Video Lectures

32x32

Chapter 1 : Introduction to Red Hat Enterprise Linux
Topic : Linux, Open Source and Red Hat, Origins of Linux, Distributions, Duties of Linux System Administrator.
Content : Linux, Open Source and Red Hat, Linux Distributions, Duties of Linux System Administrator. 54 MB ,28:45 MIN , THEORY


32x32

Chapter 2 : Command Line
Topic : Working with the Bash Shell, Getting the Best of Bash, Useful Bash Key Sequences, Working with Bash History, Performing Basic File System Management Tasks, Working with Directories, Piping and Redirection, Finding Files,Working with an Editor
Content : Working with the Bash Shell, Getting the Best of Bash, Useful Bash Key Sequences, Working with Bash History, Performing Basic File System Management Tasks, Working with Directories, Piping and Redirection, Finding Files, Working with an Editor 99 MB ,50:22 MIN , THEORY


32x32

Chapter 3 : System Administration Tasks
Topic : System Administration Tasks
Content : Performing Job Management Tasks, System and Process Monitoring and Management, Managing Processes with ps, Sending Signals to Processes with the kill Command, Using top to Show Current System Activity, Managing Process Niceness, Scheduling Jobs, Mounting Devices, Working with Links, Creating Backups, Managing Printers, Setting Up System Logging, Setting Up Rsyslog, Common Log Files, Setting Up Logrotate 161 MB ,1:17:0 MIN , THEORY + PRACTICAL


32x32

Chapter 4 : Managing Software
Topic : Understanding RPM, Understanding Meta Package Handlers, Creating Your Own Repositories, Managing Repositories, Installing Software with Yum, Querying Software, Extracting Files from RPM Packages
Content : Understanding RPM, Understanding Meta Package Handlers, Creating Your Own Repositories, Managing Repositories, Installing Software with Yum, Querying Software, Extracting Files from RPM Packages 55 MB ,27:57 MIN , THEORY + PRACTICAL


32x32

Chapter 1 : Configuring and Managing Storage
Topic : Understanding Partitions and Logical Volumes, Creating Partitions, Creating File Systems, File Systems Overview, Creating File Systems, Changing File System Properties, Checking the File System Integrity
Content : Understanding Partitions and Logical Volumes, Creating Partitions, Creating File Systems, File Systems Overview, Creating File Systems, Changing File System Properties, Checking the File System Integrity 49 MB ,25:43 MIN , THEORY


32x32

Chapter 2 : Connecting to the network
Topic : Connecting to the network
Content : Understanding NetworkManager, Working with Services and Runlevels, Configuring the Network with NetworkManager, Working with system-config-network, NetworkManager Configuration Files, Network Service Scripts, Networking from the Command Line, Troubleshooting Networking 63 MB ,32:51 MIN , THEORY + PRACTICAL


32x32

Chapter 2 : Connecting to the network
Topic : Setting Up IPv6, Configuring SSH, Enabling the SSH Server, Using the SSH Client, Using PuTTY on Windows Machines, Configuring Key-Based SSH Authentication, Using Graphical Applications with SSH, Using SSH Port Forwarding, Configuring VNC Server Access
Content : Setting Up IPv6, Configuring SSH, Enabling the SSH Server, Using the SSH Client, Using PuTTY on Windows Machines, Configuring Key-Based SSH Authentication, Using Graphical Applications with SSH, Using SSH Port Forwarding, Configuring VNC Server Access 66 MB ,36:39 MIN , THEORY


32x32

Chapter 3 : Working with Users, Groups, and Permissions
Topic : Managing Users and Groups, Commands for User Management, Managing Passwords, Modifying and Deleting User Accounts, Configuration Files, Creating Groups, Using Graphical Tools for User, and Group Management
Content : Managing Users and Groups, Commands for User Management, Managing Passwords,Modifying and Deleting User Accounts, Configuration Files, Creating Groups, Using Graphical Tools for User and Group Management 62 MB ,35:27 MIN , THEORY


32x32

Chapter 3 : Working with Users, Groups, and Permissions
Topic : Using External Authentication Sources, The Authentication Process, sssd, nsswitch, Pluggable Authentication Modules
Content : Using External Authentication Sources, The Authentication Process, sssd, nsswitch, Pluggable Authentication Modules 63 MB ,33:34 MIN , THEORY


32x32

Chapter 3 : Working with Users, Groups, and Permissions
Topic : Managing Permissions, The Role of Ownership, Basic Permissions: Read, Write, and Execute, Advanced Permissions, Working with Access Control Lists, Setting Default Permissions with umask, Working with Attributes
Content : Managing Permissions, The Role of Ownership, Basic Permissions: Read, Write, and Execute, Advanced Permissions, Working with Access Control Lists, Setting Default Permissions with umask, Working with Attributes 74 MB ,47:19 MIN , THEORY


32x32

Chapter 1 : Securing Server with iptables
Topic : Understanding Firewalls, Setting Up a Firewall with system-config-firewall, Allowing Services, Trusted Interfaces, Masquerading, Configuration Files, Setting Up a Firewall with iptables, Tables, Chains, and Rules, Composition of Rule, Configuration Example, Advanced iptables Configuration, Configuring Logging, The Limit Module, Configuring NAT
Content : Understanding Firewalls, Setting Up a Firewall with system-config-firewall, Allowing Services, Trusted Interfaces, Masquerading, Configuration Files, Setting Up a Firewall with iptables, Tables, Chains, and Rules, Composition of Rule, Configuration Example, Advanced iptables Configuration, Configuring Logging, The Limit Module, Configuring NAT 162 MB ,1:20:43 MIN , THEORY


32x32

Chapter 2 : Setting Up Cryptographic Services
Topic : Introducing SSL, Proof of Authenticity: the Certificate Authority, Managing Certificates with openssl, Creating a Signing Request, Working with GNU Privacy Guard, Creating GPG Keys, Key Transfer, Managing GPG Keys, Encrypting Files with GPG, GPG Signing, Signing RPM Files
Content : Introducing SSL, Proof of Authenticity: the Certificate Authority, Managing Certificates with openssl, Creating a Signing Request, Working with GNU Privacy Guard, Creating GPG Keys, Key Transfer, Managing GPG Keys, Encrypting Files with GPG, GPG Signing, Signing RPM Files 107 MB ,58:6 MIN , THEORY + PRACTICAL


32x32

Chapter 3 : Configuring Server for File Sharing
Topic : What is NFS? Advantages and Disadvantages of NFS, Configuring NFS4, Setting Up NFSv4,Mounting an NFS Share, Making NFS Mounts Persistent, Configuring Automount.
Content : What is NFS? Advantages and Disadvantages of NFS, Configuring NFS4, Setting Up NFSv4,Mounting an NFS Share, Making NFS Mounts Persistent, Configuring Automount. 49 MB ,26:39 MIN , THEORY + PRACTICAL


32x32

Chapter 3 : Configuring Server for File Sharing
Topic : Configuring Samba, Setting Up a Samba File Server,Samba Advanced Authentication Options, Accessing Samba Shares,Offering FTP Services.
Content : Configuring Samba, Setting Up a Samba File Server,Samba Advanced Authentication Options, Accessing Samba Shares,Offering FTP Services. 92 MB ,45:43 MIN , THEORY + PRACTICAL


32x32

Chapter 1 : Configuring DNS and DHCP
Topic : Introduction to DNS, The DNS Hierarchy, DNS Server Types, The DNS Lookup Process, DNS Zone Types, Setting Up a DNS Server, Setting Up a Cache-Only Name Server, Setting Up a Primary Name Server, Setting Up a Secondary Name Server, Understanding DHCP, Setting Up a DHCP Server
Content : Introduction to DNS, The DNS Hierarchy, DNS Server Types, The DNS Lookup Process, DNS Zone Types, Setting Up a DNS Server, Setting Up a Cache-Only Name Server, Setting Up a Primary Name Server, Setting Up a Secondary Name Server, Understanding DHCP, Setting Up a DHCP Server 155 MB ,1:22:53 MIN , THEORY + PRACTICAL


32x32

Chapter 2 : Setting Up a Mail Server:
Topic : Using the Message Transfer Agent, the Mail Delivery Agent, the Mail User Agent, Setting Up Postfix as an SMTP Server, Working with Mutt, Basic Configuration, Internet
Content : Using the Message Transfer Agent, the Mail Delivery Agent, the Mail User Agent, Setting Up Postfix as an SMTP Server, Working with Mutt, Basic Configuration, Internet Configuration, Configuring Dovecot for POP and IMAP 117 MB ,1:0:48 MIN , THEORY + PRACTICAL


32x32

Chapter 1 : Introducing Bash Shell Scripting
Topic : Introduction, Elements of a Good Shell Script, Executing the Script, Working with Variables and Input,Understanding Variables, Variables, Subshells, and Sourcing, Working with Script Arguments, Asking for Input, Using Command Substitution, Substitution Operators, Changing Variable Content with Pattern Matching, Performing Calculations, Using Control Structures, Using if...then...else, Using case, Using while, Using until, Using for.
Content : Introduction, Elements of a Good Shell Script, Executing the Script, Working with Variables and Input,Understanding Variables, Variables, Subshells, and Sourcing, Working with Script Arguments, Asking for Input, Using Command Substitution, Substitution Operators, Changing Variable Content with Pattern Matching, Performing Calculations, Using Control Structures, Using if...then...else, Using case, Using while, Using until, Using for. 125 MB ,1:9:41 MIN , THEORY + PRACTICAL


32x32

Chapter 1 : Introducing Bash Shell Scripting
Topic : Configuring Booting with GRUB
Content : grub.conf, Changing Boot Options, Using the GRUB Command Line, Reinstalling GRUB 38 MB ,20:28 MIN , THEORY + PRACTICAL


32x32

Chapter 2 : High-Availability Clustering
Topic : High-Availability Clustering, The Workings of High Availability, High-Availability Requirements, Red Hat High-Availability Add-on Software, Components, Configuring Cluster-Based Services, Setting Up Bonding, Setting Up Shared Storage, Installing the Red Hat High Availability Add-On, Building the Initial State of the Cluster, Configuring Additional Cluster Properties, Configuring a Quorum Disk, Setting Up Fencing, Creating Resources and Services, Troubleshooting a Nonoperational Cluster, Configuring GFS2 File Systems.
Content : High-Availability Clustering, The Workings of High Availability, High-Availability Requirements, Red Hat High-Availability Add-on Software, Components, Configuring Cluster-Based Services, Setting Up Bonding, Setting Up Shared Storage, Installing the Red Hat High Availability Add-On, Building the Initial State of the Cluster, Configuring Additional Cluster Properties, Configuring a Quorum Disk, Setting Up Fencing, Creating Resources and Services, Troubleshooting a Nonoperational Cluster, Configuring GFS2 File Systems. 87 MB ,44:4 MIN , THEORY


32x32

Chapter 3 : Setting Up an Installation Server
Topic : Configuring a Network Server as an Installation Server, Setting Up a TFTP and DHCP Server for PXE Boot, Installing the TFTP Server, Configuring DHCP for PXE Boot, Creating the TFTP PXE Server Content, Creating a Kickstart File, Using a Kickstart File to Perform an Automated, Installation, Modifying the Kickstart File with, system-config-kickstart, Making Manual Modifications to the Kickstart File
Content : Configuring a Network Server as an Installation Server, Setting Up a TFTP and DHCP Server for PXE Boot, Installing the TFTP Server, Configuring DHCP for PXE Boot, Creating the TFTP PXE Server Content, Creating a Kickstart File, Using a Kickstart File to Perform an Automated, Installation, Modifying the Kickstart File with, system-config-kickstart, Making Manual Modifications to the Kickstart File 46 MB ,24:24 MIN , THEORY


The Shikshak App

The Shikshak App is an honest attempt to provide quality education.

https://play.google.com/store/apps/details?id=com.weit.theshikshak&hl=en_IN