RED HAT ENTERPRISE LINUX FOR SOLARIS ADMINISTRATORS Training in West Haven

Enroll in or hire us to teach our RED HAT ENTERPRISE LINUX FOR SOLARIS ADMINISTRATORS class in West Haven, Connecticut by calling us @303.377.6176. Like all HSG classes, RED HAT ENTERPRISE LINUX FOR SOLARIS ADMINISTRATORS may be offered either onsite or via instructor led virtual training. Consider looking at our public training schedule to see if it is scheduled: Public Training Classes
Provided there are enough attendees, RED HAT ENTERPRISE LINUX FOR SOLARIS ADMINISTRATORS may be taught at one of our local training facilities.
We offer private customized training for groups of 3 or more attendees.

Course Description

 
This class teaches core Red Hat Enterprise Linux administration skills targeted for Solaris Administrators. Solaris Administrators will be able to leverage their administration experience to quickly get up to speed with Red Hat Enterprise Linux. Version: C02
Course Length: 3 Days
Course Tuition: $1290 (US)

Prerequisites

Unix administration experience.

Course Outline

 
  1. WHAT IS LINUX?
    1. Unix and its Design Principles
    2. FSF and GNU
    3. GPL – General Public License
    4. The Linux Kernel
    5. Linux Kernel and Versioning
    6. Components of a Distribution
    7. Slackware
    8. SUSE Linux Products
    9. Debian
    10. Ubuntu
    11. Red Hat Linux Products
    12. Oracle Linux
  2. LOGIN AND EXPLORATION
    1. Logging In
    2. Running Programs
    3. Interacting with Command Line
    4. Desktop Environments
    5. GNOME
    6. Starting X
    7. Gathering Login Session Info
    8. Gathering System Info
    9. uptime
    10. got root?
    11. Switching User Contexts
    12. sudo
    13. Help from Commands and Documentation
    14. whereis
    15. Getting Help Within the Graphical Desktop
    16. Getting Help with man & info
    LAB TASKS
    1. Login and Discovery
    2. Help with Commands
    3. Switching Users With su
  3. THE LINUX FILESYSTEM
    1. Filesystem Support
    2. Unix/Linux Filesystem Features
    3. Filesystem Hierarchy Standard
    4. Navigating the Filesystem
    5. Displaying Directory Contents
    6. Filesystem Structures
    7. Determining Disk Usage With df and du
    8. Determining Disk Usage (GUI)
    9. Disk Usage with Quotas
    10. File Ownership
    11. Default Group Ownership
    12. File and Directory Permissions
    13. File Creation Permissions with umask
    14. SUID and SGID on files
    15. SGID and Sticky Bit on Directories
    16. Changing File Permissions
    17. User Private Group Scheme
    LAB TASKS
    1. Navigating Directories and Listing Files
    2. Disk and Filesystem Usage
    3. File and Directory Ownership and Permissions
    4. Introduction to Troubleshooting Labs
    5. Troubleshooting Practice: Filesystem
  4. MANIPULATING FILES
    1. Directory Manipulation
    2. File Manipulation
    3. Deleting and Creating Files
    4. Managing Files Graphically
    5. Drag and drop with Nautilus
    6. Physical Unix File Structure
    7. Filesystem Links
    8. File Extensions and Content
    9. Displaying Files
    10. Previewing Files
    11. Producing File Statistics
    12. Displaying Binary Files
    13. Searching the Filesystem
    14. Alternate Search Method
    LAB TASKS
    1. Manipulating Files and Directories
    2. File Examination & Search Commands
  5. SHELL BASICS
    1. Role of Command Shell
    2. Communication Channels
    3. File Redirection
    4. Piping Commands Together
    5. Filename Matching
    6. File Globbing and Wildcard Patterns
    7. Brace Expansion
    8. Shell and Environment Variables
    9. Key Environment Variables
    10. Which and Type
    11. General Quoting Rules
    12. Nesting Commands
    LAB TASKS
    1. Redirection and Pipes
    2. Wildcard File Matching
    3. Shell Variables
    4. Shell Meta-Characters
    5. Command Substitution
  6. TEXT PROCESSING
    1. Searching Inside Files
    2. The Streaming Editor
    3. Text Processing with Awk
    4. Replacing Text Characters
    5. Text Sorting
    6. Duplicate Removal Utility
    7. Extracting Columns of Text
    8. Combining Files and Merging Text
    9. Comparing File Changes
    LAB TASKS
    1. Processing Text Streams
    2. Text Processing
  7. TEXT EDITING
    1. Text Editing
    2. Pico/GNU Nano
    3. Pico/Nano Interface
    4. Nano configuration
    5. Pico/Nano Shortcuts
    6. vi and Vim
    7. Learning Vim
    8. Basic vi
    9. Intermediate vi
    LAB TASKS
    1. Text Editing with Nano
    2. Text Editing with Vim
  8. SYSTEMD OVERVIEW
    1. System Boot Method Overview
    2. systemd System and Service Manager
    3. systemd Targets
    4. Using systemd
    5. Linux Runlevels Aliases
    6. Legacy Support for SysV init
    LAB TASKS
    1. Managing Services With Systemd's systemctl
    2. Creating a systemd unit file
  9. GRUB2/SYSTEMD BOOT PROCESS
    1. Booting Linux on PCs
    2. GRUB 2
    3. GRUB 2 Configuration
    4. GRUB 2 Security
    5. Boot Parameters
    6. Initial RAM Filesystem
    7. init
    8. Systemd local-fs.target and sysinit.target
    9. Systemd basic.target and multi-user.target
    10. Legacy local bootup script support
    11. System Configuration Files
    12. RHEL7 Configuration Utilities
    13. Shutdown and Reboot
    LAB TASKS
    1. Boot Process
    2. Booting directly to a bash shell
    3. GRUB Command Line
    4. Basic GRUB Security
    5. Troubleshooting Practice: Boot Process
  10. MANAGING SOFTWARE
    1. Downloading with FTP
    2. FTP
    3. lftp
    4. Command Line Internet – Non-interactive
    5. Command Line Internet – Interactive
    6. Managing Software Dependencies
    7. Using the Yum command
    8. Using Yum history
    9. YUM package groups
    10. Configuring Yum
    11. yumdownloader
    12. Popular Yum Repositories
    LAB TASKS
    1. Command Line File Transfers
    2. Using Yum
    3. Managing Yum Repositories
  1. ROSETTA STONE
    1. System Tools
    2. Software Tools Comparison Matrix
    3. Filesystem Creation and Management
    4. LVM and RAID: Unix Tool Comparison
    5. User/Group Administration Comparison Matrix
    6. (X)INETD and Firewalls
    7. Network Configuration Tools
    8. Process Tools
  2. SYSTEM OVERVIEW
    1. Components of a Distribution
    2. Red Hat Linux Products
    3. Getting Help Within the Graphical Desktop
    4. Getting Help with man & info
    5. Help from Commands and Documentation
    6. Red Hat Online Documentation
    LAB TASKS
    1. Help with Commands
  3. SYSTEM CONFIGURATION
    1. Logging In
    2. Console
    3. Virtual Terminals
    4. Keyboard & locale configuration
    5. Desktop Environments
    6. GNOME
    7. Display Managers and Graphical Login
    8. X Access Control
    9. Remote X Access (historical/insecure)
    10. Remote X Access (modern/secure)
    11. XDMCP
    12. Remote Graphical Access With VNC and RDP
    13. Secure Shell
    14. ssh and sshd Configuration
    15. Accessing Remote Shells
    16. Transferring Files
    17. Alternative sftp Clients
    18. SSH Key Management
    19. ssh-agent
    LAB TASKS
    1. Login and Discovery
    2. Remote X with XDMCP
    3. Configure X Security
    4. Configure a VNC Server
    5. Introduction to ssh and scp
    6. SSH Key-based User Authentication
    7. Using ssh-agent
  4. SYSTEM INITIALIZATION, SERVICES, AND SHUTDOWN
    1. Booting Linux on PCs
    2. GRUB 2 Configuration
    3. Boot Parameters
    4. Initial RAM Filesystem
    5. Kernel Modules
    6. Configuring Kernel Components and Modules
    7. Handling Module Dependencies
    8. init
    9. Linux Runlevels Aliases
    10. Systemd local-fs.target and sysinit.target
    11. System Configuration Files
    12. RHEL7 Configuration Utilities
    13. Typical SysV Init Script (legacy)
    14. Legacy local bootup script support
    15. Managing SysV Init Daemons (legacy)
    16. Controlling SysV Init Service Startup (legacy)
    17. Shutdown and Reboot
    LAB TASKS
    1. Boot Process
    2. GRUB Command Line
    3. Basic GRUB Security
    4. Introduction to Troubleshooting Labs
    5. Troubleshooting Practice: Boot Process
    6. Troubleshooting Practice: Kernel Modules
  5. SOFTWARE AND UPDATE MANAGEMENT
    1. Managing Software
    2. RPM Features
    3. RPM Architecture
    4. RPM Package Files
    5. Working With RPMs
    6. Querying and Verifying with RPM
    7. Updating the Kernel RPM
    8. Managing Software Dependencies
    9. Using the Yum command
    10. YUM package groups
    11. Configuring Yum
    12. Yum Plugins & RHN Subscription Manager
    13. YUM Repositories
    LAB TASKS
    1. Managing Software with RPM
    2. Managing Yum Repositories
    3. Using Yum
    4. Creating a Custom RPM Repository
  6. SPECIAL DEVICES
    1. Partitioning Disks with fdisk & gdisk
    2. Resizing a GPT Partition with gdisk
    3. Partitioning Disks with parted
    4. Filesystem Creation
    5. Swap
    6. Logical Volume Management
    7. Implementing LVM
    8. Creating Logical Volumes
    9. Activating LVM VGs
    10. Exporting and Importing a VG
    11. Examining LVM Components
    12. Changing LVM Components
    13. Advanced LVM Overview
    14. Advanced LVM: Components & Object Tags
    15. Advanced LVM: Automated Storage Tiering
    16. Advanced LVM: Thin Provisioning
    17. Advanced LVM: Striping & Mirroring
    18. Advanced LVM: RAID Volumes
    19. gnome-disk-utility
    20. Remote Storage Overview
    21. Remote Filesystem Protocols
    22. Remote Block Device Protocols
    23. SAN Multipathing
    24. Multipath Configuration
    25. Multipathing Best Practices
    26. iSCSI Architecture
    27. Open-iSCSI Initiator Implementation
    28. iSCSI Initiator Discovery
    29. iSCSI Initiator Node Administration
    30. Mounting iSCSI Targets at Boot
    31. iSCSI Multipathing Considerations
    LAB TASKS
    1. Creating and Managing Filesystems
    2. Hot Adding Swap
    3. Creating and Managing LVM Volumes
    4. iSCSI Initiator Configuration
  7. FILE SYSTEMS
    1. Mounting Filesystems
    2. Filesystem Maintenance
    3. Persistent Block Devices
    4. Resizing Filesystems
    5. Managing an XFS Filesystem
  8. SECURITY AND AUTHENTICATION
    1. Netfilter: Stateful Packet Filter Firewall
    2. Netfilter Concepts
    3. Using the iptables Command
    4. Netfilter Rule Syntax
    5. Targets
    6. Common match_specs
    7. Connection Tracking
    8. SELinux Security Framework
    9. Choosing an SELinux Policy
    10. SELinux Commands
    11. SELinux Booleans
    12. SELinux Policy Tools
    LAB TASKS
    1. Securing Services with Netfilter
    2. Troubleshooting Practice
    3. SELinux File Contexts
  9. SYSTEM MONITORING
    1. System Logging
    2. Syslog-ng
    3. Rsyslog
    4. /etc/rsyslog.conf
    5. Log Management
    6. Log Anomaly Detector
    7. System Status – Memory
    8. System Status – I/O
    9. System Status – CPU
    10. Performance Trending with sar
    11. Process Accounting
    12. strace and ltrace
    LAB TASKS
    1. Setting up a Full Debug Logfile
    2. Remote Syslog Configuration
    3. Using BSD Process Accounting
  10. ENTERPRISE DEPLOYMENT
    1. Kickstart
    2. Anaconda: An Overview
    3. Anaconda: Booting the System
    4. Anaconda: Common Boot Options
    5. Anaconda: Loading Anaconda and Packages
    6. Anaconda: Storage Options
    7. Anaconda: Troubleshooting

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Linux Unix Uses & Stats

Linux Unix is Used For:
Desktop Mainframe Computers Mobile Devices Embedded Devices
Difficulty
Popularity
Year Created
1991/1971
Pros
Performance:
Linux supports many efficient tools and operates them seamlessly. Because it's architecture is lightweight it runs faster than both Windows 8.1 and 10. 
 
Security:
Because Linux is an open-source software,  anyone can contribute code to help enhance the users’ experience i.e., adding features, fixing bugs, reducing security risks, and more.
 
 
Software Development:
The terminal in Linux is a *wild card*. You can do almost anything with it. This includes software installation, application and server configurations, file system management, and etc.
 
Large-scale:
Open-source projects benefit from having an attentive community. As a result, Linux is more secure than Windows. Instead of installing anti viruses to clean malware, you just have to stick to the recommended repositories. 
 
Efficient: 
Developers have the convenience of running servers, training machine learning models, accessing remote machines, and compiling and running scripts from the same terminal window. 
 
Free: 
Linux is free (you can put it on as many systems as you like) and you can change it to suit your needs.
Cons
Learning Curve: 
Linux is not for everyone, there is a learning curve in switching to Ubuntu. To actually learn Linux efficiently would take a user one to several years.
 
No Tech Support:
Unlike Windows, there isn’t a dedicated tech support, so getting help for things is up to you. 
 
Designer Compatabilty:
Linux is not as user friendly as Windows or as ‘straight out of the box design’ As an example for design choices, Adobe hasn’t released any of its products to Linux users. So it’s impossible to run them directly. The Ubuntu alternative is a free software called GIMP. 
 
Gaming Capabilities: 
Most games aren’t available in Linux. But that’s not to say you can’t make it happen, it's just not as easy.   
Linux Unix Job Market
Average Salary
$85k-$105k
Job Count
n/a
Top Job Locations

New York City
Boston
San Francisco 

Complimentary Skills to have along with Linux Unix
The following are types of jobs that may require Linux skills.  The top 15 job titles on Dice.com that mention Linux in their postings are:
- DevOps Engineer
- Software Engineer
- Java Developer
- Systems Engineer
- Systems Administrator
- Senior Software Engineer
- Network Engineer
- Python Developer
- Linux Systems Administrator
- Software Developer
- System Administrator
- Linux Administrator
- Linux Engineer
- Senior Java Developer
- C++ Developer

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.