Course 55187C: Linux System Administration

Typ:Course
Zielgruppe(n):IT Professionals
Technologie:non-Microsoft products and technologies
Ebene:Beginner
Diese Version:C
Bereitstellungsmethode:
Classroom
Länge:4 days
Sprache(n):English

Erste Veröffentlichung:

06 April 2018
Übersicht
Über diesen Kurs

This hands-on 4-day Linux System Administration course teaches attendees how to administer, configure and upgrade Linux systems running one of the three major Linux distribution families (Red Hat, SUSE, Debian/Ubuntu). Focused on enterprise environments, it provides Linux system administrators with all the ools and concepts needed to efficiently build and manage a production Linux infrastructure. This course presents state-of-the-art techniques used in the industry and applies them in the context of practical labs.

 

Linux Foundation Certification Preparation Profil der Zielgruppe

This course is intended for System administrators and users who already have at least some basic exposure to Linux or another UNIX-based operating system constitute the target audience for this class. Anyone who is looking to acquire practical knowledge in the field of system administration in enterprise environments will save significant time by attending this course. It should also be considered a necessary step to be taken by anyone considering more advanced classes in our System Administration curriculum track. The concepts covered provide important building blocks for anyone looking to attend more advanced classes, in particular LFS311: Linux Network Management.

Bei Abschluss des Kurses

After completing this course, students will be able to:

  • Perform essential Linux commands such as installation, searches and manipulating files.
  • Operate running Linux systems by managing the boot process, scheduling jobs, updating the system, monitoring system performance and managing security.
  • Manage users and groups by adding/deleting/modifying, configuring LDAP and PAM, modifying user processes and resources.
  • Ensure network performance via configuration, monitoring, tunnelling and routing of traffic.
  • Configure services such as DNS, shares, SSH and SELinux/AppArmor as well as servers for DHCP and HTTP.
  • Manage system storage by using partitions, logical volumes, phsyical volumes, ACLs, quotas and clustering
Kursdetails
Course OutlineModule 1: IntroductionThis module defines the organization responsible for Linux and explains how it promotes, protects, and advances Linux.Lessons
  • Linux Foundation
  • Linux Foundation Training
  • Linux Foundation Certifications
  • Laboratory Exercises, Solutions and Resources
  • E-Learning Course: LFS201
  • Distribution Details
Lab : Module 1 Labs
  • Configuring the System for sudo

After completing this module, students will be able to:

  • Describe the mission of The Linux Foundation and its role in the Linux and Open Source community.
  • Configure the system for safe use via the sudo command.
Module 2: Linux Filesystem Tree LayoutThis module explains how the Linux Filesystem is organized and points out the key directories and their roles.Lessons
  • Data Distinctions
  • FHS Linux Standard Directory Tree
  • root (/) directory
  • /bin
  • /boot
  • /dev
  • /etc
  • /home
  • /lib and /lib64
  • /media
  • /mnt
  • /opt
  • /proc
  • /sys
  • /root
  • /sbin
  • /srv
  • /tmp
  • /usr
  • /var
  • /run
Lab : Module 2 Labs
  • Change size of the default directories
  • Touring the /proc Filesystem

After completing this module, students will be able to:

  • Describe how the Linux Filesystem is set up.
  • Demonstrate knowledge of how the key directories work.
Module 3: ProcessesThis module explains how to work with Linux processes. It begins with an overview of what processes are and how they work before proceeding to illustrate how to create, monitor, prioritize and limit processes.Lessons
  • Programs and Processes
  • Process Limits
  • Creating Processes
  • Process States
  • Execution Modes
  • Daemons
  • niceness
  • Libraries
  • Signals
Lab : Module 3 Labs
  • Controlling Processes with ulimit
  • Examining System V IPC Activity
  • Examining Signal Priorities and Execution

After completing this module, students will be able to:

  • Describe the role of processes in Linux and how they relate to programs.
  • Identify the different states processes can take.
  • Monitor and limit processes.
  • Set process priority using niceness values
Module 4: Package Management SystemsThis module explains how to work with the major package management systems used in Linux distributions. Covers both RPM and DKPG as well as the use of version control systems such as git.Lessons
  • Software Packaging Concepts
  • RPM (Red Hat Package Manager)
  • DPKG (Debian Package)
  • Revision Control Systems
Lab : Module 4 Labs
  • Using RPM
  • Rebuilding the RPM database
  • Using DKPG
  • Version control with git

After completing this module, students will be able to:

  • Understand the role and function of package management systems.
  • Understand and use RPM.
  • Understand and use DKPG.
  • Understand the role of revision control systems, particularly git.
Module 5: Package InstallersThis module explains how to use the major package installers, including yum, zypper and APT. It also explains the role that package installers play in automating software management and dealing with dependencies.Lessons
  • Package Installers
  • yum
  • zypper
  • APT
Lab : Module 5 Labs
  • Basic yum commands
  • Using yum to find information about a package
  • Managing groups of packages with yum
  • Adding a new yum repository
  • Basic zypper commands
  • Using zypper to find information about a package
  • Basic APT commands
  • Using APT to find information about a package
  • Managing groups of packages using APT

After completing this module, students will be able to:

  • Describe the role that package installers play in managing the software update process.
  • Demonstrate proficiency with APT, yum and zipper.
Module 6: System MonitoringThis module explains how to monitor your Linux system and use tools to test it and report any issues.Lessons
  • System Monitoring
  • Process Monitoring
  • Memory Monitoring and Tuning
  • Network Monitoring
  • I/O Monitoring
  • I/O Scheduling **
  • System Log Files
  • sar **
Lab : Module 6 Labs
  • Using stress
  • Processes
  • Monitoring Process States
  • Invoking the OOM Killer
  • bonnie++
  • fs mark

After completing this module, students will be able to:

  • Stress your Linux system and monitor results.
  • Monitor the performance of drives and file systems.
Module 7: Linux FilesystemsThis module explains how to work with Linux Filesystems, starting with the understanding that Linux treats everything as a file. IT covers Virtual filesystem (VFS), Filesystem Usage and Attributes, Major types (ext4, XFS, btrfs) and how to create, format, mount, swap and repair Filesystems.Lessons
  • Filesystem Basics
  • Virtual Filesystem (VFS)
  • Available Filesystems
  • Filesystem Concepts
  • Disk and Filesystem Usage
  • Extended Attributes
  • ext4
  • XFS **
  • btrfs **
Lab : Module 7 Labs
  • Defragmenting a system.
  • Modifying Filesystem parameters using tune2fs.
  • Working with file attributes.
  • Mounting options.
  • Managing swap space.
  • Filesystem quotas.
  • Working with XFS.
  • Working with btrfs.

After completing this module, students will be able to:

  • Create Filesystems.
  • Format Filesystems.
  • Mount Filesystems.
  • Use swap partitions.
  • Manage Filesystem quotas.
  • Repair Filesystems.
Module 8: Partitioning and Formatting DisksThis module explains how to work with disks in Linux by naming, partitioning and sizing them.Lessons
  • Common Disk Types
  • Disk Geometry
  • Partitioning
  • Naming Disk Devices
  • Sizing up partitions
  • Partition table editors
Lab : Module 8 Labs
  • Using a file as a disk partition image
  • Partioning a Disk Image file
  • Using losetup and parted
  • Partitioning a real hard disk

After completing this module, students will be able to:

  • Partition disks.
  • Name disk drives.
  • Size partitions.
  • Edit partition tables.
Module 9: More on Linux FilesystemsThis module expands on Module 8. It explains how to create, format, mount and check filesystems.Lessons
  • Creating and formatting filesystems
  • Checking and Repairing Filesystems
  • Mounting filesystems
  • automount
  • Swap
  • Filesystem Quotas **
Lab : Module 9 Labs
  • Mounting Options
  • Managing Swap Space
  • Filesystem Quotas

After completing this module, students will be able to:

  • Create and format a filesystem.
  • Repair a filesystem.
  • Mount/Unmount a filesystem.
  • Understand and set up filesystem quotas.
Module 10: Encrypting DisksThis module explains how to protect filesystems from prying eyes and protect the data they contain.Lessons
  • Filesystem Encryption
  • LUKS
  • Using an Encrypted Partition
Lab : Module 10 Labs
  • Disk Encryption
  • Encrypted Swap

After completing this module, students will be able to:

  • Provide sound reasons for using encryption and know when it is called for.
  • Understand how LUKS operates through the use of cryptsetup.
  • Be able to set up and use encrypted filesystems and partitions.
  • Know how to configure the system to mount encrypted partitions at boot.
Module 11: LVM and RAIDThis module explains how to work with RAID and Logical Volume Management (LVM).Lessons
  • Logical Volume Management (LVM)
  • Volumes and Volume Groups
  • Working with Logical Volumes
  • Resizing Logical Volumes
  • LVM Snapshots **
  • RAID **
  • RAID Levels **
  • Software RAID Configuration **
Lab : Module 11 Labs
  • Creating a RAID device
  • Creating Logical Volumes

After completing this module, students will be able to:

  • Understand, configure and monitor RAID.
  • Create, resize and utilize Logical Volumes.
  • Work with LVM snapshots.
Module 12: Kernel Services and ConfigurationThis module explains how the Linux Kernel is configured, how the modules and utilities work, the function of sysctl and udev and Device Management.Lessons
  • Kernel Overview
  • Kernel Configuration
  • sysctl
  • Kernel Modules
  • Module Utilities
  • Module Configuration
  • udev and Device Management
Lab : Module 12 Labs
  • Manipulating system tunables with sysctl.
  • Changing the maximum process ID.
  • Working with Kernel modules.
  • Working with udev.

After completing this module, students will be able to:

  • Describe how the Linux Kernel is configured.
  • Work with Kernel modules.
  • Manage devices.
  • Work with udev and sysctl.
Module 13: Virtualization OverviewThis module explains Virtualization, gives a brief history, and shows how to create and install a virtual machine.Lessons
  • Introduction to Virtualization
  • Emulation
  • Hypervisors
  • libvirt
  • QEMU
  • KVM
Lab : Module 13 Labs
  • Making Sure KVM is Properly Set up
  • Using virt-manager with KVM to Install a Virtual Machine and Run it
  • Extra Credit: Doing from he command line

After completing this module, students will be able to:

  • Create and install a virtual machine.
Module 14: Containers OverviewThis module explains the basics of what a container is, what application virtualization is, and Docker as an example of container technology.Lessons
  • Containers
  • Docker
  • Docker Commands
Lab : Module 14 Labs
  • Install and test Apache (httpd) as a Docker application.

After completing this module, students will be able to:

  • Understand the basics of containers and container applications.
  • Install and test a Docker application.
Module 15: User and Group Account ManagementThis module explains how to work with users and groups in Linux. It also covers how to work with passwords, restricted shells, the root account, Pluggable Authentication Modules (PAM), LDAP and SSH.Lessons
  • User Accounts
  • Management
  • Passwords
  • Restricted Shells and Accounts **
  • The root Account
  • Group Management
  • SSH
  • PAM (Pluggable Authentication Modules)
  • Authentication Process
  • Configuring PAM
  • LDAP Authentication **
  • File Permissions and Ownership
Lab : Module 15 Labs
  • Working with user accounts
  • Working with groups
  • Configuring PAM
  • Using chmod

After completing this module, students will be able to:

  • Manage users and groups by adding/deleting/modifying them.
  • Configure and use LDAP.
  • Configure on use PAM.
  • Modify user processes and resources.
  • Appropriately use the root account.
  • Use SSH to securely access remote systems.
Module 16: NetworkingThis module explains how to conduct basic networking in Linux. It covers IP addresses, Hostnames, Network Interfaces, Routing and Name Resolution.Lessons
  • IP Addresses
  • Hostnames
  • Network Devices
  • ip and ifconfig
  • Network Configuration Files
  • Network Manager
  • Routing
  • DNS and Hostname Resolution
  • Network Diagnostics
Lab : Module 16 Labs
  • Static configuration of a network interface
  • Adding a static hostname
  • Adding a network interface alias

After completing this module, students will be able to:

  • Explain how IP addresses function.
  • Manipulate hostnames.
  • Configure network interfaces.
  • Route traffic persistently and non-persistently.
  • Perform network diagnostics.
Module 17: FirewallsThis module explains how to work with firewalls in Linux. It covers both command line tools and GUI tools as well as firewalld. Zones and source management are discussed, as is service and port management.Lessons
  • Firewalls
  • Interfaces
  • firewalld
  • Zones
  • Source Management
  • Service and Port Management
Lab : Module 17 Labs
  • Installing firewalld
  • Examining firewall-cmd
  • Adding services to a zone
  • Using the firewall GUI

After completing this module, students will be able to:

  • Describe the role and function of firewalls.
  • Understand the most commonly use tools.
  • Describe the function of zones.
  • Implement services on zones.
Module 18: System Startup and ShutdownThis module explains how to manage startup and shutdown processes in Linux.Lessons
  • Understanding the Boot Sequence
  • System Configuration Files in /etc
  • Shutting down/Rebooting the System
  • The Grand Unified Boot Loader
  • GRUB Configuration Files
  • The init Process
  • systemd
  • SysVinit Startup **
  • chkconfig and service **
  • Upstart **
Lab : Module 18 Labs
  • Boot into non-graphical mode using GRUB
  • Add a new startup service with System V
  • Add a new startup services with system
  • Run Shutdown vs. Halt vs. Reboot

After completing this module, students will be able to:

  • Manage startup process in Linux.
  • Manage shutdown process in Linux.
Module 19: Backup and Recovery MethodsThis module explains how to backup data in Linux. It covers the tools that are used for backup and compression as well as for moving and copying files and also for restoring files.Lessons
  • Backup Basics
  • cpio **
  • tar
  • Compression: gzip, bzip2 and xz and Backups
  • dd
  • rsync
  • dump and restore **
  • mt **
  • Backup Programs **
Lab : Module 19 Labs
  • Using tar for backup
  • Using cpio for backup
  • Using rsync for backup

After completing this module, students will be able to:

  • Describe the benefits of backup up data.
  • Demonstrate proficiency with common backup tools.
  • Demonstrate proficiency with common compression tools.
Module 20: Linux Security ModulesThis module explains how the Linux kernel enhances security through the use of the Linux Security Modules framework, particularly with the deployment of SELinux.Lessons
  • Linux Security Modules
  • SELinux
  • AppArmor
Lab : Module 20 Labs
  • SELinux: Contexts
  • Explore the apparmor security

After completing this module, students will be able to:

  • Understand enhanced security mode in Linux and its importance in making sure permissions are valid.
  • Become familiar with the two most used Linux Security Modules.
Module 21: Local System SecurityThis module explains how to secure systems against both internal and external threats. It covers how to identify risks and provides guidance on how to decide what protection is appropriate. Finally, it covers the basic types of security available (physical, filesystem, and security modules e.g. SELinux).Lessons
  • Local System Security
  • Creating a Security Policy
  • Updates and Security
  • Physical Security
  • Filesystem Security
Lab : Module 21 Labs
  • Using SELinux
  • Security and mount options
  • Using umask
  • Usint setuid and scripts

After completing this module, students will be able to:

  • Describe the sources of threats to system security.
  • Understand the components important to creating a security policy.
  • Demonstrate basic familiarity with SELinux.
Module 22: Basic Troubleshooting and System RescueThis module explains how to conduct troubleshooting in Linux as well as likely sources of issues. It covers basic concepts in system rescue and recovery and how to identify corrupted filesystems.Lessons
  • Troubleshooting Overview
  • Things to Check: Networking
  • Boot Process Failures
  • Filesystem Corruption and Recovery
  • Virtual Consoles
  • Rescue Media and Troubleshooting
  • System Rescue and Recovery
Lab : Module 22 Labs
  • Preparing to use Rescue/Recover media
  • Recovering from a corrupted GRUB configuration
  • Recovering from a password failure
  • Recovering from partition table corruption
  • Recovering using the install image

After completing this module, students will be able to:

  • Describe the common sources of corruption/performance issues.
  • Identify the cause of system issues.
  • Recover a system after some of the most common types of issues.
Additional Reading

Introduction to Linux course on edx.org: https://www.edx.org/course/introduction-linux-linuxfoundationx-lfs101x-2

Voraussetzungen
  • Knowledge of the basic components of Linux.
  • Familiarity with text editors (emacs, VI).
  • Working knowledge of Bash scripting.
  • Attendees should already have prior exposure to a Linux or UNIX system and practical experience with the
    command line interface at a level that is equivalent to what is covered in our free LFS101x - Introduction to Linux course (available on edX.org). Basic tools such as text editors, file utilities and basic tasks are assumed to be well-understood prior to this course.
Community

Suchen Sie nach Schulungsressourcen, Veranstaltungen und Rat von Kollegen? Treten Sie der Microsoft Trainings- und Zertifizierungs-Community bei.

Sie bereiten sich auf eine Prüfung vor? Finden Sie eine Studiengruppe für Microsoft-Zertifizierungen.

Kontaktieren Sie uns über diese sozialen Netzwerke: