0% found this document useful (0 votes)
39 views3 pages

Linux System Adminstration 21 Days

The 'Linux System Administration in 21 Days' course is designed to provide comprehensive training in Linux system administration over a duration of 52 hours, with various session formats. The curriculum covers topics such as installation, user and group management, file permissions, networking, security, and scripting, structured across 21 days. Each day focuses on specific skills and concepts essential for effective Linux administration.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views3 pages

Linux System Adminstration 21 Days

The 'Linux System Administration in 21 Days' course is designed to provide comprehensive training in Linux system administration over a duration of 52 hours, with various session formats. The curriculum covers topics such as installation, user and group management, file permissions, networking, security, and scripting, structured across 21 days. Each day focuses on specific skills and concepts essential for effective Linux administration.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Linux System Administration in 21 Days

This course is focused on:


 System Administration

Course Duration:
• 52 Hours, 2 Hours per sessions (weekly 2 Days)
• 52 Hours, 13 Classes, 4 Hours per class (weekly 1 Day)
Day 1: Introduction to UNIX & LINUX Day 07: User and Group Administration
▪ Introduction to Operating Systems • Users and Groups Introduction
▪ Parts of Operating System • Linux User Types and Database
▪ Kernel, Shell & File • Primary Groups and Supplementary Groups
▪ History of UNIX and LINUX • Gaining Super user Access
▪ Linux and GNU Project • Running commands as root with SUDO
▪ Basic Concepts of Linux • Managing Local User Accounts
▪ Identification of various Linux distributors • Managing Local Group Accounts
▪ Working with RHEL/CentOS Distributions • Managing User Passwords
• Managing User's Password Aging
Day 2: Preparing RHEL 9 Installation & Lab Setup
▪ Planning a RHEL/CentOS Stream 9 Installation
Day 08: Linux File Permissions and ACL
▪ System Requirements & Capabilities • Explore Linux File & Directory Types
▪ Download RHEL/CentOS Stream 9 OS • Linux standard file permissions
▪ Preparing Installation Media (DVD/ISO/USB) • Hard Link and Soft Link concepts
▪ RHEL 9 Installation Method (MBR & GPT) • Viewing File/Directory Permission and Ownership
▪ Required Partitions for RHEL 9 Installation • Linux User, Group and Other permission Concept
▪ Linux Lab Setup Concept (Virtual & Physical) • Set permission using read, write and execute
▪ Building home Lab using VMware Workstation • Linux Special Permissions SUID, SGID, Sticky bit
• Securing Files with ACLs
Day 3: RHEL 9 Installations & Basic Configure • Creating, modifying and deleting ACL’s

▪ Introduction to VMware Workstation Day 09: Linux Boot, Process and Services
▪ Introduction Virtualization Technology
▪ Create VM on VMware Workstation for RHEL 9 ▪ Step by step Linux booting procedures
▪ Installation of RHEL on VMware Workstation ▪ Explain and Controlling the Boot Process
▪ Install RHEL instance of AWS cloud ▪ Working with GRUB2 Boot loader
▪ Configure BIOS/UEFI options for OS booting ▪ Working with Linux Kernel (CentOS)
▪ Details discussion about OS booting options ▪ Update Linux Kernel (CentOS)
▪ Details discussion about Installation Summary ▪ Introducing RHEL Systemd
▪ Linux Installation Method (MBR and GPT) ▪ Controlling RHEL daemon & Services
▪ Configure Post installation on RHEL 9 ▪ Enabling/Disabling System Daemons at boot
▪ Recovering Root Password
Day 04: Getting started with Linux ▪ Linux process management introduction
▪ Parent processes and child processes
▪ The GNOME Desktop Environment
▪ Working with terminal and command console
▪ System process and user processes
▪ Introduction to Linux shells and terminal
▪ Details explain of "TOP" command
▪ Linux Virtual Console/Terminal
▪ Graphical process monitoring system
▪ Logging remote system through SSH
▪ Background and Foreground Processes
▪ Logging web interface using cockpit
▪ Controlling jobs using ‘bg’, ‘fg’, ‘ctrl+z’, ‘ctrl+c’
▪ Linux Command Syntax, Options, Argument
▪ Monitoring & Killing Process Activities
▪ Examples of Simple Commands
▪ Process priority and 'nice' concepts
▪ Powering Off, Reboot and Logout System
▪ Managing priority of Linux Process
▪ Linux Directory & File System introduction
▪ Navigating Linux Directory Paths
Day 10: RHEL 9 File Systems Management
▪ Command-line File & Directory Management • Identifying File Systems and Devices
▪ Files & Directory handling commands • Understanding Linux file systems
• Managing MBR Partitions with 'fdisk'
Day 05: Linux Text Processing Tools • Managing GPT Partitions with 'gdisk'
▪ Standard Input, Output and Error Concept • Creating File System (xfs, ext4, swap)
▪ Redirecting Output to a File • Mount Points and ‘/etc/fstab’ - Details
▪ Constructing and Using Pipelines • Mounting and Un-mounting File Systems
▪ Working with tail, head, cat, less, wc, echo • Working with USB, DVD, ISO Devices
▪ Working with Regular Expressions 'grep'
▪ Familiar with Linux 'find', ' and 'locate'
Day 11: RHEL 9 LVM & Swap Management
▪ Documentation for Commands ▪ Limitation of Standard Partitions
▪ Importance of Logical Volume Management (LVM)
Day 06: Linux Text Editors ▪ Preparing storage partitions for LVM
▪ Why need text editor ▪ Creating Physical volumes (PV)
▪ Different types of text editors ▪ Creating Volume Group (VG)
▪ Introduction to 'vi/vim' and 'gedit' ▪ Creating Logical Volume (LV)
▪ Linux Text Editor Utilities (vim, gedit, nano) ▪ Extend Volume Group (VG)
▪ Working with Different 'vi/vim' Modes ▪ Extend Logical Volumes
▪ Editing, Replacing, Searching with 'vi/vim' ▪ Resizing Logical Volumes
▪ Working with ‘vim’ advanced features ▪ Remove Logical Volumes
▪ Why need swap partition
▪ Create additional ‘swap’ space
Day 12: RHEL 9 Network Management Day 18: Linux Scripting with Bash
▪ Describing Networking Concepts ▪ Introduction to Shell Scripting
▪ Describe Network Interface Names ▪ Creating and Executing First Shell Script
▪ Validate Network Configuration ▪ Working with Shell Variables
▪ Working with NetworkManager Services ▪ Passing Arguments to the Bash Script
▪ Introducing Network Manager tools (nmcli & nmtui) ▪ Executing Shell Commands with Bash
▪ Configure Static and dynamic IP ▪ Reading User Input in Bash Shell
▪ Configure Networking using ‘nmcli’ & ‘nmtui’ ▪ Working with Bash Statement
▪ Edit Network Configuration Files ▪ Bash Conditional and Control Structures
▪ Configuring Host Name and Name Resolution ▪ Working with Login and Non-Login shells
▪ Managing Networking Environment ▪ Creating user using Shell Script

Day 13: Linux Package Management System Day 19: Working with Backup, Archive, Log Files
▪ The Linux Package Management system ▪ Why need backup & Archives?
▪ Register system with RHEL Portal ▪ Different types of Backup method
▪ Explain and Investigate RPM Packages ▪ Working with Compressed ‘tar’ Archive
▪ RPM Install, Queries and verifying ▪ Compress and De-compress using ‘gz, bz2, xz’
▪ Dependency problems and Resolution ▪ Transfer Files Between Systems Securely (SCP)
▪ Concept of RPM Repositories ▪ Synchronize Files Between Systems (Rsync)
▪ Configure DVD/ISO Local repository ▪ Describe System Log Architecture
▪ Packages Install and Remove using DNF ▪ Review Syslog Files & Facility
▪ Use CentOS public repositories ▪ Review System Journal Entries
▪ Enable Third-party Software Repositories (EPEL) ▪ Preserve the System Journal
▪ Manage tuning profiles
Day 14: Configuring OpenSSH Service
Day 20: NTP Service & Scheduling Future Tasks
▪ What is the Secure Shell (SSH)?
▪ How SSH (Secure Shell) works? ▪ Introduction to Chrony Suite
▪ SSH Host Keyes (Public and Private) ▪ Configure Chrony as a NTP Server
▪ Configuring SSH Key-based Authentication ▪ Using Chronyc to control ‘chronyd’
▪ Password less SSH Login ▪ Administer Local clocks and Time Zones
▪ Customizing SSH Service Configuration ▪ Configure NTP client
▪ Restricting SSH Logins (root) ▪ Verifying NTP client is synchronized
▪ Putty and Open SSH Clients ▪ Introduction to Linux Scheduling
▪ Secure Copy Through 'scp' ▪ Schedule tasks using ‘at’ and ‘cron’
▪ Explain Cron job file format
Day 15: Managing Network Security (Firewalld) ▪ Running commands at particular times
▪ Introduction to Firewall Technologies ▪ Use shell script in cronjob
▪ Firewall Architecture Concepts
▪ Network based and Host based firewall Day 21: RHEL 9 Container Technology
▪ Introducing RHEL 9 ‘firewalld’
▪ Working with ‘firewalld’ zones ▪ Introducing Container Technology
▪ Managing & configure ‘firewalld’ service ▪ Why Need Container Technology
▪ IP, ICMP, Port, Service Filtering using ‘firewalld’ ▪ Limitation of Virtual Machines
▪ Virtualization vs Container Technology
Day 16: RHEL 9 SELinux Security ▪ Different types of Container Technology
▪ RHEL Containerization using Podman
▪ Introducing SELinux Security ▪ Inspect container images
▪ Explanation of SELinux Modes ▪ Manage container registries
▪ Set enforcing and permissive modes for SELinux ▪ Perform basic container management
▪ List and identify SELinux file and process context ▪ Run a service inside a container
▪ Restore default file contexts ▪ Build a container from a Container file
▪ Manage SELinux port Labels ▪ Attach persistent storage to a container
▪ Working with SELinux Boolean ▪ Configure a container to start automatically as a
▪ Diagnose & address routine SELinux policy violations systemd service
Day 17: Access NFS Share and Auto Mount
▪ Network File System (NFS) Introduction
▪ Install and Configure NFS Server
▪ Create Share for Public & Private Access
▪ Setup an NFS server and export directories
▪ Allow NFS Share through Firewalld
▪ Review /etc/exports parameters and options
▪ NFS Client Configuration to access NFS Share
▪ Mount and unmount network file systems using NFS
▪ Configure AutoFS

You might also like