Linux for Unix Administrators,
Kurs LINU

Ziel

Dieser 5-Tages-Kurs ist ein umfassendes Linux Seminar für erfahrende Unix | Solaris Systemadministratoren. Dies ist ein äussert intensiver Kurs für Unix Administratoren, die Ihr Wissen in die "Linux-Welt" adaptieren wollen. Der Inhalt dieses Kurses ist eine Kombination aus den Kursen Linux Fundamentals (LINA), Linux System Administration (LINS) und Linux Networing Services. Die Kursunterlagen (2 Bücher) sind von hoher Qualität und für Red Hat Enterprise Linux / CentOS, SuSE Linux Enterprise und Ubuntu geschrieben.

Die Zielgruppe für diesen Kurs sind Unix | Solaris Systemadministratoren mit fundierten Kenntnissen.

Nach diesem Kurs sind Sie in der Lage Ihr Unix Administrationswissen auf Linux-Administration umzusetzen.

Unterstützte Distributionen:

  • Red Hat Enterprise Linux
  • CentOS
  • SUSE Linux Enterprise
  • Ubuntu

Diese Schulung gehört zu folgendem Bildungsweg:

Weitere Bildungswege entnehmen Sie bitte im Register "Weiterführende Kurse".

Voraussetzungen

  • Erfahrung als Unix System-Administrator und Unix Network Administrator, TCP/IP-Konfiguration

Kurs-Inhalte

  • Pre-Installation Considerations
    1. Pre-Installation Considerations
    2. Hardware Compatibility
    3. Multi-OS Booting
    4. Partition Considerations and Planning
    5. Filesystem Considerations
    6. Journaled Filesystems
  • Installing RHEL/FC, neueste Version
    1. Installation Choices
    2. Starting Installations from CD/DVD or USB
    3. Installing From a Network Server
    4. Installing From a Local Hard Drive
    5. Install Program Interface
    6. Installation Diagnostics
    7. Language Selection
    8. Keyboard Configuration
    9. Automatic Partitioning
    10. Partitioning with Disk Druid
    11. Installing a Boot Loader
    12. Network Configuration
    13. Time Zone Configuration
    14. root Password Configuration
    15. Package Group Selection
    16. Installing Packages
    17. Install Finished
    18. Firstboot
    19. Firstboot Firewall Configuration
    20. Firstboot SELinux Configuration
    21. Firstboot Kernel Crash Dump Configuration
    22. Firstboot Date and Time Configuration
    23. Firstboot Authentication Configuration
  • Installing SLES/SL, neueste Version
    1. Installation Choices
    2. CD-ROM/DVD Installation
    3. Network Installation
    4. SLP for SUSE Installation
    5. Local Hard Drive Installation
    6. The linuxrc Program
    7. Install Program Interface
    8. Installation Diagnostics
    9. Language Selection
    10. Installation Mode
    11. Clock and Time Zone
    12. Desktop Selection
    13. The YaST Installer Design
    14. Keyboard Configuration
    15. Disk Partitioning
    16. Software Package Selection
    17. Boot Loader Configuration
    18. Confirmation and File Installation
    19. Hostname and Domain Name
    20. Setting the Root Password
    21. Network Configuration
    22. SLES Services Configuration
    23. Adding a User Account
    24. Release Notes
    25. Final Installation Hub
    26. Installation Complete and AutoYaST "Cloning"
  • PC Hardware & Linux
    1. Detecting New Hardware Manually
    2. Configuring New Hardware with Kudzu
    3. Configuring New Hardware with hwinfo
    4. PC System Hardware
    5. USB Devices and Configuration
    6. Linux Device Files
    7. Configuring New Hardware
    8. Kernel Modules
    9. Handling Module Dependencies
    10. Configuring the Kernel via /proc/
    11. Kernel Hardware Info - /sys/
    12. /sys/ Structure
  • Post-Install System Configuration
    1. System Configuration Files
    2. Configuration Utilities
    3. SUSE Configuration Utilities
    4. Managing System Time
    5. Managing Network-Wide Time
    6. Continual Time Sync with NTP
    7. Configuring NTP Clients
    8. Managing Software
    9. RPM Features, Architecture, and Package Files
    10. Working With RPMs
    11. Querying and Verifying with RPM
    12. Updating the Kernel RPM
    13. Intro to Package Management
    14. Using the YUM command
    15. Uising the RUG command
    16. Configuring YUM
    17. RUG Services and Catalogs
    18. YUM Repositories
    19. Popular Yum Repositories
    20. Common UNIX Printing System
    21. Defining a Printer
    22. Kickstart
    23. AutoYaST
    24. Creating and Using Kickstart Files
    25. Creating and Using Auto YaST2 Files
    26. Using Kickstart files
    27. Using AutoYaST2 files
    28. linuxrc Automation
  • Boot Process and SYSV Init
    1. Booting Linux on PCs
    2. GRUB Configuration
    3. Kernel Boot Parameters
    4. /sbin/init
    5. System Init Styles
    6. Linux Runlevels
    7. /etc/inittab
    8. /etc/rc.sysinit
    9. SUSE /etc/init.d/boot
    10. /etc/init.d/ and rc#.d/
    11. rc
    12. Typical SysV Init Script
    13. The /etc/rc.local File
    14. The /etc/init.d/*.local Files
    15. Managing Daemons
    16. Controlling Service Startup
    17. Shutdown and Reboot
    18. Run Level Rosetta Tables
  • User/Group Administration & NFS
    1. User Private Group Scheme
    2. User Administration
    3. Modifying Accounts
    4. Group Administration
    5. Password Aging
    6. Default User Files
    7. Controlling Logins
    8. PAM, PAM Services, and PAM Control Statements
    9. su and Wheel
    10. sudo
    11. Manual DS Client Configuration
    12. RHEL/FC Graphical DS Client Configuration
    13. SLES/SL Graphical DS Client Configuration
    14. File Sharing via NFS
    15. NFSv4
    16. NFS Server Configuration and Clients
    17. Implementing NFSv4
    18. Automounting Filesystems
    19. Post Configuration Comparison Matrix
  • Filesystem Administration
    1. Partition Tables
    2. File System Creation
    3. Mounting File Systems
    4. Filesystem Maintenance
    5. Persistent Block Devices
    6. udev
    7. Resizing Filesystems
    8. File Deletion and Undeletion
    9. Swap
    10. Disk Usage
    11. Configuring Disk Quotas
    12. Setting Quotas
    13. Viewing and Monitoring Quotas
    14. Filesystem Attributes
    15. File Access Control Lists
    16. Manipulating, Viewing, and Backing Up FACLs
    17. Backup Hardware
    18. Tape Libraries
    19. Backup Software and Examples
    20. Filesystem Creation and Management
  • LVM & RAID
    1. Logical Volume Management
    2. Implementing LVM
    3. Creating Logical Volumes
    4. Manipulating VGs & LVs
    5. Advanced LVM Concepts
    6. RHEL/FC Graphical LVM Admin Tool
    7. SLES/SL Graphical LVM Tool
    8. RAID Concepts
    9. The mdadm Command
    10. mdadm RAID Implementation
    11. RAID Monitoring/Control
    12. Managing Partitions, LVM and RAID Devices
  • Task Automation & Process Accounting
    1. The crontab Command
    2. crontab Format
    3. /etc/cron.*/ Directories
    4. anacron
    5. Viewing and Managing Processes
    6. Tuning Process Scheduling
    7. System Logging
    8. /etc/syslog.conf
    9. syslog-ng
    10. Log Management
    11. Log Anomaly Detector
    12. Process Accounting
    13. Enabling Process Accounting
    14. Setting Resource Limits via ulimit
    15. Resource Limits with pam_limits.so Module
    16. System Status - Memory, I/O, and CPU
    17. sar
    18. Process Tools
  • Client Networking
    1. Linux Network Interfaces
    2. Ethernet Hardware Tools
    3. Runtime configuration change
    4. Configuring Routing Tables
    5. Advanced Configuration
    6. Starting and Stopping Interfaces
    7. Virtual Interfaces
    8. Enabling IPv6
    9. Interface Bonding
    10. IP Stack Configuration
    11. DNS Clients
    12. DHCP Clients
    13. Configuration Tools
    14. YaST Configuration Tool
    15. Network Diagnostics and Configuration Tools
  • The X Window System
    1. The X Window System
    2. X.Org Drivers
    3. Configuring X Manually
    4. system-config-display
    5. sax2 and yast x11
    6. Xorg and Fonts
    7. The X Font Server
    8. Installing Fonts for Modern Applications and Legacy Applications
    9. Display Managers and Graphical Login
    10. X Access Control
    11. Remote X Access (historical/insecure and modern/secure approach)
    12. XDMCP
    13. Alternative Remote Graphical Protocols
    14. Specialized X Servers
    15. Enabling the Graphical User Interface
  • Security Concepts
    1. Tightening Default Security
    2. SuSE Security Checker
    3. Staying Current
    4. Using YOU
    5. Security Advisories
    6. SELinux Security Framework
    7. Choosing an SELinux Policy
    8. SELinux Commands and Booleans
    9. Graphical SELinux Policy Tools
    10. Xinetd and Xinetd Features
    11. TCP Wrappers
    12. The /etc/hosts.allow & /etc/hosts.deny Files
    13. /etc/hosts.{allow,deny} Shortcuts
    14. Advanced TCP Wrappers
    15. Basic Firewall Activation
    16. Netfilter: Stateful Packet Filter Firewall
    17. Netfilter Concepts
    18. Using the iptables Command
    19. Netfilter Rule Syntax
    20. Targets
    21. Common match_specs
    22. Stateless Firewall Example
    23. Connection Tracking
    24. Stateful Firewall Example
    25. (X)INETD and Firewalls
  • Linux Kernel Compilation
    1. Why Compile?
    2. Getting Kernel Source
    3. Preparing to Compile
    4. Configuring the Kernel
    5. Kernel Compile Options and Documentation
    6. Distribution Specific Kernel Extensions
    7. Compiling the Kernel
    8. Compile and Install Modules
    9. Installing the Kernel
    10. Tips and Tricks
    11. Kernel Information
  • DNS Concepts
    1. Naming Services
    2. DNS - A Better Way
    3. The Domain Name Space
    4. Delegation and Zones
    5. Server Roles
    6. Resolving Names and IP Addresses
    7. BIND Administration
    8. rndc Key Configuration
    9. Configuring the Resolver
    10. Testing Resolution
  • Configuring BIND
    1. BIND Configuration Files
    2. named.conf Syntax and Options Block
    3. Creating a Site-Wide Cache
    4. Zones In named.conf
    5. Zone Database File Syntax
    6. SOA - Start of Authority
    7. A & PTR - Address & Pointer Records
    8. NS - Name Server
    9. CNAME & MX - Alias & Mail Host
    10. Abbreviations and Gotchas
    11. $ORIGIN and $GENERATE
  • OpenLDAP Servers
    1. OpenLDAP Components
    2. Configuring slapd
    3. /etc/openldap/ldap.conf Global Parameters
    4. Schema Definition
    5. OpenLDAP Access Control
    6. Backend Types and Configuration
    7. Database Configuration
    8. Indexes
    9. Replicas
    10. LDAP Replica Configuration
    11. OpenLDAP Configuration Syntax Check
  • Using OpenLDAP
    1. Managing slapd
    2. Online and Offline LDAP Data Manipulation
    3. Native LDAP Authentication and Client Config
  • Using Apache
    1. HTTP Operation
    2. Apache History and Status
    3. Apache Architecture
    4. SSL/HTTPS and Apache
    5. Apache Configuration Files
    6. httpd.conf
    7. Dynamic Shared Objects
    8. Adding Modules to Apache
    9. Apache Logging
    10. Log Analysis
  • Virtual Hosting with Apache
    1. HTTP Virtual Servers
    2. DNS Implications
    3. Security Implications
    4. IP-based Virtual Host
    5. Name-based Virtual Host
    6. Port-based Virtual Host
  • Apache Security
    1. Delegating Administration
    2. Directory Protection
    3. Common Uses for .htaccess
    4. Symmetric Encryption Algorithms
    5. Asymmetric Encryption algorithms
    6. Digital Certificates
    7. SSL Using mod_ssl.so
  • Implementing an FTP Server
    1. FTP Operation
    2. Active Mode FTP
    3. Passive Mode FTP
    4. WU-FTPD
    5. vsftpd
    6. Configuring vsftpd
    7. Anonymous FTP with vsftpd
  • The Squid Proxy Server
    1. Squid Overview, File Layout, and Access Control Lists
    2. Applying Squid ACLs
    3. Tuning Squid and Configuring Cache Hierarchies
    4. Bandwidth Metering
    5. Monitoring Squid
    6. Proxy Client Configuration
  • Samba Concepts
    1. SMB Network Protocol
    2. NetBIOS and NetBEUI
    3. NetBIOS Naming
    4. Introducing Samba
    5. Samba Daemons, Clients, and Utilities
    6. Samba Configuration Files
    7. The smb.conf File
  • Using Samba
    1. Unis and DOS Permissions
    2. Unix and Windows Concepts
    3. Name and Case Mangling
    4. Sharing Home Directories
    5. Sharing Printers
    6. Restricting Access
    7. Share-Level Access
    8. User-Level Access
    9. Mapping Users
    10. SMB and Passwords
    11. The smbpasswd Database
    12. User Share Restrictions
  • Sendmail
    1. Sendmail Features, Process, Architecture, Components, and Configuration
    2. Configuration Files
    3. Databases
    4. Text Files
    5. Network Access
    6. Masquerading Sendmail
    7. Controlling Access
    8. Configuring SMTP AUTH
    9. Configuring SMTP START TLS
  • Postfix
    1. Postfix Features, Architecture, Components, and Configuration
    2. master.cf
    3. main.cf
    4. Postfix Map Types
    5. Postfix Pattern Matching
    6. Advanced Options
    7. Virtual Domains
    8. Mail Filtering
    9. Configuration and Management Commands
    10. Postfix Logging
    11. Log file Analysis
    12. chroot'ing Postfix
    13. Postfix and SMTP AUTH
    14. SMTP AUTH Server and Clients
    15. Postfix Extensions
    16. Postfix / TLS
    17. TLS Server Configuration
    18. Postfix Client Configuration
    19. Other TLS Clients
    20. Ensuring TLS Security
  • IMAP, POP, Spam Filtering & Web Mail
    1. Filtering Email
    2. procmail
    3. SpamAssassin
    4. Sendmail Mail Filter (milter)
    5. amavisd-new Mail Filtering
    6. Accessing Email
    7. The POP3 Protocol
    8. The IMAP4 Protocol
    9. Dovecot POP3/IMAP Server
    10. Cyrus IMAP/POP3 Server
    11. Cyrus IMAP MTA Integration
    12. Cyrus Mailbox Administration
    13. Fetchmail
    14. SquirrelMail
  • Troubleshooting
    1. Basic Troubleshooting
    2. Gathering Information
    3. Information from df, mount, and Log Files
    4. Information Regarding Network Settings
    5. Information from ps, chkconfig, dmesg, w, and netstat
    6. Useful Debugging Aids
    7. Common Problems
    8. Incorrect File Permissions
    9. Inability to Boot
    10. Corrupt Filesystems
    11. Typos in Configuration Files
    12. Disks Full?
    13. Runaway Processes
    14. Shared Libraries
    15. Rescue Environment
    16. SUSE Rescue Environment
    17. System Tools

Prüfungen

  • keine Prüfungs-Informationen vorhanden

Weiterführende Kurse


Jeden der unten aufgelisteten Termine in der Schweiz können Sie auch als LiveStream (Online) Training besuchen! LiveStream Training - ONLINE an jeder Schulung von überall teilnehmen! Mit dieser Lernmethodik können Sie von überall aus an unseren Trainings live teilnehmen, als wenn Sie bei uns vor Ort in der Schulung anwesend wären.
Wählen Sie dazu aus untenstehender Liste das gewünschte Datum aus und wählen Sie bitte die Option LiveStream Training.
Kosten pro Person: CHF 4’090.00

Ort Preis Datum
Alle Preise zzgl. MwSt.

Kunden, die dieses Training angesehen haben, haben auch folgende Kurse | Lehrgänge aufgerufen:

     

Kunden, die dieses Training besucht haben, haben auch folgende Kurse | Lehrgänge gebucht:

     
© 2018 - 2024 Microwin AG