
Administering Red Hat Linux 6 - Part 3
Overview
This highly practical instructor led Administering Red Hat Linux 6 - Part 3 training course is designed to give delegates practical experience in the areas of networking, security and basics of shell scripting. With a strong emphasis on practical hands-on training, this course will teach the essential network, security and shell scripting tasks required on a Red Hat Linux system.
Objectives
On completion of this Administering Red Hat Linux 6 - Part 3 course the delegate will have gained practical experience of networking, securing and scripting on a Red Hat Linux system.
The delegate will also gain the essential knowledge required to study towards taking the official Red Hat Certified Engineer (RHCE) certification.
Outline
Course Contents - DAY 1
Course Introduction
- Administration and Course Materials
- Course Structure and Agenda
- Delegate and Trainer Introductions
Session 1: Administering a Virtual Environment
- Revision of the virtualised environment
- Creating a Network Bridge
- Configuring the Firewall for a Network Bridge
- Configuring a New KVM Virtual Network
- Exercise
Session 2: Further Software Management
- The Yellow Dog Update, Modifier Tool (YUM)
- Creating a YUM repository
- Configuring YUM plugins
- Understand the design of a package
- Build a simple package
- Exercise
Session 3: File Security and Integrity
- System Security
- Extended Permissions
- GPG
- Why encrypt data and verify the sender
- Key pairs and management
- Using Digital signatures
- Checking and repairing file systems
- Exercise
Session 4: Network Management
- Routing under Linux
- IPROUTE suite of programs
- Configuring network cards and Routing
- Configuring the system as a Gateway
- IPV6 Addressing Overview
- Network tools :ethereal, tethereal, tcpdump, netstat, wireshark,etc
- Configure Ethernet Bonding
- Exercise
Course Contents - DAY 2
Session 5: Securing Networks: Firewalls
- Netfilter - iptables
- Packet Filtering using iptables
- Rule Targets
- Basic Rules and their Operation
- Connection Tracking
- Firewalls with Virtual Machine Bridges
- Debugging Route Problems
- Source and Destination NAT Configuration
- Red Hat supplied tools for iptables configuration
- Exercise
Session 6: DNS
- The DNS/BIND system under Red Hat Linux
- Name Server Hierarchy
- Setting up DNS
- Master/Slave Zones
- Reverse lookup Zones
- Record types and their syntax
- Name Daemon Control Utility (rndc)
- Address Match Lists (acl)
- Configuring a Caching Only Name Server
- DNS in a chroot environment
- Testing a DNS server
- Exercise
Session 7: Centralised and Secure Storage
- What is ISCSI
- Setting up ISCSI Target and Initiator
- Accessing Centralised Storage
- Encrypting file systems
- Accessing encrypted file systems
- Exercise
Session 8: Configuring Network Time Protocol
- Stratum Levels
- Choosing a time source
- Configuring the ntp daemon
- NTP roles
- Setting up an NTP Server and Client
- Direct or Broadcast Polling
- Allowing NTP connections
- Syncing considerations
- Exercise
Course Contents - DAY 3
Session 9: Sharing Files across the Network
- Configure file sharing using NFS
- NFS commands
- Automounter
- Introduction to CIFS(SAMBA)
- Configure file sharing between hosts with CIFS
- Using Konqueror and Gnome to access shares
- Configuring an FTP server
- Anonymous users
- Controlling access to the FTP server
- Using the sftp command
- Exercise
Session 10: Advanced Security
- Administrative Privileges
- Configure sudo privileges
- What is Kerberos
- Configuring a Kerberos 5 Server
- Setting up the Kerberos Client
- Exercise
Session : 11 Basic Mail Server Configuration
- Email Components
- Mail User, Mail Transport and Mail User Agents
- Configuring sendmail and postfix
- Sendmail Configuration Files
- Sendmail Configuration with the m4 Macro Language
- Managing Virtual Addresses
- Macro Definitions
- Switching to postfix, a sendmail replacement
- Postfix Configuration
- Procmail delivery agent
- Configuring a null client using Postfix
- Dovecot - POP and IMAP services
- Exercise
Session 12: SSL and Web Service Configuration
- Data Security and Encryption
- Public Key Encryption
- Configuring Virtual Hosts : Name And IP Based Access
- Displaying Apache Web Server Information and Status
- Dynamic Virtual hosts
- Configuring HTTPS
- Signed Certificates
- Apache SSL Configuration File
- HTTPS Virtual Hosts
- Exercise
Course Contents - DAY 4
Session 13: Shell Scripting
- What is a shell script?
- Creating and executing shell scripts
- User interaction
- Command line arguments
- Decision constructs using the 'if' statement
- Case statement
- Looping constructs: for/while/until
- Automating administrative tasks
- Exercise
Session 14: Troubleshooting Un-Bootable Systems
- Troubleshooting Linux
- The Rescue Environment
- Common boot problems and their resolution
- Booting into GRUB (Maintenance Mode)
- Booting an un-bootable system into Recovery Mode
- Booting from USB devices
- Reinstalling the GRUB Loader
- Exercise