Linux System Overview
- Unix, Linux and Open Source
- The History of GNU and FSF
- Linux Distributions
- Duties of the System Administrator
- Superusers, root, su, sudo
- TCP/IP Networking Fundamentals
- Online Help: apropos, man, info
- Editors: vi, emacs, gedit
Booting and Shutting Down Linux
- Boot Sequence
- System Startup and Shutdown Scripts
- /etc/inittab
- Run Levels
- chkconfig Command
- Shutdown Commands
- Handling Power Failures
Installation and Configuration
- Planning: Hardware and Software Considerations
- Site Planning
- Installation Methods and Types
- File System Overview
- Partitions: Swap and System Considerations
- Linux Loaders: LILO, MILO, SILO, GRUB
- Software Package Selection
- Adding and Configuring Peripherals
- Printers
- Modems
- Graphics Controllers
- Basic Networking Configuration
- The Emergency Boot Disk
Managing Software and Devices
- Identifying Software Packages
- Using rpm to Manage Software
- Using Debian Software Commands
- Installing and Removing Software
- Identifying Devices
- Displaying Device and System Information (PCI, USB)
- Plug and Play Devices
- Device Configuration Tools
X Window System Administration
- X Window System Introduction
- Installation and Upgrading X Windows
- Configuring XFree86
- Utilities for Configuring X Windows
- Configuring the Graphics Driver and Mouse
- Selecting and Installing a Window Manager
- Desktop Environments
- Motif Development Kit Installation
- X Windows Environment Files
Managing Users and Groups
- Setting Policies
- User File Management
- The /etc/passwd file
- The /etc/shadow file
- The /etc/group file
- Adding Users
- Modifying User Accounts
- Working with Groups
- Setting User Environments
- Global Restart Control Files
- User Restart Control Files
The Linux File System
- Conventional Directory Structure
- Mounting a File System
- The /etc/fstab File
- Special Files (Device Files)
- Inodes
- Hard and Symbolic File Links
- Creating New File Systems with mkfs
- The lost+found Directory
- Repairing File Systems with fsck
- The Journaling Attribute
- File and Disk Management Tools
Linux File Security
- File Permissions
- Directory Permissions
- Octal Representation
- Changing Permissions
- Setting Default Permissions
- SUID and SGID Bit
- Setting the Sticky Bit
Working with the Linux Kernel
- Linux Kernel Components
- Classes of Kernels
- Applying Kernel Update Patches
- The Kernel Configuration Tool
- Recompiling the Kernel
Shell and Perl Scripting
- Shell Script Fundamentals
- Bourne Shell Syntax Overview
- Shell Script Examples
- Basics of Perl
- Using Perl for Administration
- Perl Script Examples
| |
Controlling Processes
- Understanding Processes
- Background Processes
- Controlling Processes
- Signals and kill command
- Automating Processes
- cron and crontab
- at and batch
- System Processes (Daemons)
System Backups
- Backup Concepts and Strategies
- User Backups: tar and cpio
- System Backup Options
- The restore Command
- Rescuing Disks
Setting Up Mail
- Mail System Choices
- Configuring sendmail
- Setting up qmail
- Setting up popd and imapd
Troubleshooting and Repairing
- Common Problems and Symptoms
- Troubleshooting Steps
- Repairing General Boot Problems
- Repairing LILO and GRUB Boot Loader
- Hard Drive Problems
- Repairing Corrupted Shared Libraries
- syslogd and System Logs
Basic Networking
- TCP/IP Fundamentals
- Review of Internet Addressing
- Network Services Overview
- Fundamental Network Configuration Files
- Network Control Scripts and Daemons
- Enabling Services Using xinetd
Setting up HTTP Servers
- The Apache Web Server
- Configuring Apache
- Common Directives
- Apache Virtual Hosting
- Setting up Authenticated Access
NFS, NIS, DHCP, and DNS
- Network File System (NFS)
- How to Configure the NFS Server
- Exporting NFS Shares
- How to Configure the NFS Client
- Purpose of NIS
- How to Configure NIS
- Setting up DHCP Configurations
- Purpose of DNS
- Working with DNS
- How to Configure DNS
- The rndc.conf File
- Zone Files
- Bind and named
- Networking Commands: telnet, ftp, rsh, rlogin, rcp
- Configuring Secure Shell (ssh)
Basics of System Security
- Security Overview
- Maintaining System Security
- Server Access
- Common System Hacking Options
- Physical and Network Security
- Security Tools
- Preventing Break-Ins
- PAM Security Modules
- Scanning the System
- Maintaining File Integrity
- Installing and Configuring tripwire
- Security Scanning Using nessus
- Securing Linux Using LIDS
- Hardening the System Using Bastille
- Using Firewalls
- Packet Filtering with iptables
- Masquerading with iptables
The Samba File System Facility
- Samba to Connect Linux File Systems
- Samba to Connect Windows File Systems
- Configuring Samba, smbclient
- Mounting SMB Shares
|