Linux Troubleshooting
Course
Inhouse
Description
-
Type
Course
-
Methodology
Inhouse
-
Start date
Different dates available
This 4-day course introduces Linux ™ and UNIX users to the tasks needed to administer their ownsystem. The course begins with administering user accounts and groups, then moves into file, file system, and disk management. Various archiving commands are shown along with backup strategies. Students will learn about process and job scheduling as well as startup and shutdown procedures. The course finishes with security, system tuning, and networking topics. Generic system administration
Facilities
Location
Start date
Start date
About this course
UNIX administrators and anyone involved with the UNIX System V, Release 4 operating system.
Fundamentals of UNIX, and some system administration experience recommended.
1:1 Lab allowing for bespoke individual cuastomised delivery in a group setting.
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 6 years
Subjects
- Access
- Options
- Linux
- TCP-IP
- Unix
- Server
- Apache
- Database
- Database training
- Network
- Installation
- IP
- TCP
- Install
- Network Training
Course programme
#text-block-10 { margin-bottom:0px; text-align:left; }
Course Introduction
Course Objectives Course Overview
Using the Workbook Suggested References
Overview of System Administration
System Administrator Responsibilities A Brief History of UNIX Evolving Standards
Navigating the Documentation
User Administration
What is a “user” in UNIX? The /etc/passwd File Groups
The /etc/group File Passwords
Adding Users Deleting Users
Modifying User Attributes The Login Process
/etc/profile and .profile
Communicating with Users: /etc/motd Communicating with Users: The wall
Command
File System Basics
The Hierarchy Files
Directories
Device Files
Character and Block Devices
The/dev Directory Links
Symbolic Links
A File System Tour The df Command The du Command The find Command
Advanced File System Concepts
The Physical File System The Inode File
File Storage in Disk Blocks The Superblock The Free List
Slices and File Systems File System Types
Disk Management
Making a File System The mkfs Command Sharing File Systems The mount Command The fstab File
The fsck Command
The lost+found Directory The prtvtoc Command
Backups Backup Strategies Backup Tools
The tar Command The cpio Command The dump Command
UNIX Processes Overview of Processes Process Space Process Table
The fork/exec Mechanism The ps Command
Background Processes The kill Command Scheduling Jobs The cron Daemon The at Command
The crontab Command Format of cron Files
Access to Scheduling Facilities
#text-block-11 { margin-bottom:0px; text-align:left; }
System Startup and Shutdown
Run States
The init Daemon /etc/inittab
The inittab Actions The init Command The rc Scripts
Single-User Mode
The shutdown Command
UNIX System Security
Security Overview Physical Security Account Security
SUID and SGID Settings
File and Directory Permissions Software Security
Performance Monitoring and Tuning
Performance Issues
Methods of Improving Performance Swapping and Paging The sar Utility Using sar
The truss Command
IP Addressing Basic Network Needs
Subnet Masks
Configuring TCP/IP
The /etc/hosts File
The ifconfig Command The /etc/services File The inetd Daemon
The /etc/inetd.conf File
Simple TCP/IP Troubleshooting: The
ping Command
Simple TCP/IP Troubleshooting: The
nestat Command
The LP Print Service
Printing Overview The lp Command
The lpstat Command The cancel Command Adding a Printer
The lpadmin Command
The accept and reject Commands The enable and disable Commands Adding a Networked Printer
Other Administrative Commands
Appendix A – Network Utilities
Network Services
telnet – Terminal Emulator ftp – File Transfer rcp – Remote Copy
rlogin – Remote Login
rsh – Remote Commands
Appendix B – Kernel Reconfiguration
Overview of Reconfiguration Kernel Parameters
Steps to Reconfigure a Kernel Specific Steps for SVR4
Appendix C – Overview of NIS
What is NIS?
Why Use NIS?
NIS Design and Implementation NIS Maps
Configuring NIS
Ethernet Addresses IP Addresses
DNS vs /etc/hosts to Resolve IP
Addresses
Network Addresses Network Classes
Broadcast Addresses
#text-block-12 { margin-bottom:0px; text-align:left; }
The X Window System
X Modularity X.Org Drivers
Configuring X Manually Automatic X Configuration Automatic X Configuration –
SLES
The X11 Protocol and Display
Names
Display Managers and Graphical
Login
Starting X Apps Automatically X Access Control Remote X Access (historical/insecure approach)
Remote X Access
(modern/secure approach)
XDMCP
Remote Graphical Access With
VNC and RDP
Specialized X Servers
Enabling the Graphical User
Interface
Bind Concepts and Configuration
The Domain Name Space Delegation and Zones Server Roles
Resolving Names
Resolving IP Addresses
Basic BIND Administration Configuring the Resolver Testing Resolution
rndc Key Configuration BIND Configuration Files named.conf Syntax
named.conf Options Block Creating a Site-Wide Cache Zones In named.conf
Zone Database File Syntax SOA – Start of Authority
A & PTR – Address & Pointer
Records
NS – Name Server
CNAME & MX – Alias & Mail Host Abbreviations and Gotchas
$GENERATE, $ORIGIN, and
$INCLUDE
OPENLDAP
OpenLDAP: Server Architecture OpenLDAP: Backends OpenLDAP: Replication
OpenLDAP: Configuration Options OpenLDAP: Configuration Sections OpenLDAP: Global Parameters OpenLDAP: Database Parameters OpenLDAP Server Tools OpenLDAP Client Tools
LDIF: LDAP Data Interchange Format Enabling LDAP-based Login
System Security Services Daemon
(SSSD)
Using VSFTPD and APACHE
vsftpd
Anonymous FTP with vsftpd Configuring vsftpd HTTP Operation
Apache Architecture
Apache Configuration Files httpd.conf – Server Settings
httpd.conf – Main Configuration
httpd.conf – VirtualHost Configuration Virtual Hosting DNS Implications Dynamic Shared Objects Adding Modules to Apache Apache Logging Log Analysis
APACHE Security Delegating Administration Directory Protection
Directory Protection with
AllowOverride
Common Uses for .htaccess Symmetric Encryption
Algorithms
Asymmetric Encryption
Algorithms Digital Certificates
SSL Using mod_ssl.so
The Squid Proxy Server
Squid Overview Squid File Layout
Squid Access Control Lists
Applying Squid ACLs
Tuning Squid & Configuring
Cache Hierarchies
Bandwidth Metering Monitoring Squid
Proxy Client Configuration 18. Samba Concepts and
Configuration
Introducing Samba Samba Daemons
NetBIOS and NetBEUI
Accessing Windows/Samba
Shares from Linux
Samba Utilities
Samba Configuration Files The smb.conf File
Mapping Permissions and ACLs Mapping Linux Concepts Mapping Case Sensitivity Sharing Home Directories Sharing Printers
Share Authentication Share-Level Access User-Level Access Mapping Users
Samba Account Database User Share Restrictions
Postfix Postfix Features
Postfix Components Postfix Configuration master.cf main.cf
Postfix Map Types
Postfix Pattern Matching
Virtual Domains
Postfix Mail Filtering
Configuration Commands Management Commands Postfix Logging
SMTP AUTH Server and Relay Control SMTP AUTH Clients
TLS Server Configuration
Postfix Client Configuration for TLS Ensuring TLS Security
Mail Services and Retrieval
Procmail
SpamAssassin
amavisd-new Mail Filtering Accessing Email
The IMAP4 Protocol
Cyrus IMAP/POP3 Server
Cyrus IMAP MTA Integration Cyrus Mailbox Administration
Installing RHEL6 Anaconda: An Overview
Anaconda: Booting the System
Anaconda: Common Boot Options Anaconda: Loading Anaconda and
Packages
Anaconda: Storage Options Anaconda: Troubleshooting FirstBoot Kickstart
A Typical Install
Installing SLES11
YaST Install Program Interface Network Installation
SLP for SUSE Linux Installation Installation Choices
Kernel Crash Dump Configuration Creating AutoYaST2 Files Using AutoYaST2 files linuxrc Automation
Installation Diagnostics After The First Reboot A Typical Install
Linux Troubleshooting