Administering Red Hat Linux V6 - Part III

Course

Online

Price on request

Description

  • Type

    Course

  • Methodology

    Online

This highly practical instructor led Administering Red Hat Linux V6 - Part III training course is designed to give delegates practical experience in the areas of networking, security and basics of shell scripting. With a strong emphasis on practical hands-on training, this course will teach the essential network, security and shell scripting tasks required on a Red Hat Linux system.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Red Hat
  • Linux
  • IT

Course programme

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Administering a Virtual Environment

  • Revision of the virtualised environment
  • Creating a Network Bridge
  • Configuring the Firewall for a Network Bridge
  • Configuring a New KVM Virtual Network
  • Exercise

Further Software Management

  • The Yellow Dog Update, Modifier Tool (YUM)
  • Creating a YUM repository
  • Configuring YUM plugins
  • Understand the design of a package
  • Build a simple package
  • Exercise

File Security and Integrity

  • System Security
  • Extended Permissions
  • GPG
  • Why encrypt data and verify the sender
  • Key pairs and management
  • Using Digital signatures
  • Checking and repairing file systems
  • Exercise

Network Management

  • Routing under Linux
  • IPROUTE suite of programs
  • Configuring network cards and Routing
  • Configuring the system as a Gateway
  • IPV6 Addressing Overview
  • Network tools :ethereal, tethereal, tcpdump, netstat, wireshark,etc
  • Configure Ethernet Bonding
  • Exercise

Securing Networks: Firewalls

  • Netfilter - iptables
  • Packet Filtering using iptables
  • Rule Targets
  • Basic Rules and their Operation
  • Connection Tracking
  • Firewalls with Virtual Machine Bridges
  • Debugging Route Problems
  • Source and Destination NAT Configuration
  • Red Hat supplied tools for iptables configuration
  • Exercise

Configuring Network Time Protocol

  • Stratum Levels
  • Choosing a time source
  • Configuring the ntp daemon
  • NTP roles
  • Setting up an NTP Server and Client
  • Direct or Broadcast Polling
  • Allowing NTP connections
  • Syncing considerations
  • Exercise

Centralised and Secure Storage

  • What is ISCSI
  • Setting up ISCSI Target and Initiator
  • Accessing Centralised Storage
  • Encrypting file systems
  • Accessing encrypted file systems
  • Exercise

DNS

  • The DNS/BIND system under Red Hat Linux
  • Name Server Hierarchy
  • Setting up DNS
  • Master/Slave Zones
  • Reverse lookup Zones
  • Record types and their syntax
  • Name Daemon Control Utility (rndc)
  • Address Match Lists (acl)
  • Configuring a Caching Only Name Server
  • DNS in a chroot environment
  • Testing a DNS server
  • Exercise

SSL and Web Service Configuration

  • Data Security and Encryption
  • Public Key Encryption
  • Configuring Virtual Hosts : Name And IP Based Access
  • Displaying Apache Web Server Information and Status
  • Dynamic Virtual hosts
  • Configuring HTTPS
  • Signed Certificates
  • Apache SSL Configuration File
  • HTTPS Virtual Hosts
  • Exercise

Advanced Security

  • Administrative Privileges
  • Configure sudo privileges
  • What is Kerberos
  • Configuring a Kerberos 5 Server
  • Setting up the Kerberos Client
  • Exercise

Basic Mail Server Configuration

  • Email Components
  • Mail User, Mail Transport and Mail User Agents
  • Configuring sendmail and postfix
  • Sendmail Configuration Files
  • Sendmail Configuration with the m4 Macro Language
  • Managing Virtual Addresses
  • Macro Definitions
  • Switching to postfix, a sendmail replacement
  • Postfix Configuration
  • Procmail delivery agent
  • Configuring a null client using Postfix
  • Dovecot - POP and IMAP services
  • Exercise

Sharing Files across the Network

  • Configure file sharing using NFS
  • NFS commands
  • Automounter
  • Introduction to CIFS(SAMBA)
  • Configure file sharing between hosts with CIFS
  • Using Konqueror and Gnome to access shares
  • Configuring an FTP server
  • Anonymous users
  • Controlling access to the FTP server
  • Using the sftp command
  • Exercise

Shell Scripting

  • What is a shell script?
  • Creating and executing shell scripts
  • User interaction
  • Command line arguments
  • Decision constructs using the 'if' statement
  • Case statement
  • Looping constructs: for/while/until
  • Automating administrative tasks
  • Exercise

Troubleshooting Un-Bootable Systems

  • Troubleshooting Linux
  • The Rescue Environment
  • Common boot problems and their resolution
  • Booting into GRUB (Maintenance Mode)
  • Booting an un-bootable system into Recovery Mode
  • Booting from USB devices
  • Reinstalling the GRUB Loader
  • Exercise

Administering Red Hat Linux V6 - Part III

Price on request