0% found this document useful (0 votes)
97 views4 pages

LInux Training Outline Dec - 2017

This document outlines a syllabus for a Linux administration course based on Red Hat Enterprise Linux 7 (RHEL-7). The course covers many foundational Linux topics across two modules, including the Linux file system, users and permissions, storage and LVM, networking, security with SELinux, and managing processes, software and kernels. Key tools and commands are listed throughout for working with files, users, disks, networking and more on Linux systems. The goal is to provide students with skills in deploying and managing RHEL systems through hands-on labs.

Uploaded by

Narasimhan Parth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views4 pages

LInux Training Outline Dec - 2017

This document outlines a syllabus for a Linux administration course based on Red Hat Enterprise Linux 7 (RHEL-7). The course covers many foundational Linux topics across two modules, including the Linux file system, users and permissions, storage and LVM, networking, security with SELinux, and managing processes, software and kernels. Key tools and commands are listed throughout for working with files, users, disks, networking and more on Linux systems. The goal is to provide students with skills in deploying and managing RHEL systems through hands-on labs.

Uploaded by

Narasimhan Parth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

L I N U X A D M I N I S T R AT I O N : C U S T O M I S E D S Y L L A B U S B A S E D

ON RHEL-7

MODULE I : LINUX ESSENTIALS


The Basics
 Origins of Linux
 Free Software, “Open Source” and the GPL
 The Kernel Development Model
 Linux Distributions & their Application Base
 Using the Linux System: Users
 Logging on and off
 The System Administrator: Root User
 Graphical User Interface in Linux
 X Window System

Graphical Installation of Linux OS


Device Identities
Partition Types & Tools

The Command Line Interpreter—the Shell


Shell Characteristics
• Command Interface
• Command Interpreter
• Setting Environment Variables
• Command History
• I/O Redirection Facility
• Job Control
• Command-line Editing
• Command Completion
 Programming Language
 Terminals and Terminal Emulations
 Shell Characteristics
 Shell Prompt Settings

Getting Help
 Man Pages
 Info Pages
 HOWTOs
 Websites

The Linux File System


 The Essential features
 The Basic Structure : Inodes, Extents & Blocks
 Essential Contents
 Types of Files
 Devices as files
 Mounting and unmounting Filesystems

Shell Commands
 Basic User Commands pwd,who,whoami,users,groups,w, finger,chfn,date,cal
 Files and Directories ls , cp, mv ,cd, mkdir, rmdir, rm, touch
 Viewing Text Files & Using Pipes cat, more, less, wc
 Finding Files find, whereis, whatis,which,locate, updatedb
 Disk Related df, du,fdisk,parted
 Memory Related free, vmstat, meminfo

The vi Editor
 Overview
 Basic Functions
 Modes of Operation
 Extended Commands

Compression,Archiving & Backup Utilities
 gzip,gunzip,bzip2
 The tar utility

Installing Applications
 Using rpm
 Using tar
Exploring the Powerful String processing utilities
 The head, tail, tailf, wc Utilities
 The sort, diff, cut, paste,uniq Utilities
 The paste & tr Utilities

Regular Expressions
 Using grep ,sort,tee

Linux Processes
 Process States
 Foreground & Background Processes
 Process Identities
 Process Related Commands- ps, top, tree, kill,gtop, nice,renice, bg,jobs,fg
Module -II

User Administration

Adding and Managing Users and their Profiles:


 Commands :useradd,usermod,userdel, gpasswd, pwconv,pwunconv with various options
 Explain the significance of files under /etc directory : login.defs,skelpasswd,shadow,group,gshadow
etc.
 Sudoers /etc/sudoers and entries in it.
 Extended Attributes : chattr,lsattr
 Access Control Lists (ACL) : setfacl, getfacl
 User Disk Quotas Setup on XFS
 Sudoers utility visudo to setup co-administrators
 Setting up Job Scheduling using at and cron utilities

File Access Permissions & Attributes

 Levels of Permission & Class of Users


 Default Permission Settings : File Mode Creation Mask,umask
 Assigning permissions : Using symbolic and absolute modes, chmod
 Changing user/group Ownership of files : chown, chgrp
 Access Control Lists (ACL)

The Linux Boot Process & System Run Levels and Services

 MBR (Boot Loader)


 Kernel initialization
 BIOS Initialization
 Control Services Using systemd
 Control system services using systemctl

Manage RHEL Networking Services

 Configuring the Network Interface Card in Linux


 Testing the Linux Network using ping
 Connecting to other hosts in the LAN using telnet
 Using OpenSSH to Connect to other hosts in the LAN
 Copying files across the hosts using ftp and scp
 Manage IPv6 Network Configuration

Application Management through yum

 Main Configuration File


 Creating yum repositories
 Using yum to install,update,remove, and query packages
 yum group utilities
Basic Kernel Management
 Kernel Overview
 Reading & Deciphering the kernel ring buffer messages
 The /proc Directory and its Importance
 List, load & remove kernel modules

Analysing and Storing Logs : rsyslogd, logrotate, /etc/rsyslog.conf file

Logical Volume Manager

Creating an LVM partition using fdisk utility


Recognising various components of LVM
Implement LVM Storage
Extending and Reducing a Volume Group

An Introduction to Security-Enhanced Linux -SE Linux


Design of SELinux
View Mappings of SELinux Users
User's Password Locking Mechanism
Modifying the 'type' of a File
Changing 'Context Type'
Installing SELinux-specific Man Pages
SELinux Booleans
Policy Violation Logs

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy