Linux Network Administrator Training Courses Institute In Pune
Slideshow Image 1 Slideshow Image 2 Slideshow Image 3

QUICK CONTACT

Linux Network Admin

This course covers all the topics of "Linux Networking & Security Administration".

Audience: Those who has undergone the Training for Linux System Admin and want to achieve expertise in Linux Network and Security Administration.

Prerequisite: User-level experience with any computer system, including: use of mouse, use of menus and use of any graphical user interface. Should have undergone the training or have the knowledge of Linux System Admin.

Key Benefits: On completion of this course, the candidate can appear for the RHCE Exam, a realistic performance-based lab exam that tests his/her actual ability to: install and configure Linux; understand limitations of hardware; configure networking and file systems; configure the X Window System; configure security, set up common network (IP) services, carry out diagnostics and troubleshooting, and perform essential Linux system administration.

Duration of the course : 1) Part Time : 2 Month (2 Hrs/Day)

2) Full Time : 10 Days (8 Hrs/Day)

Course Contents:


  • Overview
  • Running Commands and Getting Help
  • Browsing the Filesystem
  • The bash Shell
  • Standard I/O and Pipes
  • UNIX History & Principles
  • Running Simple Commands
  • Linux File Hierarchy Concepts
  • Bash Introduction
  • Standard Input and Output
  • Local Logins & Virtual Consoles
  • Getting Help
  • Absolute and Relative Pathnames
  • Bash Heritage and Features
  • Overwriting vs Appending
  • The Xorg GUI Framework
  • The what is, help & man command
  • Copying Files and Directories
  • Command Line Shortcuts
  • Redirecting Both Standard Output and Error
  • Creating Moving and Renaming Files and Directories
  • Command Line Expansion
  • Using Pipes To Connect Processes
  • gnome-terminal
  • Users, Groups, and Permissions
  • vi and vim Editor Basics
  • The Linux File system In-Depth
  • Configuring the Bash Shell & Configuring the Bash Shell Variables
  • Advanced Topics in Users, Groups and Permissions
  • Users, Groups & The root user
  • Overview of vi and vim
  • Partitions and File systems
  • Configuring the Bash Shell Variables
  • /etc/passwd, /etc/shadow, and /etc/group files
  • Examining Permissions.
  • Three Modes of vi and vim
  • Inodes and Directories
  • Common Local Variables
  • System Users and Groups
  • Linux Process Security
  • Cursor Movement
  • Symbolic (or Soft) Links
  • Startup Scripts: Order of Execution
  • Default & Special Permissions
  • Hard Links
  • The Seven Fundamental File types
  • Advanced vi / vim and Printing
  • String Processing
  • Finding and Processing Files
  • Investigating and Managing Processes
  • Bash Shell Scripting
  • File Repositioning, Filtering
  • Head, tail, wc (word count), sort, uniq etc
  • Slocate, find
  • How Processes Are Created
  • Scripting Basics
  • Advanced Reading and Saving
  • Other String Processing Tools
  • Executing Commands with find
  • Viewing & Sending Signals to Processes
  • Creating Shell Scripts
  • Using multiple "windows"
  • Pattern Matching with Regular Expressions
  • Interactive Process Management Tools
  • Conditional Execution
  • Wildcard Characters
  • Scheduling a Process To Execute Later
  • for loops & while loops
  • Network Clients
  • System Initialization and Services
  • Kernel Services and Configuration
  • Filesystem Management
  • Network Configuration
  • Web Clients
  • Boot Sequence Overview
  • Kernel Module Configuration
  • Disk Partitioning & Managing Partitions
  • Network Interfaces
  • Firefox & Other GUI Web Browsers
  • BIOS Initialization
  • The /proc filesystem
  • Managing Data: Filesystem Creation
  • mii-tool, ifconfig, ifup/ifdown
  • Email and Messaging
  • Boot Loader Components
  • /proc/sys configuration with sysctl
  • Mount Options and Configuration
  • Interface Configuration Files
  • Ssh, scp, telnet and the "r" services
  • GRUB and grub.conf
  • Hotswappable Bus Support
  • DHCP/BOOTP
  • Rsync, lftp, gFTP & smbclient
  • Kernel Initialization
  • System Monitoring and Process Control
  • Default Route, Static Routes
  • Mounting Floppy, CDs and USB Media
  • init Initialization
  • Name Resolution, DNS Configuration
  • Run levels
  • RPM and Kickstart
  • Printing and Administration Tools
  • The X Window System
  • Advanced Filesystem Management
  • Troubleshooting
  • RPM Package Manager
  • CUPS: Common Unix Printing System
  • XOrg Server Configuration
  • Software RAID Configuration & Recovery
  • Troubleshooting Networking
  • Installing and Removing Software
  • Controlling Access to cron
  • Server and Client Relationship
  • Converting LVM1 to LVM2
  • Order of the Boot Process
  • Updating a Kernel RPM
  • System crontab Files
  • Configuration Utilities
  • The Linux Quota System
  • Filesystem Corruption & Recovery
  • Using Kickstart to Automate Installation
  • syslog Configuration
  • Remote X Sessions
  • Using cpio
  • Remote Backups
  • Introduction to Network Services
  • Organizing Networked Systems
  • Network File Sharing Services
  • Electronic Mail Services
  • The HTTP Service
  • Red Hat Linux Network Components
  • DNS Basics
  • Configuring NFS, FTP & Samba Services
  • sendmail Features
  • Apache Features
  • Connecting Networks
  • Name Server Hierarchy
  • Configuring File and Directory Sharing
  • Security and "Anti-Spam" Features
  • Apache Configuration
  • Service Management
  • Client & Server-side DNS
  • Printing to the Samba Server
  • Sendmail Configuration
  • Apache Namespace Configuration
  • Chkconfig, xinetd Daemon
  • Configuring BIND
  • Authentication Methods
  • Postfix
  • Apache Encrypted Web Server
  • BIND Utilities
  • Squid Web Proxy Cache
  • Configuring the DHCP server
  • Security Concerns and Policy
  • Authentication Services
  • Securing Networks
  • Securing Services
  • Securing Data
  • Basic Network Security
  • Authentication Basics
  • Packet Filtering Capabilities
  • SystemV Startup Control
  • The Need For Encryption
  • Which Services Are Running?
  • Service Profile: PAM
  • Netfilter Architecture
  • tcp_wrappers Configuration
  • Cryptographic Building Blocks
  • Remote Service Detection
  • User Access Control
  • Network Address Translation(NAT)
  • xinetd-based security
  • One-Way Hashes
  • Security Policy
  • Single User Mode
  • Connection Tracking
  • Digital Certificates
  • Symmetric & Asymmetric Encryption
  • Authentication Troubleshooting
  • Rule persistence
  • Public Key Infrastructures
  • Configuring an NIS Server
  • The "Bastion Host"
  • OpenSSH Authentication
  • Applications: RPM
  • System Monitoring
  • User Administration
  • Installation
  • Introduction to System Monitoring
  • User Policy Considerations
  • Hardware Overview
  • File System Analysis
  • The User Account Database - /etc/passwd
  • CPU and Memory
  • Set User and Group ID Permissions
  • Group Administration
  • Preparing to Install
  • EXT2 Filesystem Attributes
  • Login Shell Scripts
  • Multiboot systems
  • Monitoring Data Integrity with tripwire
  • Authentication Configuration
  • The RHEL Installer
  • System Log Files
  • NIS & LDAP Client Configuration
  • Installer Features
  • Advanced syslogd configuration
  • The Setgid Access Mode
  • RHEL Installation Overview
  • Monitoring and Limiting Processes
  • Access Control Lists (ACLs)
  • Partitioning Hard Drives
  • System Activity Reporting
  • Sample Partition Structure
  • Configuring File Systems
  • Software RAID
  • LVM: Logical Volume Manager
  • Network Configuration
  • Firewall Setup
  • Security Enhanced Linux
  • SELinux Installation Options and Control
  • Package Selection
  • Validating the Installation
  • Noprobe Mode and Driver Disks
  • Post-Install Configuration
  • Hands-on Lab: Installation