Você está na página 1de 5

Red Hat Linux Essentials

Linux Ideas and History


• An Introduction to Linux and Open Source

Linux Usage Basics


• Logging into the system
• Changing users
• Types of users

Running Commands and Getting Help


• Some simple commands
• Getting help

Browsing the Filesystem


• Linux file Hierarchy Concepts
• Working with directories

Users, Groups and Permissions


• Permission Types
• Changing Permissions

Using the bash Shell


• Bash configuration files
• Bash shell variables

Standard I/O and Pipes


• Standard Input, Output and Error
• Redirecting Input, Output and Error
• Use of pipe

Text Processing Tools


• grep, cut, sed, sort, diff and patch

Text Editor
• Three modes of vi and vim
• Using nano

Investigating and Managing Processes


• Overview of Processes
• Terminating processes
• Running process in Background/Foreground

Configuring the Bash Shell


• Aliases
• Shell startup Scripts

Finding and Processing Files


• slocate/locate and find
• The Gnome search tools

Advanced Topics in Users, Groups and Permissions


• User ID and Group ID Numbers
• /etc/passwd, /etc/shadow, /etc/group and /etc/skel Files
• Users and Groups
• Special Permissions

The Linux Filesystem In-Depth


• Inodes and Directories
• Using Removable media
• Archiving Files
• Compression Utilities

Red Hat Enterprise Linux System Administration


Linux Initialization Process
• Boot Loader Components
• Starting Boot Process: GRUB
• Kernel Initialization
• Init Initialization
• Run levels
• Daemon Processes
• System V

Package Management
• RPM Package Manager
• Installing and Removing Software
• Updating a Kernel RPM
• Working with rpm
• Working with yum
• Red Hat Network

Kernel Services
• The Linux Kernel
• Kernel Modules
• Managing the initrd Image
• Accessing Drivers Through /dev
• Managing /dev With udev
• sysctl : Persistent Kernel Configuration
• Monitoring Processes and Resources

System Services
• Network Time Protocol
• System Logging
• syslog Configuration
• XOrg: The X11 Server
• XOrg Server Configuration
• XOrg in runlevel 3 and runlevel 5
• Remote X Sessions
• SSH: Secure Shell
• Cron and anacron
• CUPS
User Administration
• Adding, Modifying and Deleting User Accounts
• User Private Groups
• Group Administration
• Password Aging Policies
• Switching Accounts
• sudo
• Network Users Authentication Configuration : NIS Configuration
Permissions
• Normal permissions
• Default File Permissions
• SUID and SGID Executables
• SGID Directories
• The Sticky Bit
• Default File Permissions
• Access Control Lists (ACLs)
• SELinux
• SELinux: Targeted Policy
• SELinux: Management

File system Management


• Disk Partitioning
• Managing Partitions
• Making File systems
• File system Labels
• tune2fs
• Mounting and Unmounting File systems
• Mount Points and /etc/fstab
• Swap Files and Partitions
• Mounting NFS File systems
• Automounter

Advanced Filesystem Management


• Managing Quotas for Users
• What is Software RAID?
• Software RAID Configuration
• Logical Volume Manager (LVM)
• Creating and Resizing Logical Volumes
• Logical Volume Manager Snapshots
• Using LVM Snapshots
• Archiving tools
• Compression tools
• Dump and restore

Network Configuration
• Network Interface Drivers
• Speed and Duplex Settings
• IPv4 Addresses
• Dynamic and Static IPv4 Configuration
• Device Aliases
• Routing Table
• Default Gateway
• Configuring Routes
• Verify IP Connectivity
• Defining the Local Host Name
• Resolver
• Verify DNS Connectivity
• Network Configuration Utilities
• Transparent Dynamic Configuration
• Implementing IPv6

Installation
• Installation Methods
• Network Installation Server
• Configuring File Systems
• Advanced Partitioning
• Package Selection
• Kickstart Installation

Virtualization with Xen


• Virtualization with Xen
• Hardware Considerations
• Preparing Domain-0
• Virtual Resources
• Domain-U Configuration
• Installing a new Domain-U
• Domain Management with xm
• Activating Domains on boot

Troubleshooting
• Method of Fault Analysis
• Fault Analysis: Gathering Data
• Check X related issues
• Check Network related issues
• Order of the Boot Process
• Filesystem Corruption
• Filesystem Recovery
• Rescue Environment

Red Hat Network Services and Security Administration


System Service Network Access Controls
• System Initialization and Service Management
• Tcp wrappers Configuration
• Netfilter Overview
• Security Enhanced Linux (SELinux)
• Internet Protocol and Routing
• Network Address Translation (NAT)
• IPv6 and ip6tables

DNS and DHCP


• DNS Resolvers
• Configuring DNS server and client
• Trace a DNS Query with dig
• BIND
• DHCP Overview
• Configuring an IPv4 DHCP Server

File Sharing Services


• File Transfer Protocol (FTP)
• Network File Service (NFS)
• Samba services

Web Services
• Overview of Apache server
• Apache Server Configuration
• Virtual Hosts
• Apache Access Configuration
• Apache Encrypted Web Server
• Web Proxy

Mail Services
• Email Operation overview
• Simple Mail Transport Protocol
• Sendmail
• Postfix
• Using alternatives to Switch MTAs
• Mail Retrieval Protocols

Securing Data
• Purpose of Encryption
• Symmetric and Asymmetric Encryption
• Public Key Infrastructures
• Digital Certificates

Account Management
• Account Management
• Name Service Switch (NSS)
• Pluggable Authentication Modules (PAM)

System Performance and Security


• System Faults and Breaches
• Fault Analysis Methods
• System Monitoring
• Managing Processes

Você também pode gostar