Linux System Administration

As a result of attending this course, you should be able to perform essential Linux administration tasks, including installation, establishing network connectivity, managing physical storage, and basic security administration.

Content Summary

  • Access systems
  • Navigate file systems
  • Manage local users and groups
  • Control access to files
  • Manage SELinux security
  • Tune system performance
  • Manage basic storage
  • Control services and the boot process
  • Manage Linux Networking
  • Implement advanced storage features
  • Schedule future tasks
  • Access network-attached storage
  • Manage network security

Kurikulum Kursus

  • Modul 1

    INTRODUCTION

    • ORIENTATION TO THE CLASSROOM ENVIRONMENT
    • WHY SHOULD YOU LEARN ABOUT LINUX?
    • WHAT MAKES LINUX GREAT?
    • WHAT IS OPEN SOURCE SOFTWARE?
    • WHO IS RED HAT?
    • TYPES OF OPEN SOURCE LICENSES
    • WHO DEVELOPS OPEN SOURCE SOFTWARE?
    • WHAT IS A LINUX DISTRIBUTION?
    • SUMMARY
  • Modul 2

    ACCESSING SYSTEMS

    • INTRODUCTION TO THE BASH SHELL
    • SHELL BASICS
    • LOGGING IN OVER THE NETWORK
    • SSH KEY-BASED AUTHENTICATION
    • GUIDED EXERCISE : CONFIGURING SSH KEY-BASED AUTHENTICATION
  • Modul 3

    NAVIGATING FILE SYSTEMS

    • DESCRIBING LINUX FILE SYSTEM HIERARCHY CONCEPTS
    • MANAGING FILES USING COMMAND-LINE TOOLS
    • GUIDED EXERCISE: MANAGING FILES USING COMMAND- LINE TOOLS
    • MAKING LINKS BETWEEN FILES
    • GUIDED EXERCISE : MAKING LINKS BETWEEN FILES
    • SUMMARY
  • Modul 4

    MANAGING LOCAL USERS AND GROUPS

    • DESCRIBING USER AND GROUP CONCEPTS
    • GAINING SUPERUSER ACCESS
    • GUIDED EXERCISE : GAINING SUPERUSER ACCESS
    • MANAGING LOCAL USER ACCOUNTS
    • GUIDED EXERCISE : MANAGING LOCAL USER ACCOUNTS
    • MANAGING LOCAL GROUP ACCOUNTS
    • GUIDED EXERCISE : MANAGING LOCAL GROUP ACCOUNTS
    • MANAGING USER PASSWORDS
    • GUIDED EXERCISE : MANAGING USER PASSWORDS
    • SUMMARY
  • Modul 5

    CONTROLLING ACCESS TO FILES

    • INTERPRETING LINUX FILE SYSTEM PERMISSIONS
    • MANAGING FILE SYSTEM PERMISSIONS FROM THE COMMAND LINE
    • GUIDED EXERCISE : MANAGING FILE SYSTEM PERMISSIONS FROM THE COMMAND LINE
    • MANAGING DEFAULT PERMISSIONS AND FILE ACCESS
    • GUIDED EXERCISE : MANAGING DEFAULT PERMISSIONS AND FILE ACCESS
    • SUMMARY
  • Modul 6

    MANAGING SELINUX SECURITY

    • CHANGING THE SELINUX ENFORCEMENT MODE
    • GUIDED EXERCISE : CHANGING THE SELINUX ENFORCEMENT MODE
    • CONTROLLING SELINUX FILE CONTEXTS
    • GUIDED EXERCISE : CONTROLLING SELINUX FILE CONTEXTS
    • ADJUSTING SELINUX POLICY WITH BOOLEANS
    • GUIDED EXERCISE: ADJUSTING SELINUX POLICY WITH BOOLEANS
    • INVESTIGATING AND RESOLVING SELINUX ISSUES
    • GUIDED EXERCISE : INVESTIGATING AND RESOLVING SELINUX ISSUES
    • SUMMARY
  • Modul 7

    TUNING SYSTEM PERFORMANCE

    • KILLING PROCESSES
    • GUIDED EXERCISE : KILLING PROCESSES
    • MONITORING PROCESS ACTIVITY
    • GUIDED EXERCISE : MONITORING PROCESS ACTIVITY
    • TUNING SYSTEMS
    • INSTALLING AND ENABLING TUNED
    • GUIDED EXERCISE : ADJUSTING TUNING PROFILES
    • INFLUENCING PROCESS SCHEDULING
    • GUIDED EXERCISE : INFLUENCING PROCESS SCHEDULING
    • SUMMARY
  • Modul 8

    INSTALLING AND UPDATING SOFTWARE PACKAGES

    • REGISTERING SYSTEMS FOR RED HAT SUPPORT
    • INSTALLING AND UPDATING SOFTWARE PACKAGES WITH YUM
    • ENABLING YUM SOFTWARE REPOSITORIES
    • MANAGING PACKAGE MODULE STREAMS
    • GUIDED EXERCISE: INSTALLING AND UPDATING SOFTWARE PACKAGES WITH YUM
    • GUIDED EXERCISE: MANAGING PACKAGE MODULE STREAMS
    • SUMMARY
  • Modul 9

    MANAGING BASIC STORAGE

    • MOUNTING AND UNMOUNTING FILE SYSTEMS
    • GUIDED EXERCISE : MOUNTING AND UNMOUNTING FILE SYSTEMS
    • ADDING PARTITIONS, FILE SYSTEMS, AND PERSISTENT MOUNTS
    • GUIDED EXERCISE : ADDING PARTITIONS, FILE SYSTEMS, AND PERSISTENT MOUNTS
    • MANAGING SWAP SPACE
    • GUIDED EXERCISE : MANAGING SWAP SPACE
    • SUMMARY
  • Modul 10

    MANAGING NETWORKING

    • DESCRIBING NETWORKING CONCETPS
    • VALIDATING NETWORK CONFIGURATION
    • GUIDED EXERCISE: VALIDATING NETWORK CONFIGURATION
    • CONFIGURING NETWORKING FROM THE COMMAND LINE
    • GUIDED EXERCISE: CONFIGURING NETWORKING FROM THE COMMAND LINE
    • EDITING NETWORK CONFIGURATION FILES
    • GUIDED EXERCISE: EDITING NETWORK CONFIGURATION FILES
    • CONFIGURING HOST NAMES AND NAME RESOLUTION
    • GUIDED EXERCISE: CONFIGURING HOST NAMES AND NAME RESOLUTION
  • Modul 11

    ANALYZING AND STORING LOGS

    • DESCRIBING SYSTEM LOG ARCHITECTURE
    • REVIEWING SYSLOG FILES
    • GUIDED EXERCISE : REVIEWING SYSLOG FILES
    • REVIEWING SYSTEM JOURNAL ENTRIES
    • GUIDED EXERCISE : REVIEWING SYSTEM JOURNAL ENTRIES
    • PRESERVING THE SYSTEM JOURNAL
    • GUIDED EXERCISE : PRESERVING THE SYSTEM JOURNAL
    • MAINTAINING ACCURATE TIME
    • SUMMARY
  • Modul 12

    IMPLEMENTING ADVANCED STORAGE FEATURES

    • CREATING LOGICAL VOLUMES
    • GUIDED EXERCISE : CREATING LOGICAL VOLUMES
    • EXTENDING LOGICAL VOLUMES
    • GUIDED EXERCISE : EXTENDING LOGICAL VOLUMES
    • MANAGING LAYERED STORAGE WITH STRATIS
    • COMPRESSING AND DEDUPLICATING STORAGE WITH VDO
    • SUMMARY
  • Modul 13

    SCHEDULING FUTURE TASKS

    • SCHEDULING RECURRING SYSTEM JOBS
    • GUIDED EXERCISE : SCHEDULING RECURRING SYSTEM JOBS
    • MANAGING TEMPORARY FILES
    • GUIDED EXERCISE : MANAGING TEMPORARY FILES
    • SUMMARY
  • Modul 14

    ACCESSING NETWORK- ATTACHED STORAGE

    • MOUNTING NETWORK-ATTACHED STORAGE WITH NFS
    • AUTOMOUNTING NETWORK-ATTACHED STORAGE
    • SUMMARY
  • Modul 15

    MANAGING NETWORK SECURITY

    • MANAGING SERVER FIREWALLS
    • SUMMARY
  • Modul 16

    COMPREHENSIVE REVIEW

    • COMPREHENSIVE REVIEW
75%
Batas Nilai Lulus

Level Pemula
-

Kategori

linux redhat sysadmin fundamental rh124