|
LS103 Linux Advanced System Administration Length: 40 Hours Description
|
Sana | 22.03.2020 | Hajmi | 46,5 Kb. | | #8551 |
Length:
40 Hours
Description:
Attendees of this course will learn how to perform the advanced Linux system administration functions. Topics include installing, upgrading, and removing software packages, installing and configuring a new kernel, managing modules, managing hardware, managing processes and tunable parameters through the /proc filesystem, managing swap space, setting up a network filesystem and auto mounting NFS resources, configuring the system logging daemon, establish and maintain system security, and troubleshoot and correct problems.
Although the Red Hat Linux Operating System is used as the training platform, the information in this course can be easily adopted to other Linux systems.
Audience:
This course is designed for experienced system administrators who will be performing advanced system administration procedures on a Linux operating system.
Prerequisites:
Attendees should have:
completed the LS101 - Introduction to the Linux System course, and
completed the LS102 - Linux System Administration course, or
have at least one year experience as a Linux system administrator.
Follow-On Training:
After completing this course it is suggested that the student attend:
LS104 - Linux Network Administration
Course Materials:
LS103 - Linux Advanced System Administration Student Guide and course notes
Course Objectives:
Upon completion of this course the attendee will be able to:
install new software packages using the Red Hat Package Managment system and tar and compressed tar formats,
Obtain, configure, install, and test a new kernel,
install new kernel modules,
identify and manage hardware devices,
use the /proc filesystem to obtain processe information and change system parameters,
add, manage, and delete swap space,
set up a Network File System server and client,
configure the automounter to automatically mount NFS shares,
configure and use the system logging daemon,
identify potential security problems and implement corrective actions,
correct common system problems, and,
recover from common system errors.
Course Content: Unit 1 - Software Maintenance
Unit Overview
Installing Software Packages
Distribution Methods
Distribution Format
Steps for Installing a Package
Red Hat Package Management System (RPM)
Red Hat Update Agent
Using the GUI Red Hat Update Agent Configuration Tool
Running the Red Hat Update Agent
Downloading and Installing Software from the Internet
Unarchiving .tar and .tgz Files
Unit 2 - Kernel and Module Management
The Linux Kernel
Kernel Versioning
Kernel Development History
Inside the Kernel
Kernel Modules
Obtaining a Kernel
Creating a Backup
Installing from Source
Upgrading Red Hat Kernels
Loadable Modules
The /etc/modules.conf File
Managing Modules at Runtime
Unit 3 - Managing Hardware
Identifying Hardware Devices
Configuring System Hardware
Configuring CMOS
IRQ Assignments
Plug-n-Play Devices
Hardware Accessibility
Installing a Modem
Configuring Dial-Up Connections
Configuring Video
Managing Mobile Hardware Devices
Adding IDE Hard Drives
Managing SCSI Devices
Unit 4 - Special File Systems
The /proc Filesystem
Changing running kernel parameters
Managing Swap Space
Enabling Swap Space At Boot
Unit 5 - Network Filesystems
Network Filesystem
NFS Terminology
NFS Daemons
NFS Commands and Files
The /usr/sbin/exportfs Command
The /etc/exports File
The /bin/mount Command
The /usr/sbin/showmount Command
Removing an NFS Resource
Automounting Filesystems
NFS Security Issues
Unit 6 - System Logging Daemon
System Logging
The System Log ( syslogd ) Facility
Log File Checking Programs
Unit 7 - Linux System Security
Security Documentation and Resources
Why is a System Hacked?
How are Systems Hacked?
How is Hacking Prevented?
Controlling Access - Users
Scanners
System Hardening
Log Files
Log File Checking Programs
Has Your System Been Compromised?
What To Do if Your System is Hacked
Case Study - Securing a System
Auditing User and Group Accounts
Filesystem Integrity Checking
Scanning Log Files
The logwatch Program
Troubleshooting Process
Problem Description
Recreate the Problem
Identify the Cause
Solving the Problem
Booting Issues
Rescue Mode
Hardware Problems
Login Issues
Corrupt Shared Libraries
Filesystem Issues
Examining System Resources
Listing Open Files
Disclaimer:
The contents of this outline reflect the general subjects and topics covered in this course. The author continually updates courses as changes are made to the operating systems and/or applications. Therefore, the actual course may contain additional information, deleted subjects, or the order of presentation may be different. The author reserves the right to make changes to the course content without notification and the outline may not always reflect the exact course content.
Copyright 2005 William C. Holliker - All Rights Reserved
|
| |