Detailed Course Content:

snottysurfsideServers

Dec 9, 2013 (3 years and 9 days ago)

69 views

Red Hat Enterprise Linux 4
[RHCE]
Training
at
MTNL’s CETTM


The following are the details of the Training at MTNL’s CETTM


Name of the Course

Red Hat Certified Engineer [RHCE] Course based
on Red Hat Enterprise Linux 4

Training Venue

MTNL’s Centre for Ex
ce汬e湣e⁩渠呥汥c潭o
呥c桮潬hgy…⁍a湡来浥湴ⰨC䕔呍E

呥c桮潬hgy⁓瑲te琬

Ce湴na氠䅶l湵n,

䡩牡湡湤a湩n
䝡牤r湳ⱐ潷o椬䵵i扡椠㐰〰㜶

呲a楮i湧 䑵aa瑩潮

ㄲ⁤Ny猠s㠠桯畲猠灥爠摡y]

呩浩湧㨠
㤺〰⁈潵9猠瑯‱㠺〰⁈潵8s

F畬u⁔業e⼠Lee步湤

tee步湤⁛Sa瑵牤ty猠a湤⁓畮摡y


F畬u⁔業e⁛䵯湤My†瑯⁓a瑵牤ty]

tee歅湤⁂atc栠
S瑡t瑩湧 潮

9
th

September 2006

[SAT]

Full Time
Batch Starting on

21
st

August 2006

[Monday]

Training Course Material

Red Hat Training Kit

Certificate of Participation

From Red Hat as well as from
MTNL’s CETTM

C潵牳o⁍潤畬es

C潶o牥d⁩渠ㄲ
摡ys



Red Hat Enterprise Linux 4 Essentials



摡ys



Red Hat Enterprise Linux System
Administration
---

4 days

3.

Red Hat Network Services and Security
Administration


㐠摡ys

呲a楮i湧⁃潵牳e⁆ees

o献ㄵ〰〯
-


ia獴⁤
a瑥⁦潲⁒og楳ira瑩潮⁡湤n
灡yme湴映nees

N
8
t
h

August

2006

for Full Time Batch

8
th


September 2006 for Weekend batch


Faculty

CCNA,RHCE certified ,
IT Professionals
with
8
-
9
years IT
Teaching Experience


Contact Person

Avinash Dabhade

/ Swapna Mathur
e

Contact Tel. Nos

[Between
10:00 hrs
-
18:00 hrs]

Landline:25707047

Cell:9869168923



Detailed Course Content:


Course Module 1: Red Hat Enterprise Linux 4 Essentials

Unit 1
-

Overview



Objectives



UNIX History



UNIX Principles



GNU Project / FSF



GPL
-

GNU General Public License



Linux Origins



Why Linux?



Red Hat Enterprise Linux



Recommended Hardware Specifications



Local Logins



Virtual Consoles



The Xorg GUI Framework



The Xorg Graphical Environments



Starting Xorg



Changing Your Password

Unit 2
-

Running Com
mands and Getting Help



Objectives



Running Commands



Some Simple Commands



Getting Help



The whatis Command



The
--
help Option



Reading Usage Summaries



The man Command



Navigating man Pages



The info Command



Navigating info Pages



Extended Documentation



Red Hat Doc
umentation



Hands
-
on lab:

Getting Help with Commands

Unit 3
-

Browsing the Filesystem



Objectives



Linux File Hierarchy Concepts



Some Important Directories



Other Important Directories



Current Working Directory



File and Directory Names



Absolute Pathnames



Relat
ive Pathnames



Changing Directories



Listing Directory Contents



Copying Files and Directories



Copying Files and Directories: The Destination



Moving and Renaming Files and Directories



Moving and Renaming Files and Directories: The Destination



Creating and Rem
oving Files



Creating and Removing Directories



Using Nautilus



Moving and Copying in Nautilus



Determining File Content



Viewing an Entire Text File



Viewing Text Page by Page



Hands
-
on lab:

Browsing the Filesystem

Unit 4
-

The bash Shell



Objectives



bash Introdu
ction



bash Heritage and Features



Command Line Shortcuts



Command Line Shortcuts



Command Line Shortcuts



More History Tricks



Command Line Expansion



Command Line Expansion



Command Line Expansion



Protecting from Expansion



Protecting from Expansion



Command Editi
ng Tricks



gnome
-
terminal



Hands
-
on lab:

Exploring the Bash Shell

Unit 5
-

Standard I/O and Pipes



Objectives



Standard Input and Output



Redirecting Input and Output



Redirecting Output



Redirecting Standard Output



Overwriting vs Appending



Redirecting Standard E
rror



Redirecting Both Standard Output and Error



Redirecting Input



Using Pipes To Connect Processes



Useful Pipe Targets



tee



Hands
-
on lab:

Standard I/O and Pipes

Unit 6
-

Users, Groups, and Permissions



Objectives



The Linux Security Model



Users



Groups



The roo
t user



Linux File Security



Permission Types



Examining Permissions



Interpreting Permissions



Examining Directories



Linux Process Security



Changing Permissions
-

Symbolic Method



Changing Permissions
-

Numeric Method



Changing Permissions
-

Nautilus



Hands
-
on la
b:

File Permissions

Unit 7
-

vi and vim Editor Basics



Objectives



Overview of vi and vim



Starting vi and vim



Three Modes of vi and vim



Cursor Movement



Cursor Movement



Entering Insert Mode



Leaving Insert Mode: Esc



Change, Delete, and Yank



Put (paste)



Undoing

Changes



Searching for Text



Command
-
Mode Tricks



Saving and Exiting: ex mode



Hands
-
on lab:

vi and vim Editor Basics

Unit 8
-

The Linux Filesystem In
-
Depth



Objectives



Partitions and Filesystems



Inodes



Directories



Inodes and Directories



cp and inodes



mv and i
nodes



rm and inodes



Symbolic (or Soft) Links



Hard Links



The Seven Fundamental Filetypes



Checking Free Space



Removable Media



Mounting CDs and DVDs



Mounting USB Media



Mounting Floppy Disks



Formatting Floppy Disks



Why Archive Files?



Creating an Archive



Inspec
ting Archives



Extracting an Archive



Why Use File Compression?



Compression Utilities



Using Compression



Compressing Archives



Hands
-
on lab:

The Linux Filesystem

Unit 9
-

Configuring the Bash Shell



Objectives



Configuring the Bash ShellVariables



Common Local Va
riables



The PS1 Local Variable



Aliases



Other Shell Configuration Methods



Configuring Commands: Environment Variables



Common Environment Variables



The TERM Environment Variable



The PATH Environment variable



How bash Expands a Command Line



Shell Startup Scri
pts



Login Shells



Startup Scripts: Order of Execution



/etc/profile



/etc/profile.d



~/.bash_profile and ~/.bashrc



~/.bash_logout



Hands
-
on lab:

Configuring the Bash Shell

Unit 10
-

Advanced Topics in Users, Groups and Permissions



Objectives



User and Group ID N
umbers



/etc/passwd, /etc/shadow, and /etc/group files



System Users and Groups



Changing Your Identity



User Information Commands



Default Permissions



Special Permissions



Special Permissions for Executables



Special Permissions for Directories



Hands
-
on lab:

Swi
tching Users and Setting a Umask

Unit 11
-

Advanced vi/vim and Printing



Objectives



File Repositioning



Filtering



ex mode: Search and Replace



Visual Mode



Advanced Reading and Saving



Using multiple "windows"



Configuring vi and vim



Expanding your Vocabulary



Pr
inting in Linux



Printing Commands



Printing Utilities



Hands
-
on lab:

Advanced Uses of the vi and vim Editors

Unit 12
-

Introduction to String Processing



Objectives



head



tail



tail



wc (word count)



sort



uniq



cut



Other String Processing Tools



Version Comparison
with diff



Spell Checking with aspell



Hands
-
on lab:

Introduction to String Processing

Unit 13
-

String Processing with Regular Expressions



Objectives



Pattern Matching with Regular Expressions



Wildcard Characters



Character Classes



Modifiers



Anchors



The | Ope
rator



regex Combinations



Regular Expressions
-

Examples



Quote your regex´s!



grep



sed



Using sed



less and vi



Hands
-
on lab:

String Processing with Regular Expressions

Unit 14
-

Finding and Processing Files



Objectives



slocate



slocate Examples



find



Basic find E
xamples



find and Logical Operators



find and Permissions



find and Numeric Criteria



find and Access Times



Executing Commands with find



find Execution Examples



The Gnome Search Tool



Hands
-
on lab:

Finding and Processing Files

Unit 15
-

Investigating and Managi
ng Processes



Objectives



What is a Process?



How Processes Are Created



Process Ancestry



Process States



Viewing Processes



Sending Signals to Processes



Terminating Processes



Altering Process Scheduling Priority



Altering Process Scheduling Priority (continued)



Interactive Process Management Tools



Running a Process in the Foreground



Running a Process in the Background



Suspending a Process



Listing Background and Suspended Jobs



Resuming Suspended Jobs



Compound Commands



Scheduling a Process To Execute Later



Scheduli
ng Periodic Processes



Using cron



Crontab File Format



Hands
-
on lab:

Process Controls

Unit 16
-

bash Shell Scripting



Objectives



Scripting Basics



Creating Shell Scripts



Creating Shell Scripts



Generating Output



Handling Input



Exit Status



Conditional Execution



Conditional Execution



Conditional Execution



Conditional Execution



Conditional Execution



for loops



for loops



while loopswhile loops



Positional Parameters



Positional Parameters



Scripting at the Command Line



Shell script debugging



Hands
-
on lab:

bash Shell Scr
ipting

Unit 17
-

Network Clients



Objectives



Web Clients



Firefox



Other GUI Web Browsers



Non
-
GUI Web Browsers



wget



Email and Messaging



Evolution



Configuring Evolution



Email and Encryption



Email and Digital Signatures



Evolution and GnuPG



Other GUI Mail Client
s



Non
-
GUI Mail Clients



Gaim



ssh: Secure Shell



scp: Secure copy



telnet and the "r" services



rsync



lftp



gFTP



smbclient



File Transfer with Nautilus



Xorg Clients



Network Diagnostic Tools



Hands
-
on lab:

Network Clients

Unit 18
-

So... What Now?



Some Areas to Exp
lore



Development



Red Hat Development Classes



System Administrator Duties



RHCE/RHCT Skills Courses



RHCA Skills Courses



The Linux Community


Course Module 2: Red Hat Enterprise Linux System Administration

UNIT 1
-

Installation



Hardware Overview



CPU and Memor
y



Preparing to Install



Multiboot systems



The RHEL Installer



Installer Features



RHEL Installation Overview



Partitioning Hard Drives



Sample Partition Structure



Configuring File Systems



Software RAID



LVM: Logical Volume Manager



Network Configuration



Firewall
Setup



Security Enhanced Linux



SELinux Installation Options and Control



Package Selection



Validating the Installation



noprobe Mode and Driver Disks



Post
-
Install Configuration



Hands
-
on Lab:

Installation

UNIT 2
-

System Initialization and Services



Boot Sequen
ce Overview



BIOS Initialization



Boot Loader Components



GRUB and grub.conf



Kernel Initialization



init Initialization



Run levels



/etc/rc.d/rc.sysinit



/etc/rc.d/rc



Daemon Processes



System V run levels



/etc/rc.d/rc.local



Virtual Consoles



Controlling Services



S
ystem Shutdown



System Reboot



Hands
-
on Lab:

Managing Startup

UNIT 3
-

Kernel Services and Configuration



Objectives



Agenda



Kernel Modules



Kernel Module Configuration



The /proc filesystem



/proc/sys configuration with sysctl



General Hardware Resources



System B
us Support



Hotswappable Bus Support



System Monitoring and Process Control



Hands
-
on Lab:

Configuring kernel parameters

UNIT 4
-

Filesystem Management



System Initialization: Device Recognition



Disk Partitioning



Managing Partitions



Managing Data: Filesystem C
reation



Journaling for ext2 filesystems: ext3



Mount Options and Configuration



The Auto
-
Mounter



ext2/ext3 Filesystem Attributes



Virtual Memory Files



Filesystem Maintenance



Adding a Drive



Hands
-
on Lab:

Filesystem Management

UNIT 5
-

Network Configuration



Dev
ice Recognition



Network Interfaces



mii
-
tool



ifconfig



ifup/ifdown



Interface Configuration Files



Configuration Utilities



Binding Multiple IP Addresses



DHCP/BOOTP



Global Network Parameters



Default Route



Static Routes



Name Resolution



DNS Client Configuration



D
NS Utilities



Network Diagnostics



Hands
-
on Lab:

Static Network Settings

UNIT 6
-

RPM and Kickstart



The RPM Way



RPM Package Manager



Installing and Removing Software



Updating a Kernel RPM



RPM Queries



RPM Verification



Other RPM Utilities and Features



Automatic

Dependency



Resolution



Red Hat Network (RHN)



RHN in the Enterprise



RHN Registration



The up2date utility



Remote Administration



Network Installation Server



Using Kickstart to Automate Installation



Hands
-
on Lab:

RPM and Kickstart

UNIT 7
-

User Administration



User Policy Considerations



The User Account Database
-

/etc/passwd



Adding a New User Account



User Private Groups



Group Administration



Modifying/Deleting Accounts



Password Aging Policies



Login Shell Scripts



Non Login Shell Scripts



Switching Accounts



sudo



Ne
twork Users



Authentication Configuration



NIS Client Configuration



LDAP Client Configuration



File Ownership



Linux File Permissions



SUID / SGID Executables



The Sticky Bit



The Setgid Access Mode



Default File Permissions



Access Control Lists (ACLs)



SELinux



Co
ntrolling SELinux



SELinux Contexts



Troubleshooting SELinux



Hands
-
on Lab:

User and Group Administration

UNIT 8
-

Printing and Administration Tools



CUPS: Common Unix Printing System



Controlling Access to cron



System crontab Files



System Logging



syslog Config
uration



Tape Drives



Using tar/star



Using dump/restore



Using cpio



Remote Backups



Other Backup Software



Hands
-
on Lab:

Printing and Admin Tools

UNIT 9
-

The X Window System



XOrg: The X11 Server



XOrg Server Design



XOrg Server Configuration



XOrg Modularity



Serv
er and Client Relationship



Configuration Utilities



Remote X Sessions



Hands
-
on Lab:

The X Window System

UNIT 10
-

Advanced Filesystem Management



Software RAID Configuration



Software RAID Recovery



Converting LVM1 to LVM2



Creating Logical Volumes



Resizing Log
ical Volumes



The Linux Quota System



Hands
-
on Lab:

Logical Volumes, RAID and Quotas

UNIT 11
-

Troubleshooting



Basic Guidelines



Troubleshooting X



Troubleshooting Networking



Order of the Boot Process



Filesystem Corruption



Filesystem Recovery



Recovery Run
-
leve
ls



Rescue Environment



Hands
-
on Lab:

System Rescue and Troubleshooting

Course Module 3: Red Hat Network Services and Security
Administration

Unit 1: Introduction to Network Services



Red Hat Linux Network Components



Connecting Networks



Service Management



chk
config



xinetd Services



The xinetd Daemon



Fault Analysis



Hands
-
on lab:

Introduction to Network Services

Unit 2: Organizing Networked Systems



DNS Basics



Internet DNS Hierarchy



Name Server Hierarchy



Client
-
side DNS



Server
-
side DNS



Berkeley Internet Name Domai
n (BIND)



Configuring BIND



Configuration File Basics



Address Match Lists and acl



rndc



Zone Files



Main Record Types



Delegating Subdomains



Caching
-
only Name Server



BIND Utilities



BIND Syntax Utilities



Configuring the DHCP server



Hands
-
on lab:

Organizing Netwo
rked Systems

Unit 3: Network File Sharing Services



Configuring NFS services



Configuring FTP services



Samba Services



Samba Daemons



Configuring Samba



Configuring File and Directory Sharing



Printing to the Samba Server



Authentication Methods



Samba Client Tool
s: smbclient and smbmount



Hands
-
on lab:

Network File Sharing Services

Unit 4: Electronic Mail Services



sendmail Features



Security and "Anti
-
Spam" Features



An Email Review



Simple Operational Overview



Main Configuration Files



sendmail Configuration with the
m4 Macro Language



sendmail Client Configuration



Blacklisting Recipients



Debugging sendmail



Postfix



Using Postfix



Additional postfix Configuration Files



procmail Local Delivery



Hands
-
on lab:

Electronic Mail Services

Unit 5: The HTTP Service



Apache Features



Apache Configuration



Apache Server Configuration



Virtual Hosts



Apache Namespace Configuration



CGI



Apache Encrypted Web Server



Squid Web Proxy Cache



Hands
-
on lab:

The HTTP Service

Unit 6: Security Concerns and Policy



Security Terms



Basic Network Security



Wh
ich Services Are Running?



Remote Service Detection



Definitions of Security



Security Policy



Backup Policies



Hands
-
on lab:

Security Concerns and Policy

Unit 7: Authentication Services



Authentication Basics



Service Profile: PAM



PAM Operation



Core PAM Modules



Authentication Modules



Password Security



Password Policy



Resource Limits



User Access Control



Single User Mode



Authentication Troubleshooting



NIS Overview



NIS Server Topology



Configuring an NIS Server



NIS Client Configuration



NIS Troubleshooting



Hands
-
on la
b:

Authentication Services

Unit 8: System Monitoring



Introduction to System Monitoring



File System Analysis



Set User and Group ID Permissions



Typical Problematic Permissions



EXT2 Filesystem Attributes



Monitoring Data Integrity with tripwire



Configuring tri
pwire



System Log Files



syslogd and klogd configuration



Advanced syslogd configuration



Log File Analysis



Monitoring and Limiting Processes



Monitoring Processes with top



Monitoring Processes Graphically



System Activity Reporting



Process Accounting Tools



Hand
s
-
on lab:

System Monitoring

Unit 9: Securing Networks



Packet Filtering Capabilities



Netfilter Architecture



Netfilter Packet Flow



Chain Operations



Rule targets



Rule Matching



Network Address Translation(NAT)



Connection Tracking



Rule persistence



The "Bastion
Host"



Hands
-
on lab:

Securing Networks

Unit 10: Securing Services



SystemV Startup Control



Securing the Service



tcp_wrappers Configuration



Daemon Specification



Client Specification



Advanced Syntax



xinetd
-
based security



xinetd Access Control



Host Patterns



Adv
anced Security Options



Hands
-
on lab:

Securing Services

Unit 11: Securing Data



The Need For Encryption



Cryptographic Building Blocks



Random Numbers



One
-
Way Hashes



Symmetric Encryption



Asymmetric Encryption



Public Key Infrastructures



Digital Certificates



Gen
erating Digital Certificates



OpenSSH Overview



The OpenSSH



OpenSSH Authentication



Protecting Your Keys



Applications: RPM



Hands
-
on lab:

Securing Data