Bezpieczeństwo IT

Hacking Academy

RH 133 - Administracja systemem Red Hat Linux

Przeprowadzenie autoryzowanego szkolenia RH133 + egzamin.

Szkolenie przeprowadzone zostało dla firmy B2B Sp. z o.o. będącej Certyfikowanym Ośrodkiem Edukacyjnym firmy Red Hat

(http://bel.pl/pl/szkolenia/sciezka-rhce/rh133) :

  1. System Initialization
    1. Boot Sequence Overview
    2. Boot Loader Components
    3. GRUB and grub.conf
    4. Starting the Boot Process: GRUB
    5. Kernel Initialization
    6. init Initialization
    7. Run Levels
    8. /etc/rc.d/rc.sysinit
    9. /etc/rc.d/rc
    10. System V run levels
    11. /etc/rc.d/rc.local
    12. Controlling Services
    13. Lab: Managing Startup
  2. Package Management
    1. RPM Package Manager
    2. Installing and Removing Software
    3. Updating a Kernel RPM
    4. rpm Queries
    5. rpm Verification
    6. About yum
    7. Using yum
    8. Searching packages/files
    9. Configuring Additional Repositories
    10. Creating a private repository
    11. Red Hat Network
    12. Red Hat Network Server
    13. Entitlements
    14. Red Hat Network Client
    15. Lab: Working with packages
  3. Kernel Services
    1. The Linux Kernel
    2. Kernel Images and Variants
    3. Kernel Modules
    4. Kernel Module Utilities
    5. Managing the initrd Image
    6. Accessing Drivers Through /dev
    7. Device Node Examples
    8. Managing /dev With udev
    9. Adding Files Under /dev
    10. Kernel Configuration With /proc
    11. /proc Examples
    12. sysctl : Persistent Kernel Configuration
    13. Exploring Hardware Devices
    14. Monitoring Processes and Resources
    15. Lab: Configuring the kernel
  4. System Services
    1. Network Time Protocol
    2. System Logging
    3. syslog Configuration
    4. XOrg: The X11 Server
    5. XOrg Server Configuration
    6. XOrg in runlevel 3
    7. XOrg in runlevel 5
    8. Remote X Sessions
    9. SSH: Secure Shell
    10. VNC: Virtual Network Computing
    11. cron
    12. Controlling Access to cron
    13. System crontab Files
    14. Daily Cron Jobs
    15. The anacron System
    16. CUPS
    17. Lab: System Services
  5. User Administration
    1. Adding a New User Account
    2. User Private Groups
    3. Modifying / Deleting User Accounts
    4. Group Administration
    5. Password Aging Policies
    6. Switching Accounts
    7. sudo
    8. Network Users
    9. Authentication Configuration
    10. Example: NIS Configuration
    11. Example: LDAP Configuration
    12. SUID and SGID Executables
    13. SGID Directories
    14. The Sticky Bit
    15. Default File Permissions
    16. Access Control Lists (ACLs)
    17. SELinux
    18. SELinux: Targeted Policy
    19. SELinux: Management
  6. Filesystem Management
    1. Overview: Adding New Filesystems to the Filesystem Tree
    2. Device Recognition
    3. Disk Partitioning
    4. Managing Partitions
    5. Making Filesystems
    6. Filesystem Labels
    7. tune2fs
    8. Mount Points and /etc/fstab
    9. Mounting Filesystems with mount
    10. Unmounting Filesystems
    11. mount By Example
    12. Handling Swap Files and Partitions
    13. Mounting NFS Filesystems
    14. Automounter
    15. Direct Maps
    16. gnome-mount
    17. Lab: Adding New Filesystems to the Filesystem Tree
  7. Advanced Filesystem Management
    1. Configuring the Quota System
    2. Setting Quotas for Users
    3. Reporting Quota Status
    4. What is Software RAID?
    5. Software RAID Configuration
    6. Software RAID Testing and Recovery
    7. What is Logical Volume Manager (LVM)?
    8. Creating Logical Volumes
    9. Resizing Logical Volumes
    10. Logical Volume Manager Snapshots
    11. Using LVM Snapshots
    12. Archiving tools: tar
    13. Archiving Tools: dump/restore
    14. Archiving Tools: rsync:
    15. Lab: Advanced Filesystem Mangement
  8. Network Configuration
    1. Network Inferfaces
    2. Driver Selection
    3. Speed and Duplex Settings
    4. IPv4 Addresses
    5. Dynamic IPv4 Configuration
    6. Static IPv4 Configuration
    7. Device Aliases
    8. Routing Table
    9. Default Gateway
    10. Configuring Routes
    11. Verify IP Connectivity
    12. Defining the Local Host Name
    13. Local Resolver
    14. Remote Resolvers
    15. Verify DNS Connectivity
    16. Network Configuration Utilities
    17. Transparent Dynamic Configuration
    18. Implementing IPv6
    19. IPv6: Dynamic Interface Configuration
    20. IPv6: StaticInterface Configuration
    21. IPv6: Routing Configuration
    22. New and Modified Utilities
    23. Lab: Manage Network Settings
  9. Installation
    1. Anaconda, the Red Hat Enterprise Linux Installer
    2. First Stage: Starting the Installation
    3. First Stage: Boot Media
    4. Accessing the Installer
    5. First Stage: Installation Method
    6. Network Installation Server
    7. Second Stage: Installation Overview
    8. Configuring File Systems
    9. Advanced Partitioning
    10. Package Selection
    11. First Boot: Post-Install Configuration
    12. Kickstart
    13. Starting a Kickstart Installation
    14. Anatomy of a Kickstart File
    15. Kickstart: Commands Section
    16. Kickstart: Commands section
    17. Kickstart: Packages Section
    18. Kickstart: %pre, %post
    19. Lab: Installation and System-Initialization
  10. Virtualization with Xen
    1. Virtualization with Xen
    2. Hardware Considerations
    3. Preparing Domain-0
    4. Virtual Resources
    5. Domain-U Configuration
    6. Installing a new Domain-U
    7. Domain Management with xm
    8. Activating Domains on boot
    9. Lab: Exploring Virtualization
  11. Troubleshooting
    1. Method of Fault Analysis
    2. Fault Analysis: Gathering Data
    3. Things to Check: X
    4. Things to Check: Networking
    5. Order of the Boot Process
    6. Filesystem Corruption
    7. Filesystem Recovery
    8. Recovery Run-levels
    9. Rescue Environment
    10. Rescue Environment Utilities
    11. Rescue Environment Details
    12. Lab: System Rescue and Troubleshooting
« Powrót
Zapomnij o

licencjach. Korzystaj z Linuxa!

Grupa Emerge: Emerge Studio Emerge Systems Do góry Mapa witryny

tel.: + 48 791 611 309 | email: systems@emerge.pl © 2012 Emerge Systems - bezpieczeństwo IT. Wszelkie prawa zastrzeżone.