Course description
This highly practical instructor led Red Hat 8 Advanced System Administration training course is designed to give the delegate practical experience in the areas of networking, security, basics of shell scripting and AWK as well as MariaDB incorporating MySQL commands.
With a strong emphasis on practical hands-on training, this course will teach the essential network, security and shell scripting tasks required on a Red Hat Linux system.
The delegate will learn modern system administration techniques and commands to administer a Red Hat Linux system to an advanced level. The command line is demonstrated and used extensively throughout the course.
Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.
Who will the Course Benefit?This Red Hat 8 Advanced System Administration course is designed for System Administrators, Programmers and other technical IT staff who need to acquire advanced knowledge of the key networking, security and scripting tasks required to administer a Linux system.
This course would also benefit experienced system administrators familiar with Unix and other Linux distributions who wish to gain knowledge to administer Red Hat Linux systems.
Course ObjectivesThis course aims to provide the delegate with the knowledge to be able to perform more advanced administration of networking facilities, securing the system and the use of scripting on a Red Hat Linux system.
Upcoming start dates
Suitability - Who should attend?
The delegate should be competent with common command line tools, vi/vim editor, using system and basic SELinux commands. They should also be capable of creating client access to NFS and CIFS, as well as basic networking, basic firewalls and scheduling automated tasks.
The requirements for this course can be met by either of the pre-requisite courses listed.
Experience to the level as demonstrated in these courses is recommended:
- Red Hat 8 System Administration - Part 2
- FastTrack Red Hat 8 System Administrator
Training Course Content
Red Hat 8 Advanced System Administration Training Course
Course Contents - DAY 1
Course Introduction- Administration and Course Materials
- Course Structure and Agenda
- Delegate and Trainer Introductions
- systemd Wants and Requires
- Creating systemd service and timer units
- Creating systemd mount units
- Useful systemd related utilities
- Exercise
- Routing under Linux
- ip suite of programs
- Configuring network cards and Routing
- Configuring the system as a Gateway
- IPv6 Addressing
- Local Network Bridges
- Configuring Ethernet Bonding (Link aggregation, teaming)
- Exercise
- Capturing packets with tcpdump
- Wireshark Introduction
- Filtering with Wireshark
- Filtering IPv6 traffic
- Wireshark Expert Information
- Exercise
- DAC vs MAC
- SELinux Policy
- SELinux Contexts
- SELinux Key Commands
- Viewing SELinux Decisions
- SELinux Booleans
- permissive and unconfined Domains
- Exporting SELinux Configuration
- Exercise
Course Contents - DAY 2
Session 5: SELINUX MODULES- SELinux Entities
- Object Classes
- SELinux Modules
- Administering Modules
- Creating Modules with audit2allow
- Writing SELinux Modules
- Type Enforcement File
- Exercise
- Firewalld Overview
- Firewalld vs IPTables
- Firewall Zones
- Configuring Firewall
- Creating a Firewall Service
- Configuring Firewall Zones
- Rich Rules
- Exercise
- The DNS/BIND system under Red Hat Linux
- Name Server Hierarchy
- Setting up DNS
- Master/Slave Zones
- Reverse lookup Zones
- Record types and their syntax
- Name Daemon Control Utility (rndc)
- Address Match Lists (acl)
- Configuring a Caching Only Name Server
- DNS in a chroot environment
- Testing a DNS server
- Exercise
Course Contents - DAY 3
Session 8: CENTRALISED AND SECURE STORAGE- iSCSI Overview
- Setting up iSCSI Target and Initiator
- Accessing centralised storage
- Accessing encrypted file systems
- Exercise
- Running commands with Sudo
- Sudo options and tags
- Sudo logging and replay
- Include statements
- Exercise
- Configuring a Kerberos 5 server
- Configuring a Kerberos client
- Configuring SSH to use Kerberos
- Exercise
Course Contents - DAY 4
Session 11: RAID ARRAYS- Creating RAID arrays
- Converting RAID 5 to RAID 6
- Hot swapping failed drives
- Removing a RAID device
- Exercise
- Mail commands
- Mail User, Mail Transport and Mail User Agents
- Postfix Configuration
- Configuring a null client using Postfix
- Dovecot - POP and IMAP services
- Exercise
- Data Security and Encryption
- Public Key Encryption
- Configuring Virtual Hosts : Name And IP Based Access
- Displaying Apache Web Server Information and Status
- Dynamic Virtual hosts
- Configuring HTTPS
- Signed Certificates
- Apache SSL Configuration File
- HTTPS Virtual Hosts
- Exercise
- Install and run a MariaDB container
- Creating a MariaDB Database
- Creating Database Tables
- Perform simple SQL queries on the database
- Exporting the Container
- Exercise
Course Contents - DAY 5
Session 15: VERSION CONTROL WITH GIT- Online Git Repositories
- Cloning a Repository
- Pushing, Pulling and Cloning content
- Creating and Merging Git Branches
- Moving to Points-in-Time
- Git Tags
- Viewing Git Logs
- Exercise
- What is a shell script?
- Creating and executing shell scripts
- User interaction
- Command line arguments
- Exercise
- Decision constructs using the 'if' statement
- Case statement
- Looping constructs: for/while/until
- Automating administrative tasks
- Exercise
- AWK usage statements
- AWK scripts
- AWK variables
- Pattern matching with AWK
- AWK Operators
- Exercise
Customer Outreach Award
We believe that it should be easy for you to find and compare training courses.
Our Customer Outreach Award is presented to trusted providers who are excellent at responding to enquiries, making your search quicker, more efficient and easier, too.
Continuing Studies
Further Learning
- Red Hat 8 System Administration - Part 3: Linux Automation with Ansible
- Red Hat System Security
- Red Hat Networking
- Linux Shell Programming
- Linux Advanced Shell Programming Tools
- Apache Web Server
Request info
Why StayAhead. From a single person on a scheduled course to large scale training projects StayAhead Training have the expertise and experience to help. Established since 1992, StayAhead Training is recognised as one of the leading independent IT Training specialists...