Linux System Administration
Details
Although the course includes installing and configuring a CentOS 7 / RHEL 7 Linux system, much of the course content also applies to Oracle, Ubuntu, Scientific and other current versions of mainstream Linux distributions. Labs include user and group maintenance, system backups and restoration, software management, administration tasks automation, file system creation and maintenance, managing remote access, working with cron, and configuring basic file sharing and Web services, as well as working with system logging utilities such as rsyslog and much more.
Prerequisites: Experience with common UNIX/Linux user-level commands, such as for moving, copying and editing files. Experience with the vi editor is a plus. Attendance at the UNIX/Linux Fundamentals course provides a solid foundation.
Outline
- UNIX, Linux and Open Source
- Duties of the System Administrator
- Superusers and the Root Login
- Sharing Superuser Privileges with Others (su and sudo Commands)
- TCP/IP Networking Fundamentals
- Online Help
- Planning: Hardware and Software Considerations
- Site Planning
- Installation Methods and Types
- Installation Classes
- Partitions
- Logical Volume Manager - LVM
- File System Overview
- Swap Partition Considerations
- Other Partition Considerations
- The Linux Boot Loader: grub
- Software Package Selection
- Adding and Configuring Peripherals
- Printers
- Graphics Controllers
- Basic Networking Configuration
- Booting to Recovery Mode
- Boot Sequence
- The systemd Daemon
- The systemctl Command
- Targets vs. Run Levels
- Modifying a Target
- Service Unit Scripts
- Changing System States
- Booting into Rescue Mode
- Shutdown Commands
- Identifying Software Packages
- Using rpm to Manage Software
- Using yum to Manage Software
- Installing and Removing Software
- Identifying Devices
- Displaying Device and System Information (PCI, USB)
- Plug and Play Devices
- Device Configuration Tools
- Setting Policies
- User File Management
- The /etc/passwd file
- The /etc/shadow file
- The /etc/group file
- The /etc/gshadow file
- Adding Users
- Modifying User Accounts
- Deleting User Accounts
- Working with Groups
- Setting User Environments
- Login Configuration Files
- Filesystem Types
- Conventional Directory Structure
- Mounting a File System
- The /etc/fstab File
- Special Files (Device Files)
- Inodes
- Hard File Links
- Soft File Links
- Creating New File Systems with mkfs
- The lost+found Directory
- Repairing File Systems with fsck
- The Journaling Attribute
- File and Disk Management Tools
- File Permissions
- Directory Permissions
- Octal Representation
- Changing Permissions
- Setting Default Permissions
- Access Control Lists (ACLs)
- The getfacl and setfacl commands
- SUID Bit
- SGID Bit
- The Sticky Bit
- Characteristics of Processes
- Parent-Child Relationship
- Examining Running Processes
- Background Processes
- Controlling Processes
- Signaling Processes
- Killing Processes
- Automating Processes
- cron and crontab
- at and batch
- System Processes (Daemons)
- Linux Kernel Components
- Types of Kernels
- Kernel Configuration Options
- Recompiling the Kernel
- Shell Script Fundamentals
- Bash Shell Syntax Overview
- Shell Script Examples
- Backup Concepts and Strategies
- User Backups with the tar Command
- System Backup Options
- The xfsdump and xfsrestore Commands
- Common Problems and Symptoms
- Troubleshooting Steps
- Repairing General Boot Problems
- Repairing the GRUB 2 Boot Loader
- Hard Drive Problems
- Restoring Shared Libraries
- System Logs and rsyslogd
- Networking Services Overview
- NetworkManager Introduction
- Network Configuration Files Locations and Formats
- Enabling and Restarting Network Services with systemtcl
- Configuring Basic Networking Manually
- Configuring Basic Networking with NetworkManager
- LAMP Overview
- Configuring the Apache Web Server
- Common Directives
- Apache Virtual Hosting
- Configuring an Open Source Database
- MySQL
- MariaDB
- PHP Basics
- Perl CGI Scripting
- Security Overview
- Maintaining System Security
- Server Access
- Physical Security
- Network Security
- Security Tools
- Port Probing with nmap
- Intrusion Detection and Prevention
- PAM Security Modules
- Scanning the System
- Maintaining File Integrity
- Using Firewalls
- Introduction to firewalld
- Configure Samba for Linux to Linux/UNIX File Sharing
- Configure Samba for Linux to Windows File Sharing
- Use the smbclient Utility to Transfer Files
- Mount/Connect Samba Shares to Linux and Windows Clients
- Using NFS to Access Remote File Systems
- Configuring the NFS Server
- Configuring the NFS Client
- Exporting File Systems from the NFS Server to the NFS Client
Software Skills Training, Inc. (SST) is a leading provider of task-oriented training courses for IT professionals. Our task-based training philosophy is focused on saving you time and assuring that you are able to work more productively and with higher quality results after training. Founded in 2000, SST has delivered high-powered training to tens of thousands of IT professionals.
Choose from a variety of delivery options:
- Face-to-face in the classroom in over 100 cities
- Live remote attendance
- On-demand streaming
- Group training at your facility
We guarantee the overall quality of our courses with a 100% money-back guarantee. If any student is not totally satisfied for any reason, they can withdraw before the second day of class. Notify the instructor and return all course materials and receive a 100% refund.
Why Choose SST?- 50% hands on labs
- Small class sizes typically under 14 students
- Expert instructors that average over 10 years of teaching experience
- Students can retake any portion of a class that has been completed, within 12 months at no extra cost
- No registration fees or cancellation fees