Linux for Unix Administrators Training in Revere

Enroll in or hire us to teach our Linux for Unix Administrators class in Revere, Massachusetts by calling us @303.377.6176. Like all HSG classes, Linux for Unix Administrators may be offered either onsite or via instructor led virtual training. Consider looking at our public training schedule to see if it is scheduled: Public Training Classes
Provided there are enough attendees, Linux for Unix Administrators may be taught at one of our local training facilities.

Answers to Popular Questions:

 
Yes, this class can be tailored to meet your specific training needs.
Yes, we provide Linux Unix consulting services.
Yes, group discounts are provided.

Course Description

 
A fast paced 5-day course that is a combination of "Enterprise Linux Systems Administration", and "Enterprise Linux Networking Services.â?? Particular focus is given to translating Solaris and HP-UX skills to Linux.
Course Length: 5 Days
Course Tuition: $2090 (US)

Prerequisites

A good understanding of network concepts, the TCP/I P protocol suite, and basic UNIX security is also assumed.

Course Outline

 

1. Linux Hardware Discovery, Interaction and Control
Hardware Discovery Tools
Configuring New Hardware with h
winfo
Hardware and System Clock
Console
Virtual Terminals
Serial Ports
SCSI Devices
USB Configuration
Defining a Printer
Tape Libraries
Managing Linux Device Files
Kernel Hardware Info-/sys/
/sys/ Structure
udev
Kernel Modules
Configuring Kernel Components and
Modules
Handling Module Dependencies
Configuring the Kernel via /proc/
System Tools

2. Boot Process and SYSV INIT
Booting Linux on PCs
GRUB Configuration
Boot Parameters
/sbin/init
/etc/inittab
/etc/rc.d/rc.sysinit
SUSE /etc/init.d/boot
Runlevel Implementation
System Configuration Files
RHEL6 Configuration Utilities
SLES11 Configuration Utilities
Typical SysV I
nit Script
The /etc/rc.local File
The /etc/init.d/*.local Files
Managing Daemons
Controlling Service Startup
Shutdown and Reboot
Run Level and Kernel Information

3. Software Maintenance
RPM Features
RPM Architecture
Working with RPMs
Querying and Verifying with rpm
Updating the Kernel RPM
Using the YUM command
Using the Zypper command
YUM package groups
Zypper Services and Catalogs
Configuring YUM
YUM Repositories
Installing Source RPM Packages
Software Tools Comparison Matrix

4. FileSystem Administration
Partitioning Disks with fdisk
Partitioning Disks with parted
Filesystem Creation
Mounting Filesystems
Filesystem Maintenance
Resizing Filesystems
Swap
Configuring Disk Quotas
Setting Quotas
Viewing and Monitoring Quotas
Filesystem Attributes
Backup Software
Backup Examples
Filesystem Creation and Management

5. LVM & RAID
Logical Volume Management
Implementing LVM
Creating Logical Volumes
Manipulating VGs & LVs
Advanced LVM Concepts
system-config-lvm
SLES Graphical Disk Tool
RAID Concepts
Array Creation with mdadm
Software RAID Monitoring
Software RAID Control and Display
LVM and RAID: Unix Tool Comparison

6. Remote Storage Administration
Remote Storage Overview
Remote Filesystem Protocols
Remote Block Device Protocols
File Sharing via NFS
NFSv4
NFS Clients
NFS Server Confi
guration
Implementing NFSv4
AutoFS
AutoFS Configuration
Accessing Windows/Samba Shares from
Linux
SAN Multipathing
Multipath Configuration
Multipathing Best Practices
iSCSI Architecture
Open-iSCSI Initiator Implementation
iSCSI Initiator Discovery
iSCSI Initiator Node Administration
Mounting iSCSI Targets at Boot
iSCSI Multipathing Considerations

7. User/Group Administration
User and Group Concepts
User Administration
Modifying Accounts
Group Administration
Password Aging
Default User Files
Controlling Logins
System Security Services
Daemon (SSSD)
Manual DS Client Configuration
system-config-authentication
SLES Graphical DS Client
Configuration
PAM Overview
PAM Module Types
PAM Order of Processing
PAM Control Statements
pam_wheel.so
pam_limits.so
User/Group Administration
Comparison Matrix

8. Security Administration
Security Concepts
Tightening Default Security
Security Advisories
File Access Control Lists
Manipulating FACLs
Viewing FACLs
Backing Up FACLs
File Creation Permissions with umask
User Private Group Scheme
Alternatives to UPG
TCP Wrappers Concepts
Xinetd
Basic Firewall Activation
Netfilter Concepts
Using the iptables Command
Common match_specs
Connection Tracking
AppArmor
SELinux Security Framework
SELinux Modes
SELinux Commands
Choosing an SELinux Policy
SELinux Booleans
SELinux Policy Tools
(X)INETD and Firewalls

9. Process Administration
Automating Tasks
at & cron Usage
Anacron
Viewing Processes
Managing Processes
Tuning Process Scheduling
Process Accounting
Setting Resource Limits via ulimit

10. Networking
Linux Network Interfaces
Ethernet Hardware Tools
Network Configuration with ip Command
Configuring Routing Tables
IP to MAC Address Mapping with ARP
Starting and Stopping Interfaces
NetworkManager
DNS Clients
DHCP Clients
Network Diagnostics
Information from netstat and ss
Managing Network-Wide Time
Continual Time Sync with NTP
Configuring NTP Clients
Multiple IP Addresses
Enabling IPv6
Interface Bonding
Interface Bridging
802.1q VLANS
Tuning Kernel Network Settings
Network Configuration Tools

11. Monitoring & Troubleshooting
System Status-Memory
System Status-I/O
System Status-CPU
Performance Trending with sar
Troubleshooting Basics: The Process
Troubleshooting Basics: The Tools
System Logging
Syslog-ng
Rsyslog
/etc/rsyslog.conf
Log Management
Log Anomaly Detector
strace and ltrace
Common Problems
Troubleshooting Incorrect File Permissions
Inability to Boot
Typos in Configuration Files
Corrupt Filesystems
RHEL6 Rescue Environment
SUSE Rescue Environment
Process Tools

12. The X Window System
X Modularity
X.Org Drivers
Configuring X Manually
Automatic X Configuration
Automatic X Configuration-SLES
The X11 Protocol and Display Names
Display Managers and Graphical Login
Starting X Apps Automatically
X Access Control
Remote X Access (historical/insecure approach)
Remote X Access (modern/secure approach)
XDMCP
Remote Graphical Access With
VNC and RDP
Specialized X Servers
Enabling the Graphical User Interface

13. Bind Concepts and Configuration
The Domain Name Space
Delegation and Zones
Server Roles
Resolving Names
Resolving IP Addresses
Basic BIND Administration
Configuring the Resolver
Testing Resolution
rndc Key Configuration
BIND Configuration Files
named.conf Syntax
named.conf Options Block
Creating a Site-Wide Cache
Zones In named.conf
Zone Database File Syntax
SOA-Start of Authority
A & PTR – Address & Pointer
Records NS-Name Server
CNAME & MX-Alias & Mail Host
Abbreviations and Gotchas
$GENERATE, $ORIGIN, and $INCLUDE

14. OPENLDAP
OpenLDAP: Server Architecture
OpenLDAP: Backends
OpenLDAP: Replication
OpenLDAP: Configuration Options
OpenLDAP: Configuration Sections
OpenLDAP: Global Parameters
OpenLDAP: Database Parameters
OpenLDAP Server Tools
OpenLDAP Client Tools
LDIF: LDAP Data Interchange Format
Enabling LDAP-based Login
System Security Services Daemon (SSSD)

15. Using VSFTPD and APACHE
vsftpd
Anonymous FTP with vsftpd
Configuring vsftpd
HTTP Operation
Apache Architecture
Apache Configuration Files
httpd.conf-Server Settings
httpd.conf-Main Configuration
httpd.conf-VirtualHost Configuration
Virtual Hosting DNS Implications
Dynamic Shared Objects
Adding Modules to Apache
Apache Logging
Log Analysis

16. APACHE Security
Delegating Administration
Directory Protection
Directory Protection with
AllowOverride
Common Uses for .htaccess
Symmetric Encryption
Algorithms
Asymmetric Encryption
Algorithms
Digital Certificates
SSL Using mod_ssl.so

17. The Squid Proxy Server
Squid Overview
Squid
File Layout
Squid Access Control Lists
Applying Squid ACLs
Tuning Squid & Configuring
Cache Hierarchies
Bandwidth Metering
Monitoring Squid
Proxy Client Configuration

18. Samba Concepts and Configuration
Introducing Samba
Samba Daemons
NetBIOS and NetBEUI
Accessing Windows/Samba
Shares from Linux
Samba Utilities
Samba Configuration Files
The smb.conf File
Mapping Permissions and ACLs
Mapping Linux Concepts
Mapping Case Sensitivity
Sharing Home Directories
Sharing Printers
Share Authentication
Share-Level Access
User-Level Access
Mapping Users
Samba Account Database
User Share Restrictions

19. Postfix
Postfix Features
Postfix Components
Postfix Configuration
master.cf
main.cf
Postfix Map Types
Postfix Pattern Matching
Virtual Domains
Postfix Mail Filtering
Configuration Commands
Management Commands
Postfix Logging
SMTP AUTH Server and R
elay Control
SMTP AUTH Clients
TLS Server Configuration
Postfix Client Configuration for TLS
Ensuring TLS Security

20. Mail Services and Retrieval
Procmail
SpamAssassin
amavisd-new Mail Filtering
Accessing Email
The IMAP4 Protocol
Cyrus IMAP/POP3 Server
Cyrus IMAP MTA Integration
Cyrus Mailbox Administration

21. Installing RHEL6
Anaconda: An Overview
Anaconda: Booting the System
Anaconda: Common Boot Options
Anaconda: Loading Anaconda and Packages
Anaconda: Storage Options
Anaconda: Troubleshooting
FirstBoot
Kickstart
A Typical Install

22. Installing SLES11
YaST Install Program Interface
Network Installation
SLP for SUSE Linux Installation
Installation Choices
Kernel Crash Dump Configuration
Creating AutoYaST2 Files
Using AutoYaST2 files
linuxrc Automation
Installation Diagnostics
After The First Reboot
A Typical Install

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Linux Unix Uses & Stats

Linux Unix is Used For:
Desktop Mainframe Computers Mobile Devices Embedded Devices
Difficulty
Popularity
Year Created
1991/1971
Pros
Performance:
Linux supports many efficient tools and operates them seamlessly. Because it's architecture is lightweight it runs faster than both Windows 8.1 and 10. 
 
Security:
Because Linux is an open-source software,  anyone can contribute code to help enhance the users’ experience i.e., adding features, fixing bugs, reducing security risks, and more.
 
 
Software Development:
The terminal in Linux is a *wild card*. You can do almost anything with it. This includes software installation, application and server configurations, file system management, and etc.
 
Large-scale:
Open-source projects benefit from having an attentive community. As a result, Linux is more secure than Windows. Instead of installing anti viruses to clean malware, you just have to stick to the recommended repositories. 
 
Efficient: 
Developers have the convenience of running servers, training machine learning models, accessing remote machines, and compiling and running scripts from the same terminal window. 
 
Free: 
Linux is free (you can put it on as many systems as you like) and you can change it to suit your needs.
Cons
Learning Curve: 
Linux is not for everyone, there is a learning curve in switching to Ubuntu. To actually learn Linux efficiently would take a user one to several years.
 
No Tech Support:
Unlike Windows, there isn’t a dedicated tech support, so getting help for things is up to you. 
 
Designer Compatabilty:
Linux is not as user friendly as Windows or as ‘straight out of the box design’ As an example for design choices, Adobe hasn’t released any of its products to Linux users. So it’s impossible to run them directly. The Ubuntu alternative is a free software called GIMP. 
 
Gaming Capabilities: 
Most games aren’t available in Linux. But that’s not to say you can’t make it happen, it's just not as easy.   
Linux Unix Job Market
Average Salary
$85k-$105k
Job Count
n/a
Top Job Locations

New York City
Boston
San Francisco 

Complimentary Skills to have along with Linux Unix
The following are types of jobs that may require Linux skills.  The top 15 job titles on Dice.com that mention Linux in their postings are:
- DevOps Engineer
- Software Engineer
- Java Developer
- Systems Engineer
- Systems Administrator
- Senior Software Engineer
- Network Engineer
- Python Developer
- Linux Systems Administrator
- Software Developer
- System Administrator
- Linux Administrator
- Linux Engineer
- Senior Java Developer
- C++ Developer

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.