LPI101 - LPIC-1 EXAM PREP (COURSE 1)
DESCRIPTION
This course prepares students to take the 101 exam of the LPI level 1 certification. The Linux Professional Institute (LPI) is the go to certification body for vendor independent Linux certifications. This course covers fundamental Linux skills such as file management and manipulation, text processing, command line use, package management, filesystems, hardware, and many more. Students will feel confident taking the LPI LPIC-1 101 exam with in classroom assessments and practice exams
This course is validated against the v4.0 objectives.
Prerequisites:
General computing knowledge and experience. No prior knowledge with Linux is required.
AUDIENCE
AGENDA
CONTENT
Topics covered include:
1. ACCOUNT AND SECURITY ADMINISTRATION
2. CUSTOMIZING THE SHELL AND WRITING SIMPLE SCRIPTS
3. AUTOMATING TASKS
2. NETWORKING
4. X WINDOW SYSTEM
5. ACCESSIBILITY AND LOCALIZATION
6. LOG FILE ADMINISTRATION
7. SQL AND MTA FUNDAMENTALS
8. HOST SECURITY AND ENCRYPTION
LPI 102 - LPIC-1 EXAM PREP (COURSE 2)
DESCRIPTION
This course covers fundamental Linux skills such as file management and manipulation, text processing, command line use, package management, filesystems, hardware, and many more. Students will feel confident taking the LPI LPIC-1 102 exam with in classroom assessments and practice exams.
This course is validated against the v4.0 objectives.
AUDIENCE
AGENDA
CONTENT
Topics covered include:
1. ACCOUNT AND SECURITY ADMINISTRATION
2. CUSTOMIZING THE SHELL AND WRITING SIMPLE SCRIPTS
3. AUTOMATING TASKS
2. NETWORKING
4. X WINDOW SYSTEM
5. ACCESSIBILITY AND LOCALIZATION
6. LOG FILE ADMINISTRATION
7. SQL AND MTA FUNDAMENTALS
8. HOST SECURITY AND ENCRYPTION
LPI 201 - LPIC-2 EXAM PREP (COURSE 1)
DESCRIPTION
This course covers more advanced Linux skills such as system management and networking. Students will feel confident taking the LPI LPIC-2 201 exam with in classroom assessments and practice exams.
Current Version: E00
Prerequisites:
LPIC-1 certification or LPI101 “LPIC-1 Exam Prep (Course 1)” and LPI102 “LPIC-1 Exam Prep (Course 2)”.
AUDIENCE
AGENDA
CONTENT
Course Outline:
1. CAPACITY PLANNING
1. LPI Objectives Covered
2. Troubleshooting Resource Usage
3. Gathering System Info
4. Viewing Processes
5. Process Management Tools
6. Troubleshooting Processes: top
7. uptime
8. lsof and fuser
9. System Status – Memory
10. System Status – I/O
11. System Status – CPU
12. Performance Trending with sar
13. Graphing SNMP Data with MRTG
14. Nagios Overview
15. Nagios Configuration
LAB TASKS
16. Process Management and Job Control Basics
17. Nagios (Web Interface)
2. BOOT PROCESS AND SYSV INIT
1. LPI Objectives Covered
2. Booting Linux on PCs
3. GRUB Configuration
4. Boot Parameters
5. /sbin/init
6. System Init Styles
7. Linux Runlevels
8. /etc/inittab
9. /etc/rc.d/rc.sysinit
10. SUSE /etc/init.d/boot
11. Runlevel Implementation
12. Typical SysV Init Script
13. The /etc/rc.local File
14. The /etc/init.d/*.local Files
15. Managing Daemons
16. Controlling Service Startup
17. Controlling Service Startup
18. Shutdown and Reboot
LAB TASKS
19. Boot Process
20. GRUB Command Line
21. Basic GRUB Security
22. Recovering Damaged MBR
23. Introduction to Troubleshooting Labs
24. Troubleshooting Practice: Boot Process
3. SYSTEM RECOVERY AND BOOTLOADERS
1. LPI Objectives Covered
2. Diagnostic/Recovery Runlevels
3. Rescue Procedures
4. Recovery: mount & chroot
5. Recovery Examples
6. Recovery: Network Utilities
7. GRUB 2
8. LILO Options
9. LILO Configuration
10. SYSLINUX
11. Network Booting with PXE
LAB TASKS
12. Recovery Runlevels
13. Recovering Damaged MBR
14. Recover from Deleted Critical Files
15. Using SUSE Auto Repair Mode
4. LINUX KERNEL: COMPONENTS AND COMPILE
1. LPI Objectives Covered
2. Why Compile?
3. Getting Kernel Source
4. Preparing to Compile
5. Configuring Kernel Compilation Options
6. Available Kernel Compile Options
7. Compiling the Kernel
8. Install Compiled Kernel Modules
9. Initial ramdisk
10. Tips and Tricks
11. Installing the Kernel
12. Troubleshooting With GRUB
13. Boot Process Troubleshooting
14. Troubleshooting: Linux and Init
15. Hardware Discovery Tools
16. Configuring New Hardware with hwinfo
17. Configuring Kernel Components and Modules
18. Kernel Modules
19. Handling Module Dependencies
20. Kernel Modules Troubleshooting
21. Configuring the Kernel via /proc/
22. udev
LAB TASKS
23. Adjusting Kernel Options
24. Linux Kernel Driver Compilation
25. Linux Kernel Compilation
5. FILESYSTEM ADMINISTRATION
1. LPI Objectives Covered
2. Filesystem Support
3. Mounting Filesystems
4. Filesystem Table (/etc/fstab)
5. AutoFS
6. AutoFS Configuration
7. Managing Optical Media
8. Partitioning Disks with fdisk
9. Partitioning Disks with parted
10. Filesystem Creation
11. Extended Filesystem Maintenance
12. smartmontools
13. Resizing Filesystems
14. Managing an XFS Filesystem
15. Swap
16. File Encryption With encfs
17. Linux Unified Key Setup (LUKS)
18. Persistent Block Devices
19. List Block Devices
LAB TASKS
20. Accessing NFS Shares
21. On-demand filesystem mounting with AutoFS
22. Hot Adding Swap
23. Creating ISO Images for Backups
24. smartd and smartctl
25. LUKS-on-disk format Encrypted Filesystem
6. LVM & RAID
1. LPI Objectives Covered
2. Logical Volume Management
3. Implementing LVM
4. Creating Logical Volumes
5. Manipulating VGs & LVs
6. Advanced LVM Concepts
7. system-config-lvm
8. SLES Graphical Disk Tool
9. RAID Concepts
10. Array Creation with mdadm
11. Software RAID Monitoring
12. Software RAID Control and Display
LAB TASKS
13. Creating and Managing a RAID-5 Array
14. Creating and Managing LVM Volumes
7. ADJUSTING STORAGE DEVICE ACCESS AND ISCSI
1. LPI Objectives Covered
2. Tuning with hdparm
3. SCSI Devices
4. Remote Storage Overview
5. Remote Filesystem Protocols
6. Remote Block Device Protocols
7. iSCSI Architecture
LPI202 - LPIC-2 EXAM PREP (COURSE 2)
DESCRIPTION
This course covers more advanced Linux skills such as system management and networking. Students will feel confident taking the LPI LPIC-2 202 exam with in classroom assessments and practice exams.
Current Version: E00
AUDIENCE
AGENDA
CONTENT
Course Outline:
1. SECURITY CONCEPTS
2. SCANNING, PROBING, AND MAPPING VULNERABILITIES
3. PASSWORD SECURITY AND PAM
4. SECURE NETWORK TIME PROTOCOL (NTP)
5. KERBEROS CONCEPTS AND COMPONENTS
6. IMPLEMENTING KERBEROS
GL 120 - LINUX FUNDAMENTALS
DESCRIPTION
Prerequisites:
General computing knowledge and experience. No prior knowledge with Linux is required
AUDIENCE
AGENDA
CONTENT
1. WHAT IS LINUX? 2. LOGIN AND EXPLORATION 3. THE LINUX FILESYSTEM 4. MANIPULATING FILES 5. SHELL BASICS 6. ARCHIVING AND COMPRESSION 7. TEXT PROCESSING 8. REGULAR EXPRESSIONS 9. TEXT EDITING 10. MESSAGING |
GL314 - LINUX TROUBLESHOOTING
DESCRIPTION
The GL314 is designed to give Linux administrators experience with both common and uncommon system problems. The course is based on the idea that the best way to learn troubleshooting is to perform troubleshooting. Approximately 25% of class time is spent on lecture, leaving 75% for intensive lab content. Class starts with a discussion of effective troubleshooting technique. Tools and topics are gradually introduced over the course of the week. Students practice applying these tools and techniques in self-paced labs. Students can choose from over 120 scenarios organized by topic and difficulty. Because each scenarios is independent of the others, students can choose scenarios according to their interests and experience. Each scenario is designed to help students develop deeper understanding while exploring the problem. All scenarios includes optional hints designed to reflect a realistic troubleshooting process while only gradually revealing the solution. Students find the flexibility and challenge of this course very rewarding.
Current Version: H00
AUDIENCE
This course is designed for intermediate to advanced users. Students should have already taken the GL120, GL250 and GL275, or have equivalent knowledge. A short refresher for each topic will be presented, but will not be discussed in depth.
AGENDA
CONTENT
Course Outline:
1. TROUBLESHOOTING METHODOLOGY
1. The Troubleshooting Mindset
2. Evaluating Possible Solutions
3. Identifying and Implementing Change
4. Define and Follow Policies
5. Working with Others
6. Finding Documentation
7. Finding Help Online
2. TROUBLESHOOTING TOOLS
1. Common Troubleshooting Tools
2. RPM Queries
3. RPM Verification
4. SRPM and spec Files
5. Hardware Discovery Tools
6. Configuring New Hardware with hwinfo
7. strace and ltrace
8. lsof and fuser
9. ipcs and ipcrm
10. iostat, mpstat, and vmstat
11. Using hdparm to Measure
12. Troubleshooting with the ip command
13. Name Resolution
14. ss/netstat and rpcinfo
15. nmap
16. Netcat
17. tcpdump and wireshark
LAB TASKS
18. Determining the System’s Configuration
19. Troubleshooting with rpm
20. Process Related Tools
21. Network Tools
3. RESCUE ENVIRONMENTS
1. Diagnostic/Recovery
2. Rescue Procedures
3. Recovery: mount & chroot
4. Recovery Examples
5. Recovery: Network Utilities
LAB TASKS
6. Recovery Runlevels
7. Recovering Damaged MBR
8. Recover from Deleted Critical Files
4. TOPIC GROUP 1
1. Linux Boot Process
2. System Boot Method Overview
3. systemd System and Service Manager
4. Using systemd
5. Booting Linux on PCs
6. Troubleshooting With GRUB 2
7. Boot Process Troubleshooting
8. Troubleshooting: Linux and Init
9. Process Management
10. Process Management Tools
11. Troubleshooting Processes: top
12. Filesystem Concepts
13. Filesystem Troubleshooting
14. Backup Concepts
15. Backup Troubleshooting
16. Backup Troubleshooting
LAB TASKS
17. Troubleshooting Problems: Topic Group 1
5. TOPIC GROUP 2
1. Networking Tools
2. Linux Network Interfaces
3. Networking Commands Review
4. NetworkManager
5. Networking Troubleshooting
6. Networking Troubleshooting
7. Virtual Interfaces/IP Aliases
8. Network Teaming
9. Xinetd Concepts
10. Xinetd Troubleshooting
11. TCP Wrappers Concepts
12. TCP Wrappers Concepts
13. TCP Wrappers Troubleshooting
14. Netfilter/iptables Concepts
15. Netfilter/iptables Troubleshooting
LAB TASKS
16. Troubleshooting Problems: Topic Group 2
6. TOPIC GROUP 3
1. X11 Concepts
2. X11 Server Operation
3. X11 Troubleshooting
4. System Logging
5. systemd Journal
6. systemd Journal’s journactl
7. Secure Logging with Journal’s Log Sealing
8. Rsyslog Concepts
9. Syslog Troubleshooting
10. RPM Concepts
11. RPM Troubleshooting
12. Common Unix Printing System (CUPS)
13. CUPS Troubleshooting
14. CUPS Troubleshooting
15. at & cron
16. at & cron Usage
17. at & cron Troubleshooting
LAB TASKS
18. Troubleshooting Problems: Topic Group 3
7. TOPIC GROUP 4
1. Users and Groups
2. Users and Groups Troubleshooting
3. PAM Concepts
4. PAM Troubleshooting
5. Filesystem Quotas
6. Quotas Troubleshooting
7. File Access Control Lists
8. FACL Troubleshooting
9. SELinux Concepts
10. SELinux Troubleshooting
11. SELinux Troubleshooting Continued
LAB TASKS
12. Troubleshooting Problems: Topic Group 4
8. TOPIC GROUP 5
1. Kernel Modules
2. Kernel Modules Troubleshooting
3. Logical Volume Management
4. Creating Logical Volumes
5. LVM Deployment Issues
6. VG Migration, PV Resizing & Troubeshooting
7. Software RAID Overview
8. RAID Troubleshooting
9. SAN Multipathing
10. Multipath Configuration
11. Multipathing Best Practices
12. LDAP and OpenLDAP
13. Troubleshooting OpenLDAP
14. NIS and NIS+ (YP)
15. NIS Troubleshooting Aids
LAB TASKS
16. Troubleshooting Problems: Topic Group 5
9. TOPIC GROUP 6
1. DNS Concepts
2. DNS Troubleshooting
3. DNS Troubleshooting
4. Apache Concepts
5. Apache Troubleshooting
6. Apache Troubleshooting
7. FTP Concepts
8. FTP Troubleshooting
9. Squid Concepts
GL550 - ENTERPRISE LINUX SECURITY ADMINISTRATION
DESCRIPTION
Special attention is given to securing commonly deployed network services. At the end of the course, students have an excellent understanding of the potential security vulnerabilities — know how to audit existing machines, and how to securely deploy new network services.
Prerequisites:
This class covers advanced security topics and is intended for experienced systems administrators. Candidates should have current Linux or UNIX systems administration experience equivalent to the GL120 “Linux Fundamentals”, GL250 “Enterprise Linux Systems Administration”, and GL275 “Enterprise Linux Network Services”
Current Version: F00
AUDIENCE
This class covers advanced security topics and is intended
for experienced systems administrators. Candidates should have current Linux or UNIX
systems administration experience equivalent to the GL120 “Linux Fundamentals”,
GL250 “Enterprise Linux Systems Administration”, and GL275 “Enterprise Linux Network Services”
AGENDA
CONTENT
Topics covered include:
1. SECURITY CONCEPTS
2. SCANNING, PROBING, AND MAPPING VULNERABILITIES
3. PASSWORD SECURITY AND PAM
4. SECURE NETWORK TIME PROTOCOL (NTP)
5. KERBEROS CONCEPTS AND COMPONENTS
6. IMPLEMENTING KERBEROS
Oracle Linux enterprise administration
DESCRIPTION
Red Hat System Administration I provides a foundation for students wishing to become full-time Linux system administrators by introducing key command line concepts and other enterprise-level tools. These concepts are further developed in the follow-on course, Red Hat System Administration II (RH134)
AUDIENCE
AGENDA
CONTENT
- Access the command line
- Log in to a Linux system and run simple commands using the shell.
- Manage files from the command line
- Copy, move, create, delete, and organize files from the bash shell prompt.
- Get help in Red Hat Enterprise Linux
- Resolve problems by using online help systems and Red Hat support utilities.
- Create, view, and edit text files
- Create, view, and edit text files from command output or in an editor.
- Manage local Linux users and groups
- Manage local Linux users and groups, and administer local password policies.
- Control access to files with Linux file system permissions
- Set Linux file system permissions on files and interpret the security effects of different permission settings.
- Monitor and manage Linux processes
- Obtain information about the system, and control processes running on it.
- Control services and daemons
- Control and monitor network services and system daemons using systemd
- Configure and secure OpenSSH service
- Access and provide access to the command line on remote systems securely using OpenSSH
- Analyze and store logs
- Locate and accurately interpret relevant system log files for troubleshooting purposes.
- Manage Red Hat Enterprise Linux networking
- Configure basic IPv4 networking on Red Hat Enterprise Linux systems.
- Archive and copy files between systems
- Archive files and copy them from one system to another.
- Install and update software packages
- Download, install, update, and manage software packages from Red Hat and yum package repositories.
- Access Linux file systems
- Access and inspect existing file systems on a Red Hat Enterprise Linux system.
- Use virtualized systems
- Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.
- Comprehensive review
- Practice and demonstrate the knowledge and skills learned in this course.
Training Calendar
You are interested in ITIL Training?
Contact us for more information