EncartaLabs

Red Hat Linux Administration

( Duration: 7 Days )

By attending Red Hat Linux Administration workshop, Participants will be able to perform installation, establish network connectivity, manage physical storage and perform basic security administration.

  • Previous operating system administration experience is helpful but not required

  • Microsoft Windows system administrators who need to quickly learn core Red Hat Enterprise Linux proficiencies
  • System administrators, network administrators, and other IT professionals who require proficiency performing core tasks in Linux
  • Non Linux IT professionals on the path to becoming a full time Linux system administrator

COURSE AGENDA

1

Installations -Network - VNC - Kickstart

  • Discuss features of RedHat- Enterprise Linux 6
  • Create HTTP installation source tree
  • Explore installation options
  • Install via HTTP - Text Mode
  • Perform VNC Install
  • Graphical installation
  • Kickstart, automated installation
  • Use Rescue Mode
  • Explore Single-User Mode
  • Discuss INIT - Upstart facilities
2

Explore Requisite Shell Utilities

  • 'pwd', 'touch', 'stat', 'ls', 'id'
  • 'echo', 'cat'
  • 'cp' - copy files
  • 'mv' - move files throughout the file system
  • 'tty' - Discuss terminals
  • 'tar' - explore features and advantages of tarballs
  • 'gzip', 'bzip2', 'zip' - Compress content
  • 'md5sum', 'sha1sum', 'sha256sum', 'sha512sum' - checksums
  • 'file' - discuss logic used to ascertain file type
  • 'find' - single and multiple expressions and criteria
  • Use 'w' commands
  • 'ps' - explore process lists
  • free & top - explore process management with top
  • Process lines with: 'grep'
  • Process fields with: 'awk'
  • Explore 'sed' - streams processing
  • Basics of: 'perl'
  • User and group management concepts
3

Permissions - Symlinks - Quotas - File System Management

  • Explain Discretionary Access Controls (DAC) file system permissions
  • Manipulate DAC permissions
  • Create Symbolic links
  • Implement file system quotas
  • Use 'parted' and 'fdisk' to manipulate partitions
  • FSTAB - explore File System Table
  • Allocate swap storage
  • Logical Volume Management (LVM) - Discuss concepts and applications
  • Allocate partitions for usage with LVM
  • Create Physical Volumes
  • Create Volume Groups based on Physical Volumes
  • Create Logical Volumes based on Volume Groups
  • Mount and use LVM Volumes
  • Resize LVM Volumes
  • Generate RAID volumes
  • Evaluate results
4

RPM | YUM Package Management

  • Query existing packages & file-based packages
  • Identify offline and online package repositories
  • Install packages
  • Upgrade packages
  • Remove packages
  • Create YUM repositories
  • Manage packages using YUM
  • Configure redundant YUM repositories
  • Explore Package Kit - GUI
5

CRON - System Scheduler

  • Explore Cron Implementation
  • Explain scheduler
  • Global and scope-based Cron options
  • Schedules jobs to run & examine the output
  • Configure individual Crontab entries
  • Explore 'at' & 'batch' usage
6

RSYSLOG and Logrotate

  • Discuss rsyslog facilities & levels
  • Configure TCP listener
  • Log Cisco router events to rsyslog server
  • Explore log rotation
7

Network Utilities

  • PING
  • Use Telnet to test TCP ports
  • Explore Netstat socket listings
  • Use arp to enumerate layer-2 neighbors
  • LFTP - basic usage, job control
  • LFTP - mirror and reverse mirror content
  • LFTP - batch, non-interactive, scripted mode
  • Explore: 'wget', 'curl' & 'ssh'
8

Network Interface Configuration

  • Discuss concepts
  • Identify key files & scripts
  • Explore: IPv4 & IPv6 configuration
  • Configure aliased interfaces
  • Provision additional NIC
  • Evaluate results
9

Very Secure File Transfer Protocol Daemon (VSFTPD)

  • Concepts & Applications
  • Explore configuration directives
  • Disable anonymous access
  • Source connections to VSFTPD
10

RSYNC

  • Discuss features
  • Synchronize inter-server content
  • Evaluate
11

Trivial File Transfer Protocol Daemon (TFTPD)

  • Concepts & Applications
  • Install and configure
  • Archive Cisco router configuration
  • Use 'tftp' client to move data
  • Discuss caveats
12

TELNETD

  • Concepts & Applications
  • Enable via XINETD
  • Source connections to TELNETD
13

NTPD

  • Explain NTP hierarchy
  • Configure time sources
  • Synchronize internal resources via NTP
  • Evaluate results
14

Dynamic Host Configuration Protocol (DHCPD)

  • Configure exclusive broadcast domain
  • Install and configure DHCPD
  • Implement reservations
  • Examine client configuration
  • Evaluate results
15

Domain Name System (DNS) - BIND

  • Configure BIND as a caching-only DNS server
  • Implement Master DNS Zones
  • Configure Master/Slave Zones with peer
  • Evaluate results of BIND configuration
  • Configure IPv4 reverse support
  • Configure IPv6 forward & reverse support
  • Resolve queries - compare & contrast client resolvers
16

Network File System (NFS) Implementation

  • Implement NFS Server
  • Export shares and discuss options
  • Mount NFS exports on remote Linux Host
  • Implement AutoFS
17

Samba Implementation

  • Implement Linux & Windows Integration via Samba
  • Use key Samba clients
  • Explore Samba Configuration files
  • Install Samba Server support
  • Configure Samba file sharing
  • Configure Samba-Active Directory Integration with Winbind
  • Evaluate results
18

Apache Web Server Implementation

  • Explore Apache configuration tree
  • Peruse log configuration variables
  • Configure IP-based Virtual Hosts
  • Configure Name-based Virtual Hosts
  • Implement Apache logging system per virtual host
19

MySQL Relational Database Management System

  • Install MySQL Relational Database Management System
  • Secure access to MySQL
  • Explore MySQL monitor shell-based interface
  • Create sample MySQL database
  • Populate with data and execute queries
  • Discuss key SQL DML Commands
  • Evaluate results
20

PHP

  • Discuss features and benefits
  • Install Apache | MySQL Support
  • Write data-retrieval script
  • Execute & debug
  • Evaluate results
21

SELinux Intro

  • Discuss Concepts & Applications
  • Explore default configuration
  • Identify key tools
  • Expose SELinux subject | object labels
  • Enable SELinux-restricted functions on key services
  • Auto-relabel the file system
  • Copy & Move data & evaluate ramifications
  • Evaluate results
22

NMAP - Reconnaisance and Risk Assessment Tool

  • Discuss features & benefits
  • Install via YUM
  • Identifiy key NMAP configuration files
  • Identify commonly used NMAP options/switches/parameters
  • Perform service identification
  • Perform local & remote service risk exposure scans
23

IPTABLES - Firewall

  • Concepts & Applications
  • Explore default tables and chains
  • Define and test INPUT chain rules
  • Define and test OUTPUT chain rules
  • Explain IPTABLES default chains/filters and policies
  • Filter traffic based on Layers 3|4
  • Test connectivity
  • Evaluate IPTables6 (IPv6) support
  • Write IPv6 rules
  • Archive | Restore firewall rules
24

TCPDump

  • Concepts & Applications
  • Capture broad-based traffic
  • Narrow scope with Berkeley Packet Filters (BPFs)
  • Parse captured traffic
  • Evaluate results
25

Apache SSL

  • Features & Benefits
  • Explore default configuration
  • Generate usage keys for virtual hosts
  • Apply usage keys to virtual hosts & test configuration
  • Use 'tcpdump' to intercept clear-text & encrypted traffic
  • Compare and contrast capture results
26

VSFTPD - SSLFeatures & Benefits

  • Reference SSL|TLS usage keys
  • Configure VSFTPD to support SSL|TLS exclusively
  • Evaluate connectivity with: LFTP & FileZilla
  • Liberate server configuration with hybrid approach
  • Capture FTP clear-text & encrypted traffic with: 'tcpdump'
  • Compare & contrast packet dumps
  • Evaluate results
27

Enhance Security Posture

  • Rationalize consequences (pros|cons) of lean presence
  • Discuss compliance benefits
  • Use 'nmap' to identify superfluous services: local & remote perspectives
  • Mitigate risk by reducing exposure
  • Loopback Participant daemons
  • Perform post-mitigation reconnaisance with 'nmap'
  • Document baseline configuration
  • Evaluate Results

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 4,000 Modules on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting http://encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top