Course Content
Installation and Initialization
- Introduction
- Installation
- Linux Architecture
- Boot Process
- Kernel
- System Initialization
- CLI
- GRUB
- GUI
- Create and edit text files
- Delete, copy, and move files and directories
- Introduction to Bash Shell
- Basic Commands
- Editors
- Man Pages
- Boot systems into different targets manually & automatically
Package management and Process monitoring
- Secure single-user mode
- Shut down and reboot the system
- RPM Package Manager
- Installing and Removing Software
- rpm Queries
- rpm Verification
- About yum
- Using yum
- Searching packages/files
- Configuring local Repositories
- What processes are?
- The properties of a process
- Parent processes and child processes
- Killing processes and sending signals to a process (kill, killall, xkill)
- How to start processes
- Monitor them
- Identify CPU
- Adjust process priority
- Start/stop
- Check network services status
- Configure networking and hostname resolution dynamically or statically
Important Files, Directories and Utilities
- Control services and Daemons
- Start and stop services
- Configure services to start automatically at boot /dev /proc directories
- System documentation under /usr/share/doc, Awk, Sed
- Analyze text using grep, Regular expressions
- Use tar, star, gzip, and bzip2 to archive, compress, unpack, and uncompress files
- Locate and interpret log files
System Services
- Network Time Protocol
- X Windows
- SSH: Secure Shell (Access remote systems using ssh, SCP, Passwordless SSH, Configure key-based authentication for SSH)
- Cron
- Controlling Access to cron
- System crontab Files
- Daily Cron Jobs
- Anacron Scheduler
- Schedule tasks
User Administration
- Adding a New User Account
- User Private Groups
- Modifying / Deleting User Accounts
- Group Administration
- Password Aging Policies
- Switching Accounts
- sudo access
- Network Users
- Authentication Configuration
- SUID and SGID Executable
- SGID Directories
- The Sticky Bit
- Default File Permissions
- Changing file ownership (chown)
- Changing file group ownership (chgrp)
- Permissions on files
- Permissions on directories
- How permissions are applied
- Changing permissions (chmod)
- Access Control Lists (ACLs)
File System Security and Management
- Device Recognition
- Disk Partitioning
- Managing Partitions
- Making Filesystems (vfat, ext4, and xfs)
- Mount and unmount NFS and CIFS network file systems
- Filesystems and types
- Labels
- tune2fs
- Mount Points and /etc/fstab
- Mounting Filesystems with mount
- Unmounting Filesystems
- Handling Swap Files and Partitions
- NFS Client and NFS server
- NFS share for group collaboration
- Mounting NFS Filesystems
- Control access to NFS network shares using Kerberos
- Automounter
Advanced file system management
- Special file types
- Symbolic links (ln -s)
- Inodes and directory entries
- Hard links
- Preserving links while copying and archiving
- Configuring the Quota System
- Setting Quotas for Users
- Reporting Quota Status
- Define Logical Volume Manager
- Creating Logical Volumes
- Resizing Logical Volumes
- Network Interfaces
- IPv4 Addresses
- Dynamic IPv4 Configuration
- Static IPv4 Configuration
- Device Aliases
- Routing Table
- Default Gateway
- Verify IP Connectivity
- Defining the Local Host Name
- Local Resolver
- Remote Resolvers
- Verify DNS Connectivity
- Network Tools
- NFS Client and NFS server
- NFS share for group collaboration
Server configurations
- Function as a caching-only DNS server by configuring BIND
- Forward DNS queries by configuring a caching-only name server
- Troubleshoot DNS client issues
- Configuring BIND options
- Configuring directory location for zone files
- Apache Overview
- Apache Server Configuration
- Virtual Hosts
- Apache Access Configuration
- Set up a basic CGI application
- Configure TLS security
- Configure private directories
- Analyze and store logs
Shell scripting and Kerberos Authentication
- Shell Scripting basics
- Loops
- Shell variables
- Arrays
- Writing scripts
- Kerberos authentication
Samba and Mail services, Virtualization
- Configure SMB to provide network share to clients
- Forward all emails to Central mail server by configuring mail server
- Introduction to KVM Virtualization
- Virtual Machine installation
- Configuring Virtual Machines
- Install centos systems as virtual guests
- Configure systems to launch virtual machines at boot
Advanced security and Networking concepts
- SELinux Overview
- SELinux Tools
- SELinux Contexts
- SELinux Booleans
- Allow services to use non-standard ports using SELinux port labeling
- Diagnose and report SELinux policy violations
- Configure firewall settings
- N/W port security
- Route IP traffic and create static routes
- Boot level security (GRUB)
- Security need for TCP wrappers
- Configure aggregated links between two systems
- Use firewall and associated mechanisms such as custom rules, rich rules and zones
- Configure network address translation
- Modify and set kernel runtime parameters using Use /proc/sys and sysctl
- Linux Containers
Database configuration
- Install MariaDB
- Schema Creation and Writing Queries
- Backup & restore operations
- Configure a system as either an iSCSI target or initiator
IPv6 configuration, Kickstart configuration
- Ipv6 configuration
- Kickstart installation using NFS, HTTP services
- Setting Grub Password
- Setting root password for single user mode from Grub page
- Universally Unique ID (UUID) or label to configure systems to mount file systems at boot
- List, create, and delete partitions on MBR and GPT disks