Bezpieczeństwo IT

Administracja serwerami Linux oraz BSD

RH 300 - RHCE Rapid Track

Przeprowadzenie autoryzowanego szkolenia RH300 + egzamin

Szkolenie przeprowadzone zostało dla firmy B2B Sp. z o.o. będącej Certyfikowanym Ośrodkiem Edukacyjnym firmy Red Hat

(http://bel.pl/pl/szkolenia/sciezka-rhce/rh300) :

  1. Essentials
    1. Essential initial topics in system administration, including
      editors, switching accounts, adding users, using cron, and managing
      network connections
  2. Kernel Services
    1. The Linux kernel: variants and modules
    2. The /proc filesystem and the sysctl command
    3. Accessing devices using udev
    4. Exploring hardware
  3. Filesystem Management
    1. Creating filesystems
    2. Making filesystem mounts persistent across reboots
    3. Managing swap space
  4. User Administration
    1. Modifying and deleting user accounts
    2. Password aging
    3. Group administration
    4. Creating group directories
    5. Setting disk quotas
  5. Local Security
    1. Setting up a host-based firewall
    2. Using access control lists
    3. The SELinux security layer
    4. Managing suid and sgid executables
    5. Controlling access to superuser authority using sudo
  6. Advanced Partitioning
    1. Understanding and implementing Software RAID
    2. Understanding Logical Volume Management
    3. Creating and resizing logical volumes
  7. Installation
    1. The interactive Anaconda installer
    2. Kickstart: a hands-free method of installation
  8. System Initialization
    1. Understanding the boot procedure
    2. Configuring the GRUB boot loader
    3. The Initial RAM Disk
    4. Understanding run levels
    5. Controlling services
  9. RPM, YUM, RHN
    1. RPM: The Red Hat Package Manager
    2. The YUM installer
    3. Using the Red Hat Network
  10. System Administration Topics
    1. Configuring the X Server
    2. The CUPS printing system
    3. cron and the superuser: the system-wide crontab file
    4. cron and system reboots: the anacron system
    5. Authentication Configuration: Pluggable Authentication Modules
  11. Network Configuration
    1. Understanding network addresses
    2. Using OpenSSH for network communications
    3. Using VNC for network communications
    4. Network Authentication
  12. Network Security
    1. Protecting services using TCP Wrappers
    2. Protecting the system using a packet filtering host-based firewall
  13. Network File Sharing Services
    1. Setting up an NFS server
    2. Setting up an FTP server
    3. The Samba Server: networking with Windows systems
  14. Network Infrastructure
    1. Creating a private repository
    2. NTP: Coordinating time
    3. Configuring a DHCP server
    4. Configuring a DNS server
  15. HTTP Service
    1. Configuring the Apache web server
    2. Configuring the Squid web proxy cache
  16. Mail Service
    1. Understanding e-mail delivery
    2. Using sendmail and postfix
    3. Dovecot: an IMAP and POP server
  17. Troubleshooting
    1. A method for fault analysis
    2. Things to check
    3. Understanding recovery run levels
    4. Using the rescue environment
« Powrót
Wszystko

należy robić w sposób tak prosty, jak to tylko możliwe, i ani trochę prościej. - Albert Einstein

Grupa Emerge: Emerge Studio Emerge Systems Do góry Mapa witryny

tel.: + 48 791 611 309 | email: systems@emerge.pl © 2012 Emerge Systems - bezpieczeństwo IT. Wszelkie prawa zastrzeżone.