Administering Red Hat Linux - Part 3

Course Description

This highly practical instructor led Administering Red Hat Linux - Part 3 training course is designed to give delegates practical experience in the areas of networking, security, basics of shell scripting and elementary installing of MariaDB. With a strong emphasis on practical hands-on training, this course will teach the essential network, security and shell scripting tasks required on a Red Hat Linux system
4 days
Contact us for pricing

Prerequisites

Administering Red Hat Linux - Part 2
FastTrack to Red Hat Linux System Administrator

Course Objectives

On completion of this Administering Red Hat Linux - Part 3 course the delegate will have gained practical experience of networking, securing and scripting on a Red Hat Linux system.
The delegate will also gain the essential knowledge required to study towards taking the official Red Hat Certified Engineer (RHCE) certification.

Examinations

Targeted to closely follow the official Red Hat certification curriculum. The Administering Red Hat Linux - Part 3 course together with the Administering Red Hat Linux - Part 1 & Part 2 courses will enable the delegate to work towards achieving the Red Hat Certified Engineer (RHCE) qualification having already gained the Red Hat Certified Systems Administrators (RHCSA) qualification.
Before taking any exam, ensure you have the recommended experience. The Red Hat website lists all exam requirements and these are updated regularly.

Exams are not included as part of the course.

Follow-On Courses

Apache Web Server
Perl Programming
Oracle SQL

Course Introduction

Administration and Course Materials
Course Structure and Agenda
Delegate and Trainer Introductions

RECAP AND FURTHER DETAILS ON SYSTEMD

Recap of systemd
systemd Wants and Requires
Useful systemd related utilities

NETWORK MANAGEMENT AND IPV6

Routing under Linux
IPROUTE suite of programs
Configuring network cards and Routing
Configuring the system as a Gateway
IPV6 Addressing
Local Network Bridges
Network tools: tcpdump, netstat, wireshark,etc
Configure Ethernet Bonding (Link aggregation, teaming)

FILE SECURITY AND INTEGRITY

System Security
Extended Permissions
GPG
Why encrypt data and verify the sender
Key pairs and management
Using Digital signatures
Checking and repairing file systems

SECURING NETWORKS: FIREWALLS

Packet Filtering using firewalld
Rule Targets
Basic Rules and their Operation
Connection Tracking
Source and Destination NAT Configuration

DOMAIN NAME SERVER (DNS)

The DNS/BIND system under Red Hat Linux
Name Server Hierarchy
Setting up DNS
Master/Slave Zones
Reverse lookup Zones
Record types and their syntax
Name Daemon Control Utility (rndc)
Address Match Lists (acl)
Configuring a Caching Only Name Server
DNS in a chroot environment
Testing a DNS server

CENTRALISED AND SECURE STORAGE

What is ISCSI
Setting up ISCSI Target and Initiator
Accessing Centralised Storage
Accessing encrypted file systems

CONFIGURING NETWORK TIME PROTOCOL

Stratum Levels
Choosing a time source
Configuring the ntp daemon
NTP roles
Setting up an NTP Server and Client
Direct or Broadcast Polling
Allowing NTP connections
Syncing considerations

FURTHER SECURITY FEATURES

su and sudo configuration
Configuring Kerberos Server and Client

SHARING FILES ACROSS THE NETWORK (NFS & SMB)

Configure file sharing using NFS
NFS commands
Automounter
Introduction to CIFS(SAMBA)
Configure file sharing between hosts with CIFS
Using Konqueror to access shares

BASIC MAIL SERVER CONFIGURATION

Email Components
Mail User, Mail Transport and Mail User Agents
Postfix Configuration
Configuring a null client using Postfix
Dovecot - POP and IMAP services

SSL, TSL AND WEB SERVICE CONFIGURATION

Data Security and Encryption
Public Key Encryption
Configuring Virtual Hosts : Name And IP Based Access
Displaying Apache Web Server Information and Status
Dynamic Virtual hosts
Configuring HTTPS
Signed Certificates
Apache SSL Configuration File
HTTPS Virtual Hosts

CONFIGURING A MARIADB DATABASE

Install and configure MariaDB
Backup and Restore a database
Create a simple database schema
Perform simple SQL queries on the database

SHELL SCRIPTING

What is a shell script?
Creating and executing shell scripts
User interaction
Command line arguments

CONDITIONAL SHELL SCRIPTING

Decision constructs using the 'if' statement
Case statement
Looping constructs: for/while/until
Automating administrative tasks

OVERVIEW OF LINUX CONTAINERS

What is a Linux Container
What are the advantages of Containers
What is Docker

LinuxLinux AdministrationRed HatRed Hat LinuxLinux System Administration