 
                                      
							          
							          
                                      
							            Chapter 1 : Introduction to Red Hat Enterprise Linux
                                      	Topic : Linux, Open Source and  Red Hat, Origins of Linux, Distributions, Duties of Linux System Administrator.
							            Content : Linux, Open Source and  Red Hat, Linux Distributions, Duties of Linux System Administrator.							            
								        54 MB ,28:45 MIN , THEORY								        
							          
 
                                      
							          
							          
                                      
							            Chapter 2 : Command Line
                                      	Topic : Working with the Bash Shell, Getting the Best of Bash, Useful Bash Key Sequences, Working with Bash History, Performing Basic File System Management Tasks, Working with Directories, Piping and Redirection, Finding Files,Working with an Editor
							            Content : Working with the Bash Shell, Getting the Best of
Bash, Useful Bash Key Sequences, Working with Bash History,
Performing Basic File System Management Tasks, Working with
Directories, Piping and Redirection, Finding Files, Working with an Editor							            
								        99 MB ,50:22 MIN , THEORY								        
							          
 
                                      
							          
							          
                                      
							            Chapter 3 : System Administration Tasks
                                      	Topic : System Administration Tasks
							            Content : Performing Job Management Tasks,
System and Process Monitoring and Management, Managing Processes
with ps, Sending Signals to Processes with the kill Command, Using
top to Show Current System Activity, Managing Process Niceness,
Scheduling Jobs, Mounting Devices, Working with Links, Creating
Backups, Managing Printers, Setting Up System Logging, Setting Up
Rsyslog, Common Log Files, Setting Up Logrotate
							            
								        161 MB ,1:17:0 MIN , THEORY + PRACTICAL								        
							          
 
                                      
							          
							          
                                      
							            Chapter 4 : Managing Software
                                      	Topic : Understanding RPM, Understanding Meta Package Handlers, Creating Your Own Repositories, Managing Repositories, Installing Software with Yum, Querying Software, Extracting Files from RPM Packages 
							            Content : Understanding RPM, Understanding Meta
Package Handlers, Creating Your Own Repositories, Managing
Repositories, Installing Software with Yum, Querying Software,
Extracting Files from RPM Packages 							            
								        55 MB ,27:57 MIN , THEORY + PRACTICAL								        
							          
 
                                      
							          
							          
                                      
							            Chapter 1 : Configuring and Managing Storage
                                      	Topic : Understanding Partitions and Logical Volumes, Creating Partitions, Creating File Systems, File Systems Overview, Creating File Systems, Changing File System Properties, Checking the File System Integrity
							            Content : Understanding Partitions and Logical Volumes, Creating Partitions, Creating File Systems, File Systems Overview, Creating File Systems, Changing File System
Properties, Checking the File System Integrity							            
								        49 MB ,25:43 MIN , THEORY								        
							          
 
                                      
							          
							          
                                      
							            Chapter 2 : Connecting to the network
                                      	Topic : Connecting to the network
							            Content : Understanding NetworkManager,
Working with Services and Runlevels, Configuring the Network with
NetworkManager, Working with system-config-network,
NetworkManager Configuration Files, Network Service Scripts, 
Networking from the Command Line, Troubleshooting Networking							            
								        63 MB ,32:51 MIN , THEORY + PRACTICAL								        
							          
 
                                      
							          
							          
                                      
							            Chapter 2 : Connecting to the network
                                      	Topic : Setting Up IPv6, Configuring SSH, Enabling the SSH Server, Using the SSH Client, Using PuTTY on Windows Machines, Configuring Key-Based SSH Authentication, Using Graphical Applications with SSH, Using SSH Port Forwarding, Configuring VNC Server Access   
							            Content : Setting Up IPv6, Configuring SSH, Enabling the SSH Server, Using the
SSH Client, Using PuTTY on Windows Machines, Configuring Key-Based
SSH Authentication, Using Graphical Applications with SSH,
Using SSH Port Forwarding, Configuring VNC Server Access 
 							            
								        66 MB ,36:39 MIN , THEORY								        
							          
 
                                      
							          
							          
                                      
							            Chapter 3 : Working with Users, Groups, and Permissions
                                      	Topic : Managing Users and Groups, Commands for User Management, Managing Passwords, Modifying and Deleting User Accounts, Configuration Files, Creating Groups, Using Graphical Tools for User, and Group Management
							            Content : Managing Users and Groups, Commands for User Management, Managing Passwords,Modifying and Deleting User Accounts, Configuration Files, Creating
Groups, Using Graphical Tools for User and Group Management							            
								        62 MB ,35:27 MIN , THEORY								        
							          
 
                                      
							          
							          
                                      
							            Chapter 3 : Working with Users, Groups, and Permissions
                                      	Topic : Using External Authentication Sources, The Authentication Process, sssd, nsswitch, Pluggable Authentication Modules
							            Content : Using External Authentication Sources, The Authentication Process,
sssd, nsswitch, Pluggable Authentication Modules
							            
								        63 MB ,33:34 MIN , THEORY								        
							          
 
                                      
							          
							          
                                      
							            Chapter 3 : Working with Users, Groups, and Permissions
                                      	Topic : Managing Permissions, The Role of Ownership, Basic Permissions: Read, Write, and Execute, Advanced Permissions, Working with Access Control Lists, Setting Default Permissions with umask, Working with Attributes 
							            Content : Managing Permissions, The Role of Ownership, Basic Permissions: Read, Write,
and Execute, Advanced Permissions, Working with Access Control Lists, Setting Default Permissions with umask, Working with Attributes 							            
								        74 MB ,47:19 MIN , THEORY								        
							          
 
                                      
							          
							          
                                      
							            Chapter 1 : Securing Server with iptables
                                      	Topic : Understanding Firewalls, Setting Up a Firewall with system-config-firewall, Allowing Services, Trusted Interfaces, Masquerading, Configuration Files, Setting Up a Firewall with iptables, Tables, Chains, and Rules, Composition of Rule, Configuration Example, Advanced iptables Configuration, Configuring Logging, The Limit Module, Configuring NAT
							            Content : Understanding Firewalls, Setting Up a Firewall with system-config-firewall, Allowing Services, Trusted Interfaces, Masquerading, Configuration Files, Setting Up a Firewall with iptables, Tables, Chains, and Rules, Composition of Rule,
Configuration Example, Advanced iptables Configuration, Configuring
Logging, The Limit Module, Configuring NAT
							            
								        162 MB ,1:20:43 MIN , THEORY								        
							          
 
                                      
							          
							          
                                      
							            Chapter 2 : Setting Up Cryptographic Services
                                      	Topic : Introducing SSL, Proof of Authenticity: the Certificate Authority, Managing Certificates with openssl, Creating a Signing Request, Working with GNU Privacy Guard, Creating GPG Keys, Key Transfer, Managing GPG Keys, Encrypting Files with GPG, GPG Signing, Signing RPM Files
							            Content : Introducing SSL, Proof of Authenticity: the Certificate Authority, Managing Certificates with openssl, Creating a Signing Request, Working with GNU Privacy
Guard, Creating GPG Keys, Key Transfer, Managing GPG Keys,
Encrypting Files with GPG, GPG Signing, Signing RPM Files							            
								        107 MB ,58:6 MIN , THEORY + PRACTICAL								        
							          
 
                                      
							          
							          
                                      
							            Chapter 3 : Configuring Server for File Sharing
                                      	Topic : What is NFS? Advantages and Disadvantages of NFS, Configuring NFS4, Setting Up NFSv4,Mounting an NFS Share, Making NFS Mounts Persistent, Configuring Automount.
							            Content : What is NFS? Advantages and Disadvantages of NFS, Configuring NFS4, Setting Up NFSv4,Mounting an NFS Share, Making NFS Mounts Persistent, Configuring
Automount.							            
								        49 MB ,26:39 MIN , THEORY + PRACTICAL								        
							          
 
                                      
							          
							          
                                      
							            Chapter 3 : Configuring Server for File Sharing
                                      	Topic : Configuring Samba, Setting Up a Samba File Server,Samba Advanced Authentication Options, Accessing Samba Shares,Offering FTP Services.
							            Content : Configuring Samba, Setting Up a Samba File Server,Samba Advanced Authentication Options, Accessing Samba Shares,Offering FTP Services.							            
								        92 MB ,45:43 MIN , THEORY + PRACTICAL								        
							          
 
                                      
							          
							          
                                      
							            Chapter 1 : Configuring DNS and DHCP
                                      	Topic : Introduction to DNS, The DNS Hierarchy, DNS Server Types, The DNS Lookup Process, DNS Zone Types, Setting Up a DNS Server, Setting Up a Cache-Only Name Server, Setting Up a Primary Name Server, Setting Up a Secondary Name Server, Understanding DHCP, Setting Up a DHCP Server
							            Content : Introduction to DNS, The DNS Hierarchy, DNS Server Types, The DNS Lookup Process, DNS Zone Types, Setting Up a DNS Server, Setting Up a Cache-Only Name
Server, Setting Up a Primary Name Server, Setting Up a Secondary Name Server, Understanding DHCP, Setting Up a DHCP Server							            
								        155 MB ,1:22:53 MIN , THEORY + PRACTICAL								        
							          
 
                                      
							          
							          
                                      
							            Chapter 2 : Setting Up a Mail Server:
                                      	Topic : Using the Message Transfer Agent, the Mail Delivery Agent, the Mail User Agent, Setting Up Postfix as an SMTP Server, Working with Mutt, Basic Configuration, Internet  
							            Content : Using the Message Transfer Agent, the Mail Delivery Agent, the Mail User Agent, Setting Up Postfix as an SMTP Server, Working with Mutt, Basic Configuration, Internet  
Configuration, Configuring Dovecot for POP and IMAP							            
								        117 MB ,1:0:48 MIN , THEORY + PRACTICAL								        
							          
 
                                      
							          
							          
                                      
							            Chapter 1 : Introducing Bash Shell Scripting
                                      	Topic :  Introduction, Elements of a Good Shell Script, Executing the Script, Working with Variables and Input,Understanding Variables, Variables, Subshells, and Sourcing, Working with Script Arguments, Asking for Input, Using Command Substitution, Substitution Operators, Changing Variable Content with Pattern Matching, Performing Calculations, Using Control Structures, Using if...then...else, Using case, Using while, Using until, Using for.
							            Content :  Introduction, Elements of a Good Shell Script, Executing the Script, Working with Variables and Input,Understanding Variables, Variables, Subshells, and Sourcing, Working with Script Arguments, Asking for Input, Using Command Substitution, Substitution Operators, Changing Variable Content with Pattern Matching, Performing Calculations, Using Control Structures,
Using if...then...else, Using case, Using while, Using until, Using for.							            
								        125 MB ,1:9:41 MIN , THEORY + PRACTICAL								        
							          
 
                                      
							          
							          
                                      
							            Chapter 1 : Introducing Bash Shell Scripting
                                      	Topic : Configuring Booting with GRUB
							            Content : grub.conf, Changing Boot Options, Using the GRUB Command Line, Reinstalling GRUB
							            
								        38 MB ,20:28 MIN , THEORY + PRACTICAL								        
							          
 
                                      
							          
							          
                                      
							            Chapter 2 : High-Availability Clustering
                                      	Topic : High-Availability Clustering, The Workings of High Availability, High-Availability Requirements, Red Hat High-Availability Add-on Software, Components, Configuring Cluster-Based Services, Setting Up Bonding, Setting Up Shared Storage, Installing the Red Hat High Availability Add-On, Building the Initial State of the Cluster, Configuring Additional Cluster Properties, Configuring a Quorum Disk, Setting Up Fencing, Creating Resources and Services, Troubleshooting a Nonoperational Cluster, Configuring GFS2 File Systems.
							            Content : High-Availability Clustering, The Workings of High Availability, High-Availability Requirements, Red Hat High-Availability Add-on Software, Components, Configuring Cluster-Based Services, Setting Up Bonding, Setting Up Shared Storage, Installing the Red Hat High Availability Add-On, Building the
Initial State of the Cluster, Configuring Additional Cluster Properties,
Configuring a Quorum Disk, Setting Up Fencing, Creating Resources and Services, Troubleshooting a Nonoperational Cluster, Configuring GFS2 File Systems.							            
								        87 MB ,44:4 MIN , THEORY								        
							          
 
                                      
							          
							          
                                      
							            Chapter 3 : Setting Up an Installation Server
                                      	Topic : Configuring a Network Server as an Installation Server, Setting Up a TFTP and DHCP Server for PXE Boot, Installing the TFTP Server, Configuring DHCP for PXE Boot, Creating the TFTP PXE Server Content, Creating a Kickstart File, Using a Kickstart File to Perform an Automated, Installation, Modifying the Kickstart File with, system-config-kickstart, Making Manual Modifications to the Kickstart File 
							            Content : Configuring a Network Server as an Installation Server, Setting Up a TFTP and DHCP Server for PXE Boot, Installing the TFTP Server, Configuring DHCP for PXE Boot, Creating the TFTP PXE Server Content, Creating a Kickstart File,
Using a Kickstart File to Perform an Automated, Installation, Modifying the Kickstart File with, system-config-kickstart, Making Manual Modifications to the Kickstart File 							            
								        46 MB ,24:24 MIN , THEORY