Linux Classes, Training in Nanded


CentOS Linux Server Edition

This course provides foundation-level knowledge and skills necessary for a career in PC repair and support. Enroll Now

Syllabus

Page 1

  • Installation
  • Starting the Installation
  • The Firstboot Process
  • Verifying the Installation

  • System Initialization
  • The Boot Process

    Working with GRUB
  • The Config File
  • The GRUB Command Line
  • Runlevels
  • Runlevel Utilities
  • Rescue and Recovery Runlevels
  • Service Management
  • The Upstart Conversion

  • Disks and Partitioning
  • Basic Partitions
  • Creating a Partition
  • Making a Swap Partition
  • Deleting a Partition
  • Logical Volume Manager
  • Creating an LVM Partition
  • Adjusting the Size of LVM Partitions
  • Migrating Data
  • Deleting an LVM Partition
  • Setting Up RAID
  • Creating a RAID Array
  • What to Do When a Disk Fails
  • Deleting a RAID Array

  • File Systems and Such
  • File System Setup
  • Creating a File System
  • Creating a Swap
  • Mounting a File System
  • Extra File System Commands
  • Encryption with LUKS
  • Creating Encrypted Partitions
  • Mounting LUKS at Boot
  • Managing File System Quotas
  • Setting Up Quotas
  • Enabling Quotas
  • Quota Usage Reports
  • File System Security
  • Setting Up ACLs
  • GnuPG
  • Using AutoFS

  • Networking
  • Setting Up Networking
  • Static IP Addresses
  • Routing
  • Creating Static Routes
  • Troubleshooting Network Connections
  • Networking Utilities
  • Network Monitoring and Analysis
  • Advanced Networking
  • Ethernet Bonding
  • Client DNS Troubleshooting

    Page 2

  • Package Management
  • Working with RPM
  • Installing and Removing Packages
  • Querying and Verifying Packages
  • Doing It Again with Yum
  • Installing and Removing Packages
  • Searching for Packages
  • Configuring Additional Repositories
  • Making Your Own RPM
  • Creating an RPM
  • Creating Your Own Repository
  • Adding Your Custom Packages
  • The Red Hat Network
  • Registering Your System
  • User Administration
  • Users and Groups
  • Users
  • Passwords
  • The Password File
  • The Shadow File
  • Groups
  • The Group File
  • Switching Accounts
  • User Account Initialization
  • User-Specific Files
  • Global User Configuration
  • Group Collaboration

    Network User Authentication
  • Network Installs
  • Kickstart Server Setup
  • Firewall and SELinux Configuration
  • Mastering Kickstart Config Files
  • Post Install
  • Advanced Partitioning
  • Automating Kickstart
  • TFTP Server
  • PXE Boot
  • Firewall and SELinux Configuration
  • Other Network Installs
  • System Logging, Monitoring, and Automation
  • Working with Syslog
  • The Config File
  • Log Rotation
  • Centralized Logging
  • User Login Events
  • Monitoring System Performance
    Automation with cron and at
  • Creating cron Jobs
  • Single Jobs with at

  • The Kernel
  • Kernel Basics
  • Updating the Kernel
  • Tuning the Kernal with /proc/sys
  • SELinux
  • Understanding SELinux
  • Configuring SELinux
  • File Contexts
  • Service and Boolean Options
  • SELinux Troubleshooting
  • Policy Violations
  • Page 3

  • System Security
  • Security Through TCP Wrappers

    Firewall Rules Using iptables
  • Configuring iptables
  • Troubleshooting Firewall Rules
  • SWorking wit h NAT
    Pluggable Authentication Module
  • Securing Access
  • PAM Troubleshooting
  • Managing Password Policies

  • Remote Access
  • Secure SHell (SSH)
  • Configuring SSH
  • Firewall and SELinux Configuration
  • SSH Security
  • Troubleshooting SSH
  • SSH Security Revisited
  • Public/Private Keys
  • Port Forwarding
  • VNC Servers
  • Connecting Clients
  • Web Services
  • The Apache Web Server
  • Installing Apache
  • Configuring the Web Server
  • Firewall and SELinux Configuration
  • Troubleshooting Apache
  • Apache Security
  • Host-Based Security
  • User-Based Security
  • Setting Up HTTPS
  • CGI Applications

    Virtual Hosts

    Virtual Hosts
  • Installing Squid
  • Configuring the Proxy
  • Firewall and SELinux Configuration
  • Web Proxy Security
  • NFS
  • Network File Systems
  • Installing an NFS Server
  • Configuring NFS
  • Firewall and SELinux Configuration
  • NFS Security

    Troubleshooting NFS

    Connecting Clients
  • Samba
  • Samba
  • Configuring Samba
  • Samba Security
    Samba Clients
  • FTP
  • File Transfer Protocol
  • File Transfer Protocol
  • Configuring vsftp
  • Firewall and SELinux Configuration
  • FTP Security
    Troubleshooting FTP
  • DNS
  • Setting Up BIND
  • Firewall and SELinux Configuration
  • Configuring a DNS Server
  • Master Server
  • Slave Server
  • Caching-Only Server
  • Forwarding-Only Server
  • Page 4

    DNS Utilities and Troubleshooting
    BIND Security
  • Network Services
  • Xinetd: The Master Service Dynamic Host Configuration Protocol
  • Installing a DHCP Server
  • Configuring the DHCP Server
  • Security Configuration
  • Troubleshooting DHCP
  • Network Time Protocol
  • Installing a Time Server
  • Configuring NTP
  • Firewall and SELinux Configuration
  • NTP Security
  • NTP Security

  • Email Services
  • Email Service Overview
    SMTP with Postfix
  • Configuring Postfix
  • Firewall and SELinux Configuration
  • Postfix Security
  • Alias Mapping
  • Receiving Mail with Dovecot
  • Configuring Dovecot
  • Firewall and SELinux Configuration
  • Dovecot Security
  • Testing the Mail Server
  • Troubleshooting
  • Boot Issues
  • I Lost My Root User Password
  • Password Change Not Available in Single-User Mode
  • The MBR Is Corrupt
  • The Partition or Root File System Can’t Be Found
  • Troubleshooting File Systems
  • The System Complains About a File System Label
  • The Superblock Has Become Corrupt
  • Users Can’t Create Files in Their Home Directories
  • Miscellaneous
  • I Can’t Remote into My System
  • I Can’t Access Service X
  • When I Start a Service, It Tells Me “Cannot Bind to Address”
  • I Get the Error Message “No Route to Host”
  • My Ping to Another Host Has Failed
  • Virtualization with KVM
  • Working with Virtual Machines
  • Setting Up the Physical Host
  • Installing a Virtual Client
  • Managing a Virtual Client
  • Monitoring Virtual Resources
  • Many More.....

  • Some of the other Classes / Training...





    Know 5 Solid Reasons to join our training / Class

    1] Most experienced , Trainers

    All our trainers are the most experienced (+10 years) certified. and certified on multiple technologies. They really know the subject very well. There is an open secret: "Everything in training is totally depends on the trainer knowledge." So, we don't have appointed any fresher faculty for any single subject. .....

    Read More..

    HomeComputerPrinterAntivirusNetworkingWeb ServiceContact Us

    © 2016 Developed By Gaurav Sontakke & Vinay Pawar Degloor Dist Nanded .