0% found this document useful (0 votes)
9 views

Linux TOC

The document provides a comprehensive overview of Linux, covering various topics such as Linux distributions, command line usage, file management, user administration, and process management. It also delves into advanced subjects like SELinux security, network configuration, and container technology, along with practical lab sessions for hands-on experience. Additionally, it addresses system logging, scheduling tasks, and managing network security, making it a valuable resource for Linux system administration.

Uploaded by

Vijay Shukla
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Linux TOC

The document provides a comprehensive overview of Linux, covering various topics such as Linux distributions, command line usage, file management, user administration, and process management. It also delves into advanced subjects like SELinux security, network configuration, and container technology, along with practical lab sessions for hands-on experience. Additionally, it addresses system logging, scheduling tasks, and managing network security, making it a valuable resource for Linux system administration.

Uploaded by

Vijay Shukla
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

 Overview of Linux Distributions

 Connect from putty

Accessing the Command Line

 Overview about Bash Shell


 The GNOME Desktop Environment

Manage Files From the Command Line

 File System Structure in Linux


 Identifying Linux File types
 Absolute and relative paths
 Command Line File Management
 Soft Link And Hard Link In Linux
 Pattern Matching
 Manage Files From the Command Line in Red Hat Linux

Getting Help, Creating and Editing Text Files in Linux

 Reading Manual Pages


 GNU Info
 Input Output Redirection in Linux
 Pipelines in Linux
 tee command
 Editing files with VIM
 Bash Variable
 Environmental Variable
 System Variable

User Administration

 Overview of User Administration


 Types of User Account
 Practice Lab Session
 Overview of Shadow file
 Syntax of sudoers file
 password aging policy

Controlling Access to Files

 Overview of Permissions in Linux


 Attributes of a file
 Special Permissions - SetUID
 Command to apply SetUID
 Special Permissions - SetGID
 Special Permissions - Sticky Bit

Managing Linux Processes

 Overview of Load Average in Linux


 top command
 Lab Session on Load Average
 Process Management
 Foreground & Background process
 Process stat codes
 Managing Linux Processes in Red Hat Linux

About Red Hat Enterprise Linux

 Overview of RHEL8
 Introduction to Systemd
 journal

Configuring And Securing SSH

 About OpenSSH
 SSH Hot Keys
 SSH Key Based Authentication
 Configuring and Securing SSH

Analyzing & Storing Logs

 System Logging
 Logging events to the system
 Collecting Information using journalctl
 Log file rotation
 Analyzing and Storing Logs in Red Hat Linux

Archiving & transferring files

 Archive a file using tar command


 tar operations
 tar compression options
 Archiving and Transferring Files

Managing Networking

 TCP/IP Network Model


 Configuring network

Accessing Linux File Systems

 Identifying File Systems


 Block Devices
 Lab Session on File System, mount, unmount etc
 locate command
 find command

Managing Remote Server

 Monitoring system using web console

Scheduling Future Tasks


 Overview of Scheduling Tasks
 Scheduling a Deferred User Job
 Controlling Nice Values with Queue Designations
 Scheduling Recurring User Jobs
 Scheduling a job for a specific time - 1
 Scheduling Recurring System Jobs
 Scheduling tasks with Systemd Timer
 Practice Lab Session - Systemd Timer
 Managing Temporary Files
 Cleaning Temporary Files with a Systemd Timer
 Configure systemd-tmpfiles to remove unused temporary files from /tmp
 Configure systemd-tmpfiles to periodically purge files from another directory
Adjusting Tuning Profiles
 Overview about tuning profiles
 Managing profiles from the command line
 Tune a server’s performance by activating the tuned service and apply a tuning
profile to powersave.
 Process Scheduling & Multitasking
 Displaying Nice Levels from the Command Line
 Changing the Nice Level of an Existing Process
 Influencing Process Scheduling
Controlling Access to files with ACLs
 Access Control List Concepts
 Set ACLs on files
 Default ACLs
 Viewing and Interpreting ACL Permissions
 set acl on files
 set acl on directories
 Mask to limit the set of permissions
 default acl
 Guided Exercise on ACL
Managing SELinux Security
 SELinux Security Concepts
 SELinux Context
 SELinux Modes
 Apache service without SELinux Protection (DAC)
 Apache service with SELinux Protection (MAC)
 Practical approach to understand SELinux
 Change context temporary
 Change context permanently
 SELinux inheritance and its pitfalls
 SELinux Booleans
 Lab - SELinux Booleans
 Audit logs & Troubleshooting SELinux
Adding Partitions, File Systems, and Persistent mounts
 Partitioning a Disk
 Benefits of disk partitioning
 MBR Partitioning Scheme
 Primary & Extended Partitions
 GPT Partitioning Scheme
 How to identify what partitioning standard is used
 Managing Partitions with Parted
 Creating a file system
 Swap Space Concepts
 Create a Swap Partitions
 Setting the Swap Space Priority
Creating Logical Volumes
 The LVM Logical Volume Manager
 Features of LVM
 LVM Architecture Overview
 Architectural Overview via Diagram
 LVM Components - PV, VG, LV
 Creation of PV, VG, LV
 Create File System, Mount Point
 Remove a Logical Volume
 Extending and Reducing a Volume Group
 Extending a LV and xfs & ext4 FS
 Extend a swap space
Controlling the Boot Process
 Booting Process of a RHEL 8 System
 Selecting a systemd target, rebooting & shutting
 Determine the default target and change the target into running system.
 Selecting a rescue mode at boot time
 Resetting a root password
 Repairing Systemd Boot Issues
 Booting RHEL 8 into Rescue Mode
 Booting RHEL 8 into Emergency Mode
 Enabling the Early Debug Shell
 Repair a File System Issues at boot
Managing Network Security
 Firewall Concepts
 Features and advantages of firewalld
 Pre-defined Zones
 Packet flow via firewalld
 Add, remove services from firewall server - Lab Session
 Add http service to allow access the website - Lab Session
 Port Forwarding - allow access a website running on 12345 port
 masquerading, network address translation
 rich rules
Automating Installation with Kickstart
 Overview Kickstart Server
 Architectural Overview
 Configure dhcp server
 Configure tftp, pxe boot server
 Configure httpd, kick start configuration file
 Configure http repository, start services
 Boot the Client from Network
Network File System
 Overview of NFS
 nfsconf tool
 Accessing Network-Attached Storage
 NFS Share
 Mounting NFS Shares with Automounter
 Automounter Benefits
 Automounter using indirect map
 Direct maps
Introducing Containers
 Introducing Container Technology
 Planning for containers
Improving Command-line Productivity
 Writing Simple Bash Scripts
 Writing Simple Bash Scripts
 Simple Commands in Linux
 Variable, single and double quote, backslash
 Redirection output
 basic knowledge of Cluster and its Architecture
 Basic cluster installation and configuration
 Managing Cluster nodes
 add remove nodes from cluster
Quorum
 Quorum Overview
 Last_Man_Standing
 Auto_tie_breaker
 Last_Man_Standing and Auto_Tie_Breaker Together
 Wait_For_All
 Two_Node
Constraints group and property set
 Constraints group and property set theory
 Constraints group and property set practice
Fencing
 Fencing Theory
 Fencing Configuration
iSCSI target and initiator
 iSCSI target and initiator theory
 iSCSI target and initiator installation and configuration
Multipath
 multi-path theory
 multipath practical
Cluster Resources
 Cluster Resource theory
 Creating and managing resources
 nfs configuration steps in cluster
 nfs installation and configuration
Active Passive environment or ext3, ext4, xfs filesystem environment
 Active Passive environment or ext3, ext4, xfs filesystem environment theory
 creating LVM with attached systemid
 Active Passive nfs installation and configuration
 Active passive Apache configuration steps
 active passive apache installation and configuration

You might also like