Administering Red Hat Linux - Part 3
Course Description
This highly practical instructor led Administering Red Hat Linux - Part 3 training course is designed to give delegates practical experience in the areas of networking, security, basics of shell scripting and elementary installing of MariaDB. With a strong emphasis on practical hands-on training, this course will teach the essential network, security and shell scripting tasks required on a Red Hat Linux system
4 days
Contact us for pricing
Prerequisites
Administering Red Hat Linux - Part 2FastTrack to Red Hat Linux System Administrator
Course Objectives
On completion of this Administering Red Hat Linux - Part 3 course the delegate will have gained practical experience of networking, securing and scripting on a Red Hat Linux system.The delegate will also gain the essential knowledge required to study towards taking the official Red Hat Certified Engineer (RHCE) certification.
Examinations
Targeted to closely follow the official Red Hat certification curriculum. The Administering Red Hat Linux - Part 3 course together with the Administering Red Hat Linux - Part 1 & Part 2 courses will enable the delegate to work towards achieving the Red Hat Certified Engineer (RHCE) qualification having already gained the Red Hat Certified Systems Administrators (RHCSA) qualification.Before taking any exam, ensure you have the recommended experience. The Red Hat website lists all exam requirements and these are updated regularly.
Exams are not included as part of the course.
Follow-On Courses
Apache Web ServerPerl Programming
Oracle SQL
Course Introduction
Administration and Course MaterialsCourse Structure and Agenda
Delegate and Trainer Introductions
RECAP AND FURTHER DETAILS ON SYSTEMD
Recap of systemdsystemd Wants and Requires
Useful systemd related utilities
NETWORK MANAGEMENT AND IPV6
Routing under LinuxIPROUTE suite of programs
Configuring network cards and Routing
Configuring the system as a Gateway
IPV6 Addressing
Local Network Bridges
Network tools: tcpdump, netstat, wireshark,etc
Configure Ethernet Bonding (Link aggregation, teaming)
FILE SECURITY AND INTEGRITY
System SecurityExtended Permissions
GPG
Why encrypt data and verify the sender
Key pairs and management
Using Digital signatures
Checking and repairing file systems
SECURING NETWORKS: FIREWALLS
Packet Filtering using firewalldRule Targets
Basic Rules and their Operation
Connection Tracking
Source and Destination NAT Configuration
DOMAIN NAME SERVER (DNS)
The DNS/BIND system under Red Hat LinuxName Server Hierarchy
Setting up DNS
Master/Slave Zones
Reverse lookup Zones
Record types and their syntax
Name Daemon Control Utility (rndc)
Address Match Lists (acl)
Configuring a Caching Only Name Server
DNS in a chroot environment
Testing a DNS server
CENTRALISED AND SECURE STORAGE
What is ISCSISetting up ISCSI Target and Initiator
Accessing Centralised Storage
Accessing encrypted file systems
CONFIGURING NETWORK TIME PROTOCOL
Stratum LevelsChoosing a time source
Configuring the ntp daemon
NTP roles
Setting up an NTP Server and Client
Direct or Broadcast Polling
Allowing NTP connections
Syncing considerations
FURTHER SECURITY FEATURES
su and sudo configurationConfiguring Kerberos Server and Client
SHARING FILES ACROSS THE NETWORK (NFS & SMB)
Configure file sharing using NFSNFS commands
Automounter
Introduction to CIFS(SAMBA)
Configure file sharing between hosts with CIFS
Using Konqueror to access shares
BASIC MAIL SERVER CONFIGURATION
Email ComponentsMail User, Mail Transport and Mail User Agents
Postfix Configuration
Configuring a null client using Postfix
Dovecot - POP and IMAP services
SSL, TSL AND WEB SERVICE CONFIGURATION
Data Security and EncryptionPublic Key Encryption
Configuring Virtual Hosts : Name And IP Based Access
Displaying Apache Web Server Information and Status
Dynamic Virtual hosts
Configuring HTTPS
Signed Certificates
Apache SSL Configuration File
HTTPS Virtual Hosts
CONFIGURING A MARIADB DATABASE
Install and configure MariaDBBackup and Restore a database
Create a simple database schema
Perform simple SQL queries on the database
SHELL SCRIPTING
What is a shell script?Creating and executing shell scripts
User interaction
Command line arguments
CONDITIONAL SHELL SCRIPTING
Decision constructs using the 'if' statementCase statement
Looping constructs: for/while/until
Automating administrative tasks
OVERVIEW OF LINUX CONTAINERS
What is a Linux ContainerWhat are the advantages of Containers
What is Docker
LinuxLinux AdministrationRed HatRed Hat LinuxLinux System Administration