exercise
- Routing under Linux
- IPROUTE suite of programs
- Configuring network cards and Routing
- Configuring the system as a Gateway
- IPV6 Addressing Overview
- Network tools :ethereal, tethereal, tcpdump, netstat, wireshark,etc
- Configure Ethernet Bonding
- Exercise
- Netfilter - iptables
- Packet Filtering using iptables
- Rule Targets
- Basic Rules and their Operation
- Connection Tracking
- Firewalls with Virtual Machine Bridges
- Debugging Route Problems
- Source and Destination NAT Configuration
- Red Hat supplied tools for iptables configuration
- Exercise
- The DNS/BIND system under Red Hat Linux
- Name Server Hierarchy
- Setting up DNS
- Master/Slave Zones
- Reverse lookup Zones
- Record types and their syntax
- Name Daemon Control Utility (rndc)
- Address Match Lists (acl)
- Configuring a Caching Only Name Server
- DNS in a chroot environment
- Testing a DNS server
- Exercise
- What is ISCSI
- Setting up ISCSI Target and Initiator
- Accessing Centralised Storage
- Encrypting file systems
- Accessing encrypted file systems
- Exercise
- Stratum Levels
- Choosing a time source
- Configuring the ntp daemon
- NTP roles
- Setting up an NTP Server and Client
- Direct or Broadcast Polling
- Allowing NTP connections
- Syncing considerations
- Exercise
- Configure file sharing using NFS
- NFS commands
- Automounter
- Introduction to CIFS(SAMBA)
- Configure file sharing between hosts with CIFS
- Using Konqueror and Gnome to access shares
- Configuring an FTP server
- Anonymous users
- Controlling access to the FTP server
- Using the sftp command
- Exercise
- Administrative Privileges
- Configure sudo privileges
- What is Kerberos
- Configuring a Kerberos 5 Server
- Setting up the Kerberos Client
- Exercise
- Email Components
- Mail User, Mail Transport and Mail User Agents
- Configuring sendmail and postfix
- Sendmail Configuration Files
- Sendmail Configuration with the m4 Macro Language
- Managing Virtual Addresses
- Macro Definitions
- Switching to postfix, a sendmail replacement
- Postfix Configuration
- Procmail delivery agent
- Configuring a null client using Postfix
- Dovecot - POP and IMAP services
- Exercise
- Data Security and Encryption
- Public Key Encryption
- Configuring Virtual Hosts : Name And IP Based Access
- Displaying Apache Web Server Information and Status
- Dynamic Virtual hosts
- Configuring HTTPS
- Signed Certificates
- Apache SSL Configuration File
- HTTPS Virtual Hosts
- Exercise
- What is a shell script?
- Creating and executing shell scripts
- User interaction
- Command line arguments
- Decision constructs using the 'if' statement
- Case statement
- Looping constructs: for/while/until
- Automating administrative tasks
- Exercise
- Troubleshooting Linux
- The Rescue Environment
- Common boot problems and their resolution
- Booting into GRUB (Maintenance Mode)
- Booting an un-bootable system into Recovery Mode
- Booting from USB devices
- Reinstalling the GRUB Loader
- Exercise
Administering Red Hat Linux 6 - Part 3