Advanced Admnistartion Course for LINUX Experts

COURSE CONTENTS AT A GLANCE
1) Installation
A. Network Installation
B. Automate Installation (Kick start)

2) Device Configuration
A. CPU and memory
B. Partitioning structure
C. Adding a drive
D. Converting home directory to a home partition
E. Primary extended and logical
F. Partitioning hard drive
G. Creating different types of file system
H. Playing with SWAP


3) The Linux file systems
A. Inodes
B. cp and Inodes
C. mv and Inodes
D. rm and Inodes
E. Soft (Symbolic) links
F. Hard links
G. Assigning permission to the linked files
H. Changing ownership/group to the linked files
I. Compression utilities
J. File compression & decompression
K. Auto mounting

4) System Initialization and Services
A. Init initialization
B. Run levels
C. Processes & daemon
D. Requirement of /etc/rc.d/rc.sysinit
E. Requirement of /etc/rc.d/rc
F. Requirement of /etc/rc.d/rc.local


5) Working with packages
A. Using RPM-Red hat Package Manager
B. Use of YUM and its details


TOPICS 06- File and directory permission
Categories of permission
Changing Permissions – Symbolic Method
Changing Permissions – Numeric Method
Controlling default permission using “umask”


6) User Administration with special permission
A. Linux file permissions
B. Assigning set UID
C. Assigning set GID
D. Assigning sticky bit


7) Linux Quota
A. Quota overview
B. The Linux quota system


8) RAID
A. RAID-Redundant Array of Independent Disks
B. RAID overview
C. Software RAID
D. Hardware RAID
E. Different types of RAID level
F. Crating RAID partition
G. Removing RAID partition


9) LVM
A. LVM-Logical Volume Manager
B. LVM overview
C. Creating LVM
D. Renaming LVM
E. Extending LVM
F. Reducing LVM
G. Removing LVM

10) NIS
A. NIS-Network Information System
B. NIS overview
C. NIS Topology
D. Configuring an NIS Server
E. NIS Client Configuration
F. NIS Troubleshooting


11) Backup and Restoring
A. Linux backup (DNS, WEB, MAIL)
B. Restoring the backup files


12) Troubleshooting
A. Cause of file system corrupt
B. File system recovery
D. Use of single user mode
E. Use of maintenance mode
F. Use of rescue environment

Download this page