|
LS103 Linux Advanced System Administration Length: 40 Hours Description
| Sana | 22.03.2020 | Hajmi | 46,5 Kb. | | #8551 |
Length:
40 Hours
Description:
Attendees of this course will learn how to perform the advanced Linux system administration functions. Topics include installing, upgrading, and removing software packages, installing and configuring a new kernel, managing modules, managing hardware, managing processes and tunable parameters through the /proc filesystem, managing swap space, setting up a network filesystem and auto mounting NFS resources, configuring the system logging daemon, establish and maintain system security, and troubleshoot and correct problems.
Although the Red Hat Linux Operating System is used as the training platform, the information in this course can be easily adopted to other Linux systems.
Audience:
This course is designed for experienced system administrators who will be performing advanced system administration procedures on a Linux operating system.
Prerequisites:
Attendees should have:
-
completed the LS101 - Introduction to the Linux System course, and
-
completed the LS102 - Linux System Administration course, or
-
have at least one year experience as a Linux system administrator.
Follow-On Training:
After completing this course it is suggested that the student attend:
-
LS104 - Linux Network Administration
Course Materials: -
LS103 - Linux Advanced System Administration Student Guide and course notes
Course Objectives:
Upon completion of this course the attendee will be able to:
-
install new software packages using the Red Hat Package Managment system and tar and compressed tar formats,
-
Obtain, configure, install, and test a new kernel,
-
install new kernel modules,
-
identify and manage hardware devices,
-
use the /proc filesystem to obtain processe information and change system parameters,
-
add, manage, and delete swap space,
-
set up a Network File System server and client,
-
configure the automounter to automatically mount NFS shares,
-
configure and use the system logging daemon,
-
identify potential security problems and implement corrective actions,
-
correct common system problems, and,
-
recover from common system errors.
Course Content: Unit 1 - Software Maintenance -
Unit Overview
-
Installing Software Packages
-
Distribution Methods
-
Distribution Format
-
Steps for Installing a Package
-
Red Hat Package Management System (RPM)
-
Red Hat Update Agent
-
Using the GUI Red Hat Update Agent Configuration Tool
-
Running the Red Hat Update Agent
-
Downloading and Installing Software from the Internet
-
Unarchiving .tar and .tgz Files
Unit 2 - Kernel and Module Management -
The Linux Kernel
-
Kernel Versioning
-
Kernel Development History
-
Inside the Kernel
-
Kernel Modules
-
Obtaining a Kernel
-
Creating a Backup
-
Installing from Source
-
Upgrading Red Hat Kernels
-
Loadable Modules
-
The /etc/modules.conf File
-
Managing Modules at Runtime
Unit 3 - Managing Hardware -
Identifying Hardware Devices
-
Configuring System Hardware
-
Configuring CMOS
-
IRQ Assignments
-
Plug-n-Play Devices
-
Hardware Accessibility
-
Installing a Modem
-
Configuring Dial-Up Connections
-
Configuring Video
-
Managing Mobile Hardware Devices
-
Adding IDE Hard Drives
-
Managing SCSI Devices
Unit 4 - Special File Systems -
The /proc Filesystem
-
Changing running kernel parameters
-
Managing Swap Space
-
Enabling Swap Space At Boot
Unit 5 - Network Filesystems -
Network Filesystem
-
NFS Terminology
-
NFS Daemons
-
NFS Commands and Files
-
The /usr/sbin/exportfs Command
-
The /etc/exports File
-
The /bin/mount Command
-
The /usr/sbin/showmount Command
-
Removing an NFS Resource
-
Automounting Filesystems
-
NFS Security Issues
Unit 6 - System Logging Daemon -
System Logging
-
The System Log ( syslogd ) Facility
-
Log File Checking Programs
Unit 7 - Linux System Security -
Security Documentation and Resources
-
Why is a System Hacked?
-
How are Systems Hacked?
-
How is Hacking Prevented?
-
Controlling Access - Users
-
Scanners
-
System Hardening
-
Log Files
-
Log File Checking Programs
-
Has Your System Been Compromised?
-
What To Do if Your System is Hacked
-
Case Study - Securing a System
-
Auditing User and Group Accounts
-
Filesystem Integrity Checking
-
Scanning Log Files
-
The logwatch Program
-
Troubleshooting Process
-
Problem Description
-
Recreate the Problem
-
Identify the Cause
-
Solving the Problem
-
Booting Issues
-
Rescue Mode
-
Hardware Problems
-
Login Issues
-
Corrupt Shared Libraries
-
Filesystem Issues
-
Examining System Resources
-
Listing Open Files
Disclaimer:
The contents of this outline reflect the general subjects and topics covered in this course. The author continually updates courses as changes are made to the operating systems and/or applications. Therefore, the actual course may contain additional information, deleted subjects, or the order of presentation may be different. The author reserves the right to make changes to the course content without notification and the outline may not always reflect the exact course content.
Copyright 2005 William C. Holliker - All Rights Reserved
|
| |