Chapter 1 : Introduction to Red Hat Enterprise Linux
Topic : Linux, Open Source and Red Hat, Origins of Linux, Distributions, Duties of Linux System Administrator.
Content : Linux, Open Source and Red Hat, Linux Distributions, Duties of Linux System Administrator.
54 MB ,28:45 MIN , THEORY
Chapter 2 : Command Line
Topic : Working with the Bash Shell, Getting the Best of Bash, Useful Bash Key Sequences, Working with Bash History, Performing Basic File System Management Tasks, Working with Directories, Piping and Redirection, Finding Files,Working with an Editor
Content : Working with the Bash Shell, Getting the Best of
Bash, Useful Bash Key Sequences, Working with Bash History,
Performing Basic File System Management Tasks, Working with
Directories, Piping and Redirection, Finding Files, Working with an Editor
99 MB ,50:22 MIN , THEORY
Chapter 3 : System Administration Tasks
Topic : System Administration Tasks
Content : Performing Job Management Tasks,
System and Process Monitoring and Management, Managing Processes
with ps, Sending Signals to Processes with the kill Command, Using
top to Show Current System Activity, Managing Process Niceness,
Scheduling Jobs, Mounting Devices, Working with Links, Creating
Backups, Managing Printers, Setting Up System Logging, Setting Up
Rsyslog, Common Log Files, Setting Up Logrotate
161 MB ,1:17:0 MIN , THEORY + PRACTICAL
Chapter 4 : Managing Software
Topic : Understanding RPM, Understanding Meta Package Handlers, Creating Your Own Repositories, Managing Repositories, Installing Software with Yum, Querying Software, Extracting Files from RPM Packages
Content : Understanding RPM, Understanding Meta
Package Handlers, Creating Your Own Repositories, Managing
Repositories, Installing Software with Yum, Querying Software,
Extracting Files from RPM Packages
55 MB ,27:57 MIN , THEORY + PRACTICAL
Chapter 1 : Configuring and Managing Storage
Topic : Understanding Partitions and Logical Volumes, Creating Partitions, Creating File Systems, File Systems Overview, Creating File Systems, Changing File System Properties, Checking the File System Integrity
Content : Understanding Partitions and Logical Volumes, Creating Partitions, Creating File Systems, File Systems Overview, Creating File Systems, Changing File System
Properties, Checking the File System Integrity
49 MB ,25:43 MIN , THEORY
Chapter 2 : Connecting to the network
Topic : Connecting to the network
Content : Understanding NetworkManager,
Working with Services and Runlevels, Configuring the Network with
NetworkManager, Working with system-config-network,
NetworkManager Configuration Files, Network Service Scripts,
Networking from the Command Line, Troubleshooting Networking
63 MB ,32:51 MIN , THEORY + PRACTICAL
Chapter 2 : Connecting to the network
Topic : Setting Up IPv6, Configuring SSH, Enabling the SSH Server, Using the SSH Client, Using PuTTY on Windows Machines, Configuring Key-Based SSH Authentication, Using Graphical Applications with SSH, Using SSH Port Forwarding, Configuring VNC Server Access
Content : Setting Up IPv6, Configuring SSH, Enabling the SSH Server, Using the
SSH Client, Using PuTTY on Windows Machines, Configuring Key-Based
SSH Authentication, Using Graphical Applications with SSH,
Using SSH Port Forwarding, Configuring VNC Server Access
66 MB ,36:39 MIN , THEORY
Chapter 3 : Working with Users, Groups, and Permissions
Topic : Managing Users and Groups, Commands for User Management, Managing Passwords, Modifying and Deleting User Accounts, Configuration Files, Creating Groups, Using Graphical Tools for User, and Group Management
Content : Managing Users and Groups, Commands for User Management, Managing Passwords,Modifying and Deleting User Accounts, Configuration Files, Creating
Groups, Using Graphical Tools for User and Group Management
62 MB ,35:27 MIN , THEORY
Chapter 3 : Working with Users, Groups, and Permissions
Topic : Using External Authentication Sources, The Authentication Process, sssd, nsswitch, Pluggable Authentication Modules
Content : Using External Authentication Sources, The Authentication Process,
sssd, nsswitch, Pluggable Authentication Modules
63 MB ,33:34 MIN , THEORY
Chapter 3 : Working with Users, Groups, and Permissions
Topic : Managing Permissions, The Role of Ownership, Basic Permissions: Read, Write, and Execute, Advanced Permissions, Working with Access Control Lists, Setting Default Permissions with umask, Working with Attributes
Content : Managing Permissions, The Role of Ownership, Basic Permissions: Read, Write,
and Execute, Advanced Permissions, Working with Access Control Lists, Setting Default Permissions with umask, Working with Attributes
74 MB ,47:19 MIN , THEORY
Chapter 1 : Securing Server with iptables
Topic : Understanding Firewalls, Setting Up a Firewall with system-config-firewall, Allowing Services, Trusted Interfaces, Masquerading, Configuration Files, Setting Up a Firewall with iptables, Tables, Chains, and Rules, Composition of Rule, Configuration Example, Advanced iptables Configuration, Configuring Logging, The Limit Module, Configuring NAT
Content : Understanding Firewalls, Setting Up a Firewall with system-config-firewall, Allowing Services, Trusted Interfaces, Masquerading, Configuration Files, Setting Up a Firewall with iptables, Tables, Chains, and Rules, Composition of Rule,
Configuration Example, Advanced iptables Configuration, Configuring
Logging, The Limit Module, Configuring NAT
162 MB ,1:20:43 MIN , THEORY
Chapter 2 : Setting Up Cryptographic Services
Topic : Introducing SSL, Proof of Authenticity: the Certificate Authority, Managing Certificates with openssl, Creating a Signing Request, Working with GNU Privacy Guard, Creating GPG Keys, Key Transfer, Managing GPG Keys, Encrypting Files with GPG, GPG Signing, Signing RPM Files
Content : Introducing SSL, Proof of Authenticity: the Certificate Authority, Managing Certificates with openssl, Creating a Signing Request, Working with GNU Privacy
Guard, Creating GPG Keys, Key Transfer, Managing GPG Keys,
Encrypting Files with GPG, GPG Signing, Signing RPM Files
107 MB ,58:6 MIN , THEORY + PRACTICAL
Chapter 3 : Configuring Server for File Sharing
Topic : What is NFS? Advantages and Disadvantages of NFS, Configuring NFS4, Setting Up NFSv4,Mounting an NFS Share, Making NFS Mounts Persistent, Configuring Automount.
Content : What is NFS? Advantages and Disadvantages of NFS, Configuring NFS4, Setting Up NFSv4,Mounting an NFS Share, Making NFS Mounts Persistent, Configuring
Automount.
49 MB ,26:39 MIN , THEORY + PRACTICAL
Chapter 3 : Configuring Server for File Sharing
Topic : Configuring Samba, Setting Up a Samba File Server,Samba Advanced Authentication Options, Accessing Samba Shares,Offering FTP Services.
Content : Configuring Samba, Setting Up a Samba File Server,Samba Advanced Authentication Options, Accessing Samba Shares,Offering FTP Services.
92 MB ,45:43 MIN , THEORY + PRACTICAL
Chapter 1 : Configuring DNS and DHCP
Topic : Introduction to DNS, The DNS Hierarchy, DNS Server Types, The DNS Lookup Process, DNS Zone Types, Setting Up a DNS Server, Setting Up a Cache-Only Name Server, Setting Up a Primary Name Server, Setting Up a Secondary Name Server, Understanding DHCP, Setting Up a DHCP Server
Content : Introduction to DNS, The DNS Hierarchy, DNS Server Types, The DNS Lookup Process, DNS Zone Types, Setting Up a DNS Server, Setting Up a Cache-Only Name
Server, Setting Up a Primary Name Server, Setting Up a Secondary Name Server, Understanding DHCP, Setting Up a DHCP Server
155 MB ,1:22:53 MIN , THEORY + PRACTICAL
Chapter 2 : Setting Up a Mail Server:
Topic : Using the Message Transfer Agent, the Mail Delivery Agent, the Mail User Agent, Setting Up Postfix as an SMTP Server, Working with Mutt, Basic Configuration, Internet
Content : Using the Message Transfer Agent, the Mail Delivery Agent, the Mail User Agent, Setting Up Postfix as an SMTP Server, Working with Mutt, Basic Configuration, Internet
Configuration, Configuring Dovecot for POP and IMAP
117 MB ,1:0:48 MIN , THEORY + PRACTICAL
Chapter 1 : Introducing Bash Shell Scripting
Topic : Introduction, Elements of a Good Shell Script, Executing the Script, Working with Variables and Input,Understanding Variables, Variables, Subshells, and Sourcing, Working with Script Arguments, Asking for Input, Using Command Substitution, Substitution Operators, Changing Variable Content with Pattern Matching, Performing Calculations, Using Control Structures, Using if...then...else, Using case, Using while, Using until, Using for.
Content : Introduction, Elements of a Good Shell Script, Executing the Script, Working with Variables and Input,Understanding Variables, Variables, Subshells, and Sourcing, Working with Script Arguments, Asking for Input, Using Command Substitution, Substitution Operators, Changing Variable Content with Pattern Matching, Performing Calculations, Using Control Structures,
Using if...then...else, Using case, Using while, Using until, Using for.
125 MB ,1:9:41 MIN , THEORY + PRACTICAL
Chapter 1 : Introducing Bash Shell Scripting
Topic : Configuring Booting with GRUB
Content : grub.conf, Changing Boot Options, Using the GRUB Command Line, Reinstalling GRUB
38 MB ,20:28 MIN , THEORY + PRACTICAL
Chapter 2 : High-Availability Clustering
Topic : High-Availability Clustering, The Workings of High Availability, High-Availability Requirements, Red Hat High-Availability Add-on Software, Components, Configuring Cluster-Based Services, Setting Up Bonding, Setting Up Shared Storage, Installing the Red Hat High Availability Add-On, Building the Initial State of the Cluster, Configuring Additional Cluster Properties, Configuring a Quorum Disk, Setting Up Fencing, Creating Resources and Services, Troubleshooting a Nonoperational Cluster, Configuring GFS2 File Systems.
Content : High-Availability Clustering, The Workings of High Availability, High-Availability Requirements, Red Hat High-Availability Add-on Software, Components, Configuring Cluster-Based Services, Setting Up Bonding, Setting Up Shared Storage, Installing the Red Hat High Availability Add-On, Building the
Initial State of the Cluster, Configuring Additional Cluster Properties,
Configuring a Quorum Disk, Setting Up Fencing, Creating Resources and Services, Troubleshooting a Nonoperational Cluster, Configuring GFS2 File Systems.
87 MB ,44:4 MIN , THEORY
Chapter 3 : Setting Up an Installation Server
Topic : Configuring a Network Server as an Installation Server, Setting Up a TFTP and DHCP Server for PXE Boot, Installing the TFTP Server, Configuring DHCP for PXE Boot, Creating the TFTP PXE Server Content, Creating a Kickstart File, Using a Kickstart File to Perform an Automated, Installation, Modifying the Kickstart File with, system-config-kickstart, Making Manual Modifications to the Kickstart File
Content : Configuring a Network Server as an Installation Server, Setting Up a TFTP and DHCP Server for PXE Boot, Installing the TFTP Server, Configuring DHCP for PXE Boot, Creating the TFTP PXE Server Content, Creating a Kickstart File,
Using a Kickstart File to Perform an Automated, Installation, Modifying the Kickstart File with, system-config-kickstart, Making Manual Modifications to the Kickstart File
46 MB ,24:24 MIN , THEORY