Training

[vc_row][vc_column][vc_column_text]Learn your favorite technologies from our Experts who are well knowledged and had real-time experience in bigger environments. Learning from them will be your advantage as they teach you the subject with practical scenarios and guide you for facing the IT world.

We provide training for beginners to expert level on any technologies we offer on our site. All our trainers are certified in respective technologies they tech.

All you need to have a passion for learning and a little time, an average of 2 hours per session

The training will be provided to you over online at your chosen schedule. If you have missed any schedule, then you are welcome to attend the training at different timings. You can also reattend any session to clear your doubts.

We currently offer,[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_tta_tabs][vc_tta_section i_icon_fontawesome=”fa fa-linux” add_icon=”true” title=”Red Hat Enterprise Linux (RHCSA & RHCE)” tab_id=”1515314923992-b8d866ef-a2eb”][vc_column_text]

Part 1

What is Linux?

  • History
  • Linux environment.

Introduction to Red Hat Enterprise Linux and its versions.

  • About Red hat certification
  • Different between Red Hat Linux versions
  • New features in Red Hat Linux 7

Linux basic commands.

  • System identification commands
  • Listing commands

Linux advanced commands.

Basic hardware requirements and Installation.

  • Support for i386 and x86_64 bit systems
  • Types of installation
  • Partitioning plan
  • Assigning identification information to the installed system.

Structure of Linux.

  • Hierarchy structure
  • Types of files.
  • Setting up symbolic link and hard link.

Partitioning the Hard disk with different mechanisms.

  • Primary partitions
  • Logical partitions
  • Using fdisk
  • Using parted

File systems and Mounting.

  • File system structure
  • About ext3, ext4 and xfs file systems
  • Creating the file system
  • Checking the file systems integrity.
  • Tuning the file system parameters.
  • Mounting file systems temporally
  • Mounting the file systems using fstab
  • Using fuser command
  • Disk usage commands

User management and configuring user quotas.

  • Types of users
  • Configuration files of user management tasks
  • Creating users and groups
  • Modifying users and groups
  • Deleting users and groups
  • Setting up users profiles
  • Uses of Disk quota
  • Configuring user quota
  • Configuring group quota

Setting up file permissions.

  • Basic rules of setting permissions
  • Changing permission using chmod
  • Changing ownership using chown
  • Changing group ownership using chgrp
  • Setting up umask
  • Configuring sticky bit and setuserid, setgroupid
  • Using chattr
  • Using Access control list(ACL)

Using sudo for controlling the users.

  • Setting up sudo access to normal users using visudo
  • Setting users to handle particular aplications

Package management using RPM and YUM.

  • Downloading rpms
  • Installing the packages
  • Upgrading the packages
  • Checking the packages.

Process management and monitoring.

  • Explaining processes
  • Using different tools for monitoring the processes
  • Killing the unwanted process
  • Changing the priority of the processes

Basic Networking.

  • Basic networking devices
  • Network topologies
  • Subnetting

Using Networking commands and troubleshooting.

  • Setting up static ip
  • Network basic commands
  • Explaining about network configuration files

Network bonding.

Booting Process

  • Booting process and GRUB
  • What are the programs involved in booting
  • Booting stages
  • GRUB
  • /etc/intitab and runlevels

Part 2

Setting up yum server and clients

  • Preparing the system for yum server
  • Configuring local yum server
  • Configuring yum mirror server.
  • Setting up yum clients.

Configuring FTP server

  • Setting up FTP server using vsftpd package
  • Using /etc/vsftpd/vsftpd.conf
  • Setting up anonymous access
  • Denying and allow users to access ftp server.

Building local DNS server and slave

  • Setting up DNS master server
  • Change the setting in configuration files
  • Creating the zone databases
  • Test the configuration and setup the client systems
  • Setup the slave server
  • Assign the slave ip to clients and test the setup

Hosting websites using Apache server

  • Installing the Apache packages
  • The apache configuration file
  • Apache log files
  • Setting password for websites
  • Virtual hosting

Securing the Apache server using SSL

  • Usiing ssl.conf

Setting up ssh server and transferring file using scp, rsync

  • Using ssh key authentication
  • Generating the ssh key
  • Using scp and rsync

Using DHCP server to generate dynamic ips to clients

  • Installing DHCP server
  • The DHCP configuration file
  • Test the client systems

SAMBA server configuration

  • Installing samba packages
  • The samba configuration file
  • Create public share
  • Configure samba login
  • Setting up samba clients

Setting up mail server using POSTFIX

  • About MTA,MDA.MUA and MSA
  • Installing postfix packages
  • Setup postfix as default mail server
  • The postfix configuration file
  • The /etc/aliases file
  • Setting up email clients.

Using squid proxy server to block the websites.

  • Installing squid packages
  • The /etc/squid/squid.conf file
  • Denying and allowing the websites with different methods

NFS and AUTOFS

  • Explaining different NFS services
  • Installing NFS packages
  • The /etc/exports
  • NFS server options
  • Installing AUTOFS
  • The Autofs configuration files

Centralized user authentication using NIS

  • Installing NIS packages
  • Setting up the NIS domain name
  • Generate the NIS maps databases
  • Setup the client system

Centralized user authentication using LDAP

  • Installing the LDAP packages
  • Setup the configuration using setup.ds.admin.pl script
  • Installing the DS console
  • Setting up the directory suffix
  • Create users and groups
  • Pointing LDAP clients to communicate with the server.

Part 3

Configuring IPTABLES

  • Explaining command structure
  • input rules, output rules, and forward rules
  • setting up masquerading
  • backing up iptable rules

Performance tuning and maintaining logs

  • Tuning /etc/security/limits.conf file
  • The sysctl.conf file
  • Viewing tunable parameters

Tuning the hardware resources using CGROUPS

  • Explaining about subsystems
  • Limit the CPU access to users and groups
  • Limit the memory access to users and groups

SELinux concepts

  • Using SELinux commands
  • Basic SELinux settings
  • About SELinux context
  • Setting SELinux Booleans

Installing new kernel

  • Installing new kernelRecompiling the kernel

Remote accessing using VNC

  • Installing vnc server and clients
  • Sharing the graphical desktop to clients

Configuring logical volume manager

  • Pv creation
  • Vg creation
  • Lv creation
  • Extending vgs
  • Extending lvs
  • Vg reduce
  • Lv reduce
  • Moving pvs to other vg
  • Creating snapshot volumes

RAID concepts and setting up software RAID

  • Creating RAID-0, RAID-1, RAID-5
  • Testing RAID-1 and RAID-5 failover
  • Creating spare hard disks

Installing OS using kickstart.

  • Creating Kickstart file
  • Share the kickstart file through NFS
  • Install the clients using kickstart file

Installing OS using PXE-Boot

  • configuring TFTP service
  • configuring DHCP service
  • configuring nfs service
  • creating the kickstart file

Dumping TCP data using TCPDUMP

  • capture packets using tcpdump command
  • Install Wireshark

[/vc_column_text][/vc_tta_section][/vc_tta_tabs][/vc_column][/vc_row][vc_row][vc_column][vc_message icon_fontawesome=”fa fa-money”]Course Fee – $150[/vc_message][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]Let us know If you do not find your training. We will help you learn that as well.

Message us now and get ready to enter into the world.

[contact-form-7 id=”527135″ title=”Training”][/vc_column_text][/vc_column][/vc_row]