WCTMS

Web Consulting, Training & Mentoring Solutions

(For students not seeking LPI Certification)
5 Days  

PREREQUISITE: Participants are expected to have completed the Introduction to UNIX Course or have equivalent experience.

WHO SHOULD ATTEND?: The course is intended for those people who will be responsible for the operation and management of a LINUX system.

COURSE DESCRIPTION: This course equips participants with the necessary tools to insure the well being of a LINUX system. Lab sessions include the installation, troubleshooting, and maintenance of a LINUX system.

BENEFITS OF ATTENDANCE: Students will be able to:

    Linux System Administration Course Install the LINUX system from distribution media;
    Linux System Administration Course Carry out startup and shutdown procedures;
    Linux System Administration Course Performing system administration tasks including adding and deleting users, adding devices, partitioning the disk, and other administrative functions;
    Linux System Administration Course Use the administrator files and commands in the /etc directory;
    Linux System Administration Course Manage disk space and filesystems;
    Linux System Administration Course Check file system integrity;
    Linux System Administration Course Provide user guidance;
    Linux System Administration Course Backup and restore all or parts of the system;
    Linux System Administration Course Monitor system performance, and establish and maintain network connectivity.


 

LINUX SYSTEM ADMINISTRATION
COURSE OUTLINE

CHAPTER 1: INTRODUCTION TO LINUX
1) History of Unix
2) Contemporary Products
3) Advantages of Linux
4) Components of the Linux Environment
5) Shells with Red Hat Linux
6) Major Linux Services
7) Organization of the Red Hat filesystem
8) Responsibilities of a System Administrator
9) Getting help

CHAPTER 2: WHAT YOU SHOULD ALREADY KNOW
1) Beginning Linux Topics
2) Shell Variables
3) The PATH Variable
4) Exporting Variables
5) The Command Line
6) The PS2 Variable
7) Command History
8) Command Substitution
9) cut, paste
10) expand, fmt
11) head, tail, nl, od
12) wc, split
13) pr, tac, tr
14) xargs, join
15) sed
16) Directory Manipulation Commands
17) File Manipulation Commands - cp
18) File Manipulation Commands - mv
19) File Manipulation Commands - rm, touch
20) Using Filename Expansion Characters
21) Special I/O Files
22) Standard I/O Files
23) Pipes
24) Process Management
25) ps, pstree
26) top
27) Signals
28) Job Control
29) nice, renice
30) Regular Expressions
31) Shells
32) Shell Variables
33) Shell Aliases
34) Functions
35) Startup Files
36) Key Mappings
37) Writing Shell Scripts
38) Executing Your Script
39) A Script's Environment
40) Exit Status
41) Programming the Shell

CHAPTER 3: SYSTEM STARTUP AND SHUTDOWN
1) Introduction to the Boot process
2) Stages of the Boot Process
3) Linux System Runlevels
4) Linux System Initialization Scripts (/etc/init.d)
5) Red Hat Linux's tksysv Tool
6) The chkconfig Command
7) Shutting Down the System

CHAPTER 4: SYSTEM SECURITY
1) Important System Files.../etc/passwd
2) Important System Files.../etc/shadow
3) Important System Files.../etc/group
4) The superuser (root) Account
5) The su Command
6) How to Use the su Command
7) The id Command
8) The who Command
9) File and Directory Permissions
10) Types of Permissions
11) Changing Permissions
12) The Octal Mode
13) Special File Permissions...suid and sgid
14) Special File Permissions...sticky bit
15) Administrating Ownership

CHAPTER 5: ADDING USERS
1) Manually Creating a User Account
2) The chsh Command
3) Additional Commands
4) Adding a User with a configuration tool
5) Deleting a User with Linuxconf

CHAPTER 6: SOFTWARE PACKAGE ADMINISTRATION
1) The Red Hat Package Manager
2) Standard Commands and options
3) Installing Packages
4) Naming Conventions for RPM packages
5) Installing a Package
6) Upgrading Packages
7) Uninstalling packages
8) Querying Packages
9) Verifying Packages
10) Installing Packages with gnorpm
11) Installing Packages with KDE's Package Manager

CHAPTER 7: LINUX SYSTEM PROCESSES
1) Linux Process Components
2) Linux Process Creation
3) The ps (Process Status) command
4) The top (Top Jobs) Command
5) The kill command
6) The at command
7) How to execute the at command
8) Scheduling Tasks using cron
9) The crontab File Format
10) Creating a cron Entry

CHAPTER 8: KERNEL CONFIGURATION
1) Overview of the Linux Kernel
2) Configuration Options
3) Building the Kernel
4) Installing the Kernel
5) Configuring your Boot Manager
6) Troubleshooting the New Kernel
7) Troubleshooting and Recovery

CHAPTER 9: DISK MANAGEMENT
1) Disk Drive Geometry
2) Introduction to Partitions
3) Devices and Drivers
4) Linux Standard Naming Conventions
5) Partitioning a Disk
6) Using fdisk
7) The mke2fs Command
8) The e2fsck Command
9) Introduction to Mounting filesystems
10) Mount Options
11) Mounting a filesystem

CHAPTER 10: BACKUP AND RESTORE
1) Backup Devices and Media
2) Backup Strategies
3) Example of a Backup Strategy
4) The dump command
5) The restore Command
6) The tar command
7) The cpio command
8) The taper script

CHAPTER 11: PRINTING
1) Overview of Linux Printing
2) The Printing Subsystem
3) Printer Configuration
4) The print Command

CHAPTER 12: NETWORK BASICS
1) Terminology
2) Transmission media
3) Access methods
4) Hardware
5) Standards & Protocols
6) Packets
7) ISO/OSI model
8) TCP/IP model

CHAPTER 13: LINUX NETWORK APPS
1) The Extended Internet Services Daemon
2) ftp - file transfer
3) telnet - remote login
4) A Simple telnet Session
5) The r* commands
6) Trusted hosts
7) Sendmail
8) Filesystems
9) NFS - The network file system
10) /etc/exports
11) NIS - Network information service

CHAPTER 14: THE NETWORK FILE SYSTEM
1) Introduction to NFS
2) The NFS Server
3) TCP Wrappers
4) The NFS Client
5) Configuring the NFS Environment

CHAPTER 15: NAMING SERVICES
1) Naming Services Overview
2) The Domain Name Service
3) Installing a DNS Server
4) Configuring a DNS Server Using bind-config
5) The NIS+ Environment
6) The NIS Environment
7) NIS Servers and Clients
8) NIS Components
9) Installing the Software
10) Configuring an NIS Master Server
11) Configuring an NIS Client
12) Configuring and NIS Slave Server
13) Name Service Switch Configuration file

CHAPTER 16: INSTALLATION OF REDHAT LINUX
1) Optimization of Usage
2) Server Installation
3) The Installation Process
4) Installation Diskette(s)
5) Part 1: Getting Started
6) Part 2: System Identification
7) Part 3: Install Menus
8) Part 4: The Install

 

       

Send mail to WebMaster@WebCTMSolutions.com with questions or comments about this web site.
Copyright 2004 Web Consulting, Training & Mentoring Solutions
Last modified: April 06, 2009