25,000+ Courses Nationwide
0345 4506120

Administering Red Hat Linux 7 - Part 3

This highly practical instructor led Red Hat 7 System Administration - Part 3 training course is designed to give the delegate practical experience in the areas of networking, security, basics of shell scripting and AWK as well as MariaDB incorporating MySQL commands.

With a strong emphasis on practical hands-on training, this course will teach the essential network, security and shell scripting tasks required on a Red Hat Linux system.

The delegate will learn modern system administration techniques and commands to administer a Red Hat Linux system to an advanced level. The command line is demonstrated and used extensively throughout the course.

Exercises and examples are used throughout the course to give practical hands-on experience with the techniques covered.

Who will the Course Benefit?

The Red Hat 7 System Administration - Part 3 course is designed for System Administrators and Programmers and other technical IT staff who need to acquire knowledge of the key networking, security and scripting tasks required to administer a Linux system.

This course would also benefit experienced system administrators familiar with Unix and other Linux distributions who wish to gain knowledge to administer Red Hat Linux systems.

Select specific date to see price, venue and full details.

Learning Objectives

On completion of this Red Hat 7 System Administration - Part 3 course, the delegate will have gained practical knowledge to be able to perform advanced administration of networking facilities, securing the system and the use of scripting on a Red Hat Linux system.

The delegate will learn and acquire skills as follows:

  • Creating systemd units
  • Network management and IPv6 addressing
  • Configuring aggregated network links (teaming) and bridging
  • Network monitoring with tcpdump and Wireshark
  • Wireshark filters and expert information
  • Configuring SELinux and the primary SELinux commands
  • Creating, editing and installing SELinux modules
  • Configuring a secure firewall
  • Creating firewall zones and services
  • Configuring a DNS server
  • Configuring an iSCSI Target and Initiator
  • Configuring and securing a Network Time server
  • Sudo configuration, Sudoedit and Sudoreplay
  • Configuring a Kerberos server and client
  • Creating and converting RAID arrays
  • Configuring a Postfix mail server
  • Understand encryption techniques
  • Configuring HTTP/HTTPS servers using TLS
  • Installing, configuring and backing-up a MariaDB database
  • AWK scripting, pattern matching and arithmetic operations
  • Creating conditional shell scripts and loops to automate tasks
  • Installing and running Docker containers

Pre-Requisites

The delegate should be competent with common command line tools, vi/vim editor, using system and basic SELinux commands. They should also be capable of creating client access to NFS and CIFS, as well as basic networking, firewalls and scheduling automated tasks.

The requirements for this course can be met by either of the pre-requisite courses listed.

Pre-Requisite Courses

  • Red Hat 7 System Administration - Part 2
  • FastTrack Red Hat 7 System Administrator

Course Content

DAY 1   

Course Introduction

  • Administration and Course Materials
  • Course Structure and Agenda
  • Delegate and Trainer Introductions

Session 1: SYSTEMD UNITS

  • systemd Wants and Requires
  • Creating systemd service and timer units
  • Creating systemd mount units
  • Useful systemd related utilities
  • Exercise

Session 2: NETWORK MANAGEMENT AND IPV6

  • Routing under Linux
  • ip suite of programs
  • Configuring network cards and Routing
  • Configuring the system as a Gateway
  • IPv6 Addressing
  • Local Network Bridges
  • Configure Ethernet Bonding (Link aggregation, teaming)
  • Exercise

Session 3: NETWORK MONITORING

  • Capturing packets with tcpdump
  • Wireshark Introduction
  • Filtering with Wireshark
  • Filtering IPv6 traffic
  • Wireshark Expert Information
  • Exercise

Session 4: SELINUX

  • DAC vs MAC
  • SELinux Policy
  • SELinux Contexts
  • SELinux Key Commands
  • Viewing SELinux Decisions
  • SELinux Booleans
  • permissive and unconfined Domains
  • Exporting SELinux Configuration
  • Exercise

Session 5: SELINUX MODULES

  • SELinux Entities
  • Object Classes
  • SELinux Modules
  • Administering Modules
  • Creating Modules with audit2allow
  • Writing SELinux Modules
  • Type Enforcement File
  • Exercise

Session 6: RED HAT FIREWALL

  • Firewalld Overview
  • Firewalld vs IPTables
  • Firewall Zones
  • Configuring Firewall
  • Creating a Firewall Service
  • Configuring Firewall Zones
  • Rich Rules
  • Exercise

Session 7: DOMAIN NAME SERVER (DNS)

  • The DNS/BIND system under Red Hat Linux
  • Name Server Hierarchy
  • Setting up DNS
  • Master/Slave Zones
  • Reverse lookup Zones
  • Record types and their syntax
  • Name Daemon Control Utility (rndc)
  • Address Match Lists (acl)
  • Configuring a Caching Only Name Server
  • DNS in a chroot environment
  • Testing a DNS server
  • Exercise

Session 8: CENTRALISED AND SECURE STORAGE

  • iSCSI Overview
  • Setting up iSCSI Target and Initiator
  • Accessing centralised storage
  • Accessing encrypted file systems
  • Exercise

Session 9: CONFIGURING NETWORK TIME PROTOCOL

  • Configuring Time Synchronisation
  • Stratum Levels
  • Choosing a time source
  • Choosing an NTP Service
  • Chrony Client Configuration
  • chronyc command
  • Configuring a Chrony Server
  • Chrony Security
  • Exercise

Session 10: SUDO

  • Running commands with Sudo
  • Sudo options and tags
  • Sudo logging and replay
  • Include statements
  • Exercise

Session 11: KERBEROS

  • Configuring a Kerberos 5 server
  • Configuring a Kerberos client
  • Configuring SSH to use Kerberos
  • Exercise

Session 12: RAID ARRAYS

  • Creating RAID arrays
  • Converting RAID 5 to RAID 6
  • Hot swapping failed drives
  • Removing a RAID device
  • Exercise

Session 13: POSTFIX MAIL SERVER CONFIGURATION

  • Mail commands
  • Mail User, Mail Transport and Mail User Agents
  • Postfix Configuration
  • Configuring a null client using Postfix
  • Dovecot - POP and IMAP services
  • Exercise

Session 14: SSL, TSL AND WEB SERVICE CONFIGURATION

  • Data Security and Encryption
  • Public Key Encryption
  • Configuring Virtual Hosts : Name And IP Based Access
  • Displaying Apache Web Server Information and Status
  • Dynamic Virtual hosts
  • Configuring HTTPS
  • Signed Certificates
  • Apache SSL Configuration File
  • HTTPS Virtual Hosts
  • Exercise

Session 15: CONFIGURING A MARIADB DATABASE

  • Install and configure MariaDB
  • Backup and Restore a database
  • Create a simple database schema
  • Perform simple SQL queries on the database
  • Exercise

Session 16: AWK FUNDAMENTALS

  • AWK usage statements
  • AWK scripts
  • AWK variables
  • Pattern matching with AWK
  • AWK Operators
  • Exercise

Session 17: SHELL SCRIPTING

  • What is a shell script?
  • Creating and executing shell scripts
  • User interaction
  • Command line arguments
  • Exercise

Session 18: CONDITIONAL SHELL SCRIPTING

  • Decision constructs using the 'if' statement
  • Case statement
  • Looping constructs: for/while/until
  • Automating administrative tasks
  • Exercise

Session 19: DOCKER CONTAINERS

  • Container Overview
  • Linux containers vs KVM virtualization
  • Downloading and running Docker containers

Notes:

  • Course technical content is subject to change without notice.
  • Course content is structured as sessions, this does not strictly map to course timings. Concepts, content and practicals often span sessions.

Follow-On Courses

  • Linux Automation with Ansible
  • Red Hat System Security
  • Red Hat Networking
  • Linux Shell Programming
  • Linux Advanced Shell Programming Tools
  • Apache Web Server

Related Courses

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the requested service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.

 

We work with the best