Course Icon Independent Red Hat Linux Training

Administering Red Hat Linux 6 - Part 3

0800 1337 401

Overview

This highly practical instructor led Administering Red Hat Linux 6 - Part 3 training course is designed to give delegates practical experience in the areas of networking, security and basics of shell scripting. With a strong emphasis on practical hands-on training, this course will teach the essential network, security and shell scripting tasks required on a Red Hat Linux system.

Objectives

On completion of this Administering Red Hat Linux 6 - Part 3 course the delegate will have gained practical experience of networking, securing and scripting on a Red Hat Linux system.

The delegate will also gain the essential knowledge required to study towards taking the official Red Hat Certified Engineer (RHCE) certification.

Outline

Course Contents - DAY 1

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Session 1: Administering a Virtual Environment

  • Revision of the virtualised environment
  • Creating a Network Bridge
  • Configuring the Firewall for a Network Bridge
  • Configuring a New KVM Virtual Network
  • Exercise

Session 2: Further Software Management

  • The Yellow Dog Update, Modifier Tool (YUM)
  • Creating a YUM repository
  • Configuring YUM plugins
  • Understand the design of a package
  • Build a simple package
  • Exercise

Session 3: File Security and Integrity

  • System Security
  • Extended Permissions
  • GPG
  • Why encrypt data and verify the sender
  • Key pairs and management
  • Using Digital signatures
  • Checking and repairing file systems
  • Exercise

Session 4: Network Management

  • Routing under Linux
  • IPROUTE suite of programs
  • Configuring network cards and Routing
  • Configuring the system as a Gateway
  • IPV6 Addressing Overview
  • Network tools :ethereal, tethereal, tcpdump, netstat, wireshark,etc
  • Configure Ethernet Bonding
  • Exercise

Course Contents - DAY 2

Session 5: Securing Networks: Firewalls

  • Netfilter - iptables
  • Packet Filtering using iptables
  • Rule Targets
  • Basic Rules and their Operation
  • Connection Tracking
  • Firewalls with Virtual Machine Bridges
  • Debugging Route Problems
  • Source and Destination NAT Configuration
  • Red Hat supplied tools for iptables configuration
  • Exercise

Session 6: DNS

  • The DNS/BIND system under Red Hat Linux
  • Name Server Hierarchy
  • Setting up DNS
  • Master/Slave Zones
  • Reverse lookup Zones
  • Record types and their syntax
  • Name Daemon Control Utility (rndc)
  • Address Match Lists (acl)
  • Configuring a Caching Only Name Server
  • DNS in a chroot environment
  • Testing a DNS server
  • Exercise

Session 7: Centralised and Secure Storage

  • What is ISCSI
  • Setting up ISCSI Target and Initiator
  • Accessing Centralised Storage
  • Encrypting file systems
  • Accessing encrypted file systems
  • Exercise

Session 8: Configuring Network Time Protocol

  • Stratum Levels
  • Choosing a time source
  • Configuring the ntp daemon
  • NTP roles
  • Setting up an NTP Server and Client
  • Direct or Broadcast Polling
  • Allowing NTP connections
  • Syncing considerations
  • Exercise

Course Contents - DAY 3

Session 9: Sharing Files across the Network

  • Configure file sharing using NFS
  • NFS commands
  • Automounter
  • Introduction to CIFS(SAMBA)
  • Configure file sharing between hosts with CIFS
  • Using Konqueror and Gnome to access shares
  • Configuring an FTP server
  • Anonymous users
  • Controlling access to the FTP server
  • Using the sftp command
  • Exercise

Session 10: Advanced Security

  • Administrative Privileges
  • Configure sudo privileges
  • What is Kerberos
  • Configuring a Kerberos 5 Server
  • Setting up the Kerberos Client
  • Exercise

Session : 11 Basic Mail Server Configuration

  • Email Components
  • Mail User, Mail Transport and Mail User Agents
  • Configuring sendmail and postfix
  • Sendmail Configuration Files
  • Sendmail Configuration with the m4 Macro Language
  • Managing Virtual Addresses
  • Macro Definitions
  • Switching to postfix, a sendmail replacement
  • Postfix Configuration
  • Procmail delivery agent
  • Configuring a null client using Postfix
  • Dovecot - POP and IMAP services
  • Exercise

Session 12: SSL and Web Service Configuration

  • Data Security and Encryption
  • Public Key Encryption
  • Configuring Virtual Hosts : Name And IP Based Access
  • Displaying Apache Web Server Information and Status
  • Dynamic Virtual hosts
  • Configuring HTTPS
  • Signed Certificates
  • Apache SSL Configuration File
  • HTTPS Virtual Hosts
  • Exercise

Course Contents - DAY 4

Session 13: Shell Scripting

  • What is a shell script?
  • Creating and executing shell scripts
  • User interaction
  • Command line arguments
  • Decision constructs using the 'if' statement
  • Case statement
  • Looping constructs: for/while/until
  • Automating administrative tasks
  • Exercise

Session 14: Troubleshooting Un-Bootable Systems

  • Troubleshooting Linux
  • The Rescue Environment
  • Common boot problems and their resolution
  • Booting into GRUB (Maintenance Mode)
  • Booting an un-bootable system into Recovery Mode
  • Booting from USB devices
  • Reinstalling the GRUB Loader
  • Exercise
See all of the available Technical Courses