Administering Red Hat Linux V6 - Part III
Course
Online
Description
-
Type
Course
-
Methodology
Online
This highly practical instructor led Administering Red Hat Linux V6 - Part III training course is designed to give delegates practical experience in the areas of networking, security and basics of shell scripting. With a strong emphasis on practical hands-on training, this course will teach the essential network, security and shell scripting tasks required on a Red Hat Linux system.
Reviews
Subjects
- Red Hat
- Linux
- IT
Course programme
- Administration and Course Materials
- Course Structure and Agenda
- Delegate and Trainer Introductions
- Revision of the virtualised environment
- Creating a Network Bridge
- Configuring the Firewall for a Network Bridge
- Configuring a New KVM Virtual Network
- Exercise
- The Yellow Dog Update, Modifier Tool (YUM)
- Creating a YUM repository
- Configuring YUM plugins
- Understand the design of a package
- Build a simple package
- Exercise
- System Security
- Extended Permissions
- GPG
- Why encrypt data and verify the sender
- Key pairs and management
- Using Digital signatures
- Checking and repairing file systems
- Exercise
- Routing under Linux
- IPROUTE suite of programs
- Configuring network cards and Routing
- Configuring the system as a Gateway
- IPV6 Addressing Overview
- Network tools :ethereal, tethereal, tcpdump, netstat, wireshark,etc
- Configure Ethernet Bonding
- Exercise
- Netfilter - iptables
- Packet Filtering using iptables
- Rule Targets
- Basic Rules and their Operation
- Connection Tracking
- Firewalls with Virtual Machine Bridges
- Debugging Route Problems
- Source and Destination NAT Configuration
- Red Hat supplied tools for iptables configuration
- Exercise
- Stratum Levels
- Choosing a time source
- Configuring the ntp daemon
- NTP roles
- Setting up an NTP Server and Client
- Direct or Broadcast Polling
- Allowing NTP connections
- Syncing considerations
- Exercise
- What is ISCSI
- Setting up ISCSI Target and Initiator
- Accessing Centralised Storage
- Encrypting file systems
- Accessing encrypted file systems
- Exercise
- The DNS/BIND system under Red Hat Linux
- Name Server Hierarchy
- Setting up DNS
- Master/Slave Zones
- Reverse lookup Zones
- Record types and their syntax
- Name Daemon Control Utility (rndc)
- Address Match Lists (acl)
- Configuring a Caching Only Name Server
- DNS in a chroot environment
- Testing a DNS server
- Exercise
- Data Security and Encryption
- Public Key Encryption
- Configuring Virtual Hosts : Name And IP Based Access
- Displaying Apache Web Server Information and Status
- Dynamic Virtual hosts
- Configuring HTTPS
- Signed Certificates
- Apache SSL Configuration File
- HTTPS Virtual Hosts
- Exercise
- Administrative Privileges
- Configure sudo privileges
- What is Kerberos
- Configuring a Kerberos 5 Server
- Setting up the Kerberos Client
- Exercise
- Email Components
- Mail User, Mail Transport and Mail User Agents
- Configuring sendmail and postfix
- Sendmail Configuration Files
- Sendmail Configuration with the m4 Macro Language
- Managing Virtual Addresses
- Macro Definitions
- Switching to postfix, a sendmail replacement
- Postfix Configuration
- Procmail delivery agent
- Configuring a null client using Postfix
- Dovecot - POP and IMAP services
- Exercise
- Configure file sharing using NFS
- NFS commands
- Automounter
- Introduction to CIFS(SAMBA)
- Configure file sharing between hosts with CIFS
- Using Konqueror and Gnome to access shares
- Configuring an FTP server
- Anonymous users
- Controlling access to the FTP server
- Using the sftp command
- Exercise
- What is a shell script?
- Creating and executing shell scripts
- User interaction
- Command line arguments
- Decision constructs using the 'if' statement
- Case statement
- Looping constructs: for/while/until
- Automating administrative tasks
- Exercise
- Troubleshooting Linux
- The Rescue Environment
- Common boot problems and their resolution
- Booting into GRUB (Maintenance Mode)
- Booting an un-bootable system into Recovery Mode
- Booting from USB devices
- Reinstalling the GRUB Loader
- Exercise
Administering Red Hat Linux V6 - Part III