Linux for Unix Administrators - GL615 Course Outline

(5 Days)

Overview

The GL615 is an accelerated course combining the topics in the GL250

Enterprise Linux Systems Administration

, and the GL275

Enterprise Linux Networking Services

.

Prerequisites

Students should already be experienced Unix administrators. Fundamentals such as the Unix command line and how to edit files will not be covered in class. A good understanding of network concepts, the TCP/IP protocol suite, and basic Unix security is also assumed. The accelerated pace of this class makes it more difficult for unprepared students to keep up. Less experienced students are encouraged to instead take the GL120

Linux Fundamentals

, GL250

Enterprise Linux Systems Administration

or GL275

Enterprise Linux Networking Services

.

Course Outline

  1. LINUX ORIENTATION

    1. FSF and GNU
    2. GPL – General Public License
    3. Linux Kernel and Versioning
    4. Components of a Distribution
    5. Red Hat Linux Products
    6. SUSE Linux Products

  1. LINUX KERNEL & HARDWARE

    1. Hardware Discovery Tools
    2. Configuring New Hardware with hwinfo
    3. Hardware and System Clock
    4. Console
    5. Virtual Terminals
    6. Keyboard & locale configuration
    7. Serial Ports
    8. SCSI Devices
    9. USB Architecture
    10. Defining a Printer
    11. Tape Libraries
    12. Managing Linux Device Files
    13. Kernel Hardware Info – /sys/
    14. /sys/ Structure
    15. udev
    16. Kernel Modules
    17. Configuring Kernel Components and Modules
    18. Handling Module Dependencies
    19. Configuring the Kernel via /proc/
    20. Random Numbers and /dev/random
    21. System Tools

LAB TASKS

  1. Adjusting Kernel Options
  2. Linux Kernel Driver Compilation
  3. Configuring Print Queues
  4. Introduction to Troubleshooting Labs
  5. Troubleshooting Practice: Kernel Modules

  1. SYSTEMD OVERVIEW

    1. System Boot Method Overview
    2. systemd System and Service Manager
    3. Modifying systemd services
    4. Systemd Service Sandboxing Features
    5. systemd Targets
    6. Using systemd
    7. Linux Runlevels Aliases
    8. Legacy Support for SysV init

LAB TASKS

  1. Managing Services With Systemd’s systemctl
  2. Creating a systemd unit file

  1. GRUB2/SYSTEMD BOOT PROCESS

    1. Booting Linux on PCs
    2. GRUB 2
    3. GRUB 2 Configuration
    4. GRUB 2 Security
    5. Boot Parameters
    6. Initial RAM Filesystem
    7. init
    8. Systemd local-fs.target and sysinit.target
    9. Systemd basic.target and multi-user.target
    10. Legacy local bootup script support
    11. System Configuration Files
    12. RHEL7 Configuration Utilities
    13. SLES12 Configuration Utilities
    14. Shutdown and Reboot

LAB TASKS

  1. Boot Process
  2. Booting directly to a bash shell
  3. GRUB Command Line
  4. Basic GRUB Security
  5. Troubleshooting Practice: Boot Process

  1. SOFTWARE MAINTENANCE

    1. RPM Architecture
    2. Working With RPMs
    3. Querying and Verifying with RPM
    4. Updating the Kernel RPM
    5. Using the Yum command
    6. Using the Zypper command
    7. YUM package groups
    8. Zypper Services and Catalogs
    9. Configuring Yum
    10. YUM Repositories
    11. Rebuilding Source RPM Packages
    12. Software Tools Comparison Matrix

LAB TASKS

  1. Managing Software with RPM
  2. Creating a Custom RPM Repository
  3. Querying the RPM Database
  4. Installing Software via RPM & Source and Rebuilding SRPMs
  5. Using Yum
  6. Using Zypper

  1. LOCAL STORAGE ADMINISTRATION

    1. Partitioning Disks with fdisk & gdisk
    2. Resizing a GPT Partition with gdisk
    3. Partitioning Disks with parted
    4. Non-Interactive Disk Partitioning with sfdisk
    5. Filesystem Creation
    6. Mounting Filesystems
    7. Filesystem Maintenance
    8. Resizing Filesystems
    9. Managing an XFS Filesystem
    10. Swap
    11. Filesystem Attributes
    12. Filesystem Creation and Management

LAB TASKS

  1. Creating and Managing Filesystems
  2. Hot Adding Swap

  1. LVM & RAID

    1. Logical Volume Management
    2. Implementing LVM
    3. Creating Logical Volumes
    4. Activating LVM VGs
    5. Exporting and Importing a VG
    6. Examining LVM Components
    7. Changing LVM Components
    8. Advanced LVM Overview
    9. Advanced LVM: Components & Object Tags
    10. Advanced LVM: Automated Storage Tiering
    11. Advanced LVM: Thin Provisioning
    12. Advanced LVM: Striping & Mirroring
    13. Advanced LVM: RAID Volumes
    14. SLES Graphical Disk Tool
    15. RAID Concepts
    16. Array Creation with mdadm
    17. Software RAID Monitoring
    18. Software RAID Control and Display
    19. LVM and RAID: Unix Tool Comparison

LAB TASKS

  1. Creating and Managing LVM Volumes
  2. Creating LVM Thin Volumes
  3. Creating and Managing a RAID-5 Array

  1. REMOTE STORAGE ADMINISTRATION

    1. Remote Storage Overview
    2. Remote Filesystem Protocols
    3. Remote Block Device Protocols
    4. NFS Clients
    5. NFS Server Configuration
    6. Implementing NFSv4
    7. AutoFS
    8. AutoFS Configuration
    9. SAN Multipathing
    10. Multipath Configuration
    11. Multipathing Best Practices
    12. iSCSI Architecture
    13. Open-iSCSI Initiator Implementation
    14. iSCSI Initiator Discovery
    15. iSCSI Initiator Node Administration
    16. Mounting iSCSI Targets at Boot
    17. iSCSI Multipathing Considerations

LAB TASKS

  1. Using autofs
  2. NFS Server Configuration
  3. iSCSI Initiator Configuration

  1. USER/GROUP ADMINISTRATION

    1. Approaches to Storing User Accounts
    2. User and Group Concepts
    3. User Administration
    4. Modifying Accounts
    5. Group Administration
    6. Password Aging
    7. Default User Files
    8. Controlling Login Sessions
    9. RHEL DS Client Configuration
    10. SLES DS Client Configuration
    11. PAM Overview
    12. PAM Module Types
    13. PAM Order of Processing
    14. PAM Control Statements
    15. so
    16. so
    17. User/Group Administration Comparison Matrix

LAB TASKS

  1. User and Group Administration
  2. Using LDAP for Centralized User Accounts
  3. Troubleshooting Practice: Account Management
  4. Restricting superuser access to wheel group membership
  5. Setting Limits with the pam_limits Modules
  6. Using pam_limits to Restrict Simultaneous Logins

  1. SECURITY ADMINISTRATION