Friday, June 25, 2010

Red Hat Certified Engineer

Red Hat Certified Technician (RHCT) and Red Hat Certified Engineer (RHCE) are performance-based tests that measure actual competency on live systems. RHCT is the first step in establishing Linux credentials and is an ideal certification for those transitioning from non-UNIX/Linux environments. RHCE, called the "crown jewel of Linux certifications," proves an individual's ability to configure networking services and security on servers running a Red Hat OS. RHCE was recently named the hottest certification in all of IT by CertCities.com.

RH033 - Red Hat Linux Essentials

Duration: ( 32 Hrs.)

Course Summary

An introduction to fundamental end-user and administrative tools in Red Hat Enterprise Linux, designed for students with little or no command-line Linux or UNIX experience.

Goal:

A power user or junior administrator who can effectively install, use and perform basic configuration of a Red Hat Enterprise Linux system.

Audience:

IT professionals who want to build user-level skills before learning Linux System and Network Administration.

Prerequisites:

User-level experience with any computer system, including: use of mouse, use of menus and use of any graphical user interface.

Course Outline

Linux Usage Basics
- Starting X from the Console
- Changing your Password
- The root User
- Elevating your Privileges
Running Commands and Getting Help
- Reading Usage Summaries
- man, info, & whatis Commands
Browsing the Filesystem
- Linux File Hierachy Concepts
- Current Working Directory Files & Directory Name
- Absolute and Relative Pathnames
- Create, remove, change, list, copy, move Files & Directories
- Using Nautilus
- Determining File Content, Viewing Files
Using the bash Shell
- bash Introductin History & Features
- Command Line Shortcuts & Editing Tricks
- Command Line Expansion
- gnome-terminal
Standard I/O & Pipes
- Standard Input and Output, Pipes to connect Processes
- Overwriting vs Appending
- Redirecting both standard Output and Error
Text Processing Tools
- Tools for Extracting, Analysing & Manipulating Text
- Special Characters for Matching Text
Basic System Configuration
- Configuring Date and Time
- Configuring Printers, Network
- System Logs
vi and vim
- Opening, Modifying, Saving Files & Undoing Changes
- Using Command Mode
- Visual Mode
- Splitting the Screen
- Configuring vi and vim
Configuring the bash Shell
- bash Variables, Environment Variables and Aliases
- Configuring and Information Variables
- Variables Expansion, Protecting against Variable Expansion
- Types of Shells, bash startup & Exit Scripts
- using Variables in Shell Scripts
Finding and Processing Files
- The slocate & find Commands, Basic find Examples
- find and Logical Operators, find & Permissions
- find and Numeric Criteria, find & Access Times
- Executing Commands with find and Gnome Search Tool
Network Applications
- Firefox, Evolution, E-mail clients and Web Browsers
- E-mail, Encryption, & Digital Signatures
- The Gaim Messaging System
- Encrypted Communications with ssh and scp
- telnet and the "r" services, FTP Clients
- Connecting to Windows Disk Shares
- File Transfer with Nautilus
- Network Diagnostic Tools
Managing Users, Groups & Permissions
- The Linux Security Model
- Users & Groups, Permission Types
- Examining & Changing Permissions
- Changing Permissions using Nautilus
Advanced Topics in Users, Groups & Permissions
- System Users and Groups
- The etc/passwd, /etc/shadow, and /etc/group files
- Changing your identity
- User Information Commands
- Default Permissions, Special Permission
The Linux Filesystem in-depth
- Partitions, Filesystem and checking free space
- cp, mv, rm, & inodes
- Symbolic Links and Hard Links
- The Seven Fundamental Filetypes
- Mounting CDs, DVDs, USB Media & Floppy Disks
- Creating, Inspecting & Extracting Files from File Archives
- Compressing Utilities, Compressing Archives
Investigating and Managing Processes
- Process States, Viewing Processes and Nice Values
- Sending Signals to Processes, Terminating
- Foreground & Background Process
- at, crontab Listing & Scheduling Jobs
Essential System Administration Tools
- Installation
- Managing Services, Managing Packages
- Securing the System






RH133 - Red Hat Linux System Administration

Duration: ( 32 Hrs.)

Course Summary

For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and configure a workstation on an existing network. See complete details below.

Goal:

An operator who can perform system administration tasks to a level where he/she can install, configure, and attach a new Red Hat Linux workstation to an existing network.

Audience:

Linux or UNIX users, who understand the basics of Red Hat Linux, that desire further technical training to begin the process of becoming a system administrator.


Prerequisites:

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux.



Course Outline

System Initialization
- Boot Sequence
- Boot Loader Components
- GRUB and grub.conf
- Kernel Initialization
- init Initialization
- Run levels; /etc/rc.d/rc.sysinit, /etc/rc.d/rc
- System V run levels; - /Etc/rc.d/rc.local
- Controlling Services
Package Management
- RPM Package Manager
- Installing and Removing Software
- Updating a Kernel RPM; rpm Queries, rpm Verification
- About yum; using yum
- Searching packages/files
- Configuring Additional Repositories
- Creating a private repository
- Red Hat Network Server; Entitlements
- Red Hat Network Client
Kernel Services
- Kernel Modules, Kernel Images & Variants
- Managing the initrd image
- Accessing Drivers through /dev
- Kernel Configuration with /proc
- sysctl: Persistent Kernel Configuration
- Monitoring Processes and Resources
System Services
- Network Time Protocol; syslog Configuration
- Xorg Server Configuration; Remote X Sessions
- Virtual Network Computing; SSH: Secure Shell
- System crontab Files; Daily Cron Jobs; CUPS
User Administration
- Adding a New User Account; User Private Groups
- Group Administration; Modifying/Deleting Accounts
- Password Aging Policies
- Switching Accounts, sudo
- Network Users
- Authentication Configuration; NIS Client Configuration
- LDAP Client Configuration; File Ownership
- Linux File Permissions; SUID / SGID Executables
- The Sticky Bit; The SGID Directories
- Default File Permissions; Access Control Lists (ACLs)
- SELinux, SELinux Targeted Policy, Management
Filesystem Management
- Device Recognition; Disk Partitioning
- Managing Partitions; Making Filesystem
- Filesystem Labels; tune2fs
- Mount Points and /etc/fstab; Mounting Filesystems
- Handling Swap Files and Partitions
- Mounting NFS Filesystems; Automounter
Advanced Filesystem Management
- Configuring the Quota System
- Software RAID Configuration & Recovery
- Creating & Resizing Logical Volumes
- Archiving tools: tar; dump/restore; rsync
Network Configuration
- Network Interfaces; IPv4 Addresses; Device Aliases
- Routing table; Default gateway; Verify IP connectivity
- Defining Local Host Name; Verify DNS Connectivity
- Network Configuration Utilities
- Transparent Dynamic Configuration
- Ipv6: Dynamic & Static Interface Configuration
- New and Modified Utilities
Installation
- Boot Media, Accessing Installer, Installation Method
- Configuring File System; Advanced Partitioning
- Starting Kickstart Installation
- Kickstart; %pre, %post
Virtualization with Xen
- Hardware Considerations; Preparing Domain-0
- Virtual Resources; Domain-U Configuration
- Domain Management with xm
- Activating Domains on boot
Troubleshooting
- Method of Fault Analysis; Gathering Data
- Order of the Boot Process
- Filesystem Corruption & Recovery
- Recovery Run-levels; Rescue Environment





RH253 - Red Hat Linux Networking & Security Administration

Duration: (32 Hrs.)

Course Summary

For Linux- and/or UNIX- systems administrators who want to build skills at configuring common network services and security administration using Red Hat Enterprise Linux..

Goal:

To become a system administrator who can setup a Red Hat Enterprise Linux server and configure common network services and security at a basic level.

Audience:

Linux or UNIX system administrators who already have some real world experience with Red Hat Enterprise Linux systems administration and want a first course in networking services and security.

Prerequisites:

RH133 Red Hat Linux System Administration or equivalent experience with Red Hat Enterprise Linux. To assist you in determining whether you have equivalent experience, take the RH133 Pre-assessment Questionnaire.
LAN/WAN fundamentals or equivalent; Internetworking with TCP/IP or equivalent.


Course Outline

System Performance and Security
- Security Policy; Response Strategies
- Fault Analysis; Hypothesis and Gathering Data
- Filesystem Analysis; Typical Problematic Permissions
- Monitoring & Managing Processes; Log File Analysis
System Service Access Controls
- System Initializations and service management
- Xinetd managed service; host pattern Access control
- tcp_wrappers configuration; Daemon Specification
- Client Specification; macro definitions
- SElinux targeted policy, management & file types
Network Resource Access Controls
- IPv6: Dynamic and static interface configuration
- Netfilter tables and chains; Basic chain operation
- Match arguments; connection tracking
- Network address translation (NAT); DNAT; SNAT
- IPv6 & IPv6 tables
Organizing Networked Systems
- Host name resolution; The stub resolver
- DNS Specific resolvers; Trace DNS Query with dig
- Forward & Reverse Lookups; SOA Lookups
- Exploring DNS with host; Transitioning to the server
- Service profile: DNS; Access Control profile: Bind
- Address match list; Access control list (ACL)
- Allowing queries, recursion, transfers
- Slave Zone and Master Zone Declaration
- Remote Name Daemon Control (rndc)
- Delegating Subdomains & DHCP Overview
Network File Sharing Services
- File Transfer Protocol; Network File Service-
- Samba services; Configuring file & directory sharing
- Printing to the samba server; Authentication methods
- Samba client tool: smbclient, nmb lookup, mounts
Web Services
- Apache Overview
- Apache Configuration
- Apache Access Configuration
- Apache Encrypted Web Servers
- Squid Web Proxy Server
Electronic Mail Services
- Essential E-mail Operation
- Simple mail transport protocols
- Sendmail & Sendmail Configuration
- Postfix & postfix Configuration
- Procmail & Procmail Configuration
- Dovecot Configuration
- Pop & Imap Operation
Securing Data
- Fundamentals of Encryption Protocols
- Symmetric & Asymmetric Encryption I - II
- Generation of Digital Certificates (SSL)
- OpenSSH Server
-OpemSSH Client
Account Management
- User Accounts & Accounts Information
- Name Service Switch (NSS)
- Pluggable Authentication Modules (pam)
- PAM Operations
- Network Authentication
- Password Policy & Security
- Utilities and Authentication
- PAM Troubleshooting